-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Description
Hi, @thornjad @zbynek, there is a high severity vulnerability introduced in your package http-server:
Issue Description
A vulnerability CVE-2017-1000048 detected in package qs(<6.0.4,>=6.1.0 <6.1.2,>=6.2.0 <6.2.3,>=6.3.0 <6.3.2) is transitively referenced by [email protected]. We noticed that such a vulnerability has been removed since [email protected].
However, http-server's popular previous version [email protected]. (90,689 downloads per week) is still transitively referenced by a large amount of latest versions of active and popular downstream projects (about 247 downstream projects, e.g., quiz-react-sdk 17.14.0, quiz-presets 17.14.0, @instructure/ui-scripts 8.6.0, @instructure/quiz-number-input 17.14.0, @instructure/quiz-taking 17.14.0, @yuuvis/[email protected], etc.).
As such, issue CVE-2017-1000048 can be propagated into these downstream projects and expose security threats to them.
These projects cannot easily upgrade http-server from version 0.11.1 to (>=0.12.0). For instance, [email protected] is introduced into the above projects via the following package dependency paths:
(1)@yuuvis/[email protected] ➔ @eo-sdk/[email protected] ➔ [email protected] ➔ [email protected] ➔ [email protected]
......
The projects such as @eo-sdk/proxy, which introduced [email protected], are not maintained anymore. These unmaintained packages can neither upgrade http-server nor be easily migrated by the large amount of affected downstream projects.
On behalf the downstream users, could you help us remove the vulnerability from package [email protected]?
Suggested Solution
Since these unactive projects set a version constaint 0.11.* for http-server on the above vulnerable dependency paths, if http-server removes the vulnerability from 0.11.1 and releases a new patched version [email protected], such a vulnerability patch can be automatically propagated into the 247 affected downstream projects.
In [email protected], you can kindly try to perform the following upgrade:
union ~0.4.3 ➔ ~0.5.0
;
Note:
[email protected](>=0.5.0) directly depends on [email protected] (a vulnerability CVE-2017-1000048 patched version)
Thank you for your help.
Best regards,
Paimon