Closed pravichandran15 closed 7 months ago
It seems it will be not fixed in dicer: https://github.com/mscdex/dicer/pull/22
If like me the vulnerability come from multer
, a fix is on going: https://github.com/expressjs/multer/pull/1097
In our case the vulnerability is coming from firebase-admin. Is there any fix available?
Need fix for this so Nestjs can be patched. Is there an eta?
This PR should fix NestJS: https://github.com/nestjs/nest/pull/9686
Duplicate of my post on the same issue, elsewhere:
Preamble: I am a novice and this is not advice on what you should do - I'm just relaying what I did and what the outcome was.
After deploying my Vuejs3 app a week ago to Firebase, I was prompted to upgrade to the newest version of Firebase Tools (11.0.1) via npm. After doing this, I began experiencing the problem detailed in my comment above.
Having no other solutions on the table, I decided to uninstall firebase tools (npm uninstall -g firebase-tools
) and then reinstall the previous version (npm install -g firebase-tools@10.9.2
).
BUT, after first time I did this, I ran npm audit fix
(not npm audit fix --force
) and all I got a ton of high severity warnings and problems.
So I decided to once again uninstall firebase tools (npm uninstall -g firebase-tools
) and then reinstall the previous version (npm install -g firebase-tools@10.9.2
) and that's it (did NOT run npm audit fix
).
I proceeded to npm run build
and firebase deploy --only hosting
and it worked just fine. Definitely NOT a great or long-term solution. Good luck!
In our case the vulnerability is coming from firebase-admin. Is there any fix available?
Me too
Solution that worked for me was to add: (In our case it's nest)
"overrides": {
"@nestjs/platform-express": {
"multer": "1.4.4-lts.1"
}
},
to package.json
.
Though, it comes with a requirement of a minimum of npm 8.3.0
. So we added that to the package.json
as well. Also, please do delete package-lock.json
and node_modules
beforehand.
More on overrides
I have a dep chain apollo-server-express > apollo-server-core > @apollographql/graphql-upload-8-fork > busboy > dicer
throwing this High severity vulnerability for dicer 0.3.0 (fixed dependency version in busboy 0.3.1, unfortunately).
Is there an estimated date for fixing this?
I have dep chain that throws this: "graphql-upload": "11.0.0"
--> busboy "^0.3.1"
--> dicer "0.3.0"
Any update on this?
@RikuRuokonen Lodge an issue with the graphql-upload
project owners to update their busboy
dependency.
@mscdex Well, I have raised an issue with apollo-server asking them to fix the busboy 0.3.1 dep vulnerability in Apollo Server 2.x https://github.com/apollographql/apollo-server/issues/6590
The reply was to update to 3.x Please upgrade to AS3. AS4 is close to ready! AS2 ships with hardcoded integrations with many pieces of outdated and unmaintained software.
which I cannot personally do because it's in fact a dependency of @vue/cli - I posted an issue there as well and haven't got any response yet https://github.com/vuejs/vue-cli/issues/7198
So I'm running in circles, I guess...
@RikuRuokonen You cannot open an issue with graphql-upload
in this repo https://github.com/apollographql/graphql-upload because the function is disabled.
Unless we are talking about the original repo https://github.com/jaydenseric/graphql-upload
Solution that worked for me was to add: (In our case it's nest)
"overrides": { "@nestjs/platform-express": { "multer": "1.4.4-lts.1" } },
to
package.json
. Though, it comes with a requirement of a minimum ofnpm 8.3.0
. So we added that to thepackage.json
as well. Also, please do deletepackage-lock.json
andnode_modules
beforehand.More on overrides
It works for me too, thanks!
I have dep chain that throws this:
"graphql-upload": "11.0.0"
-->busboy "^0.3.1"
-->dicer "0.3.0"
Any update on this?
I've been able to bypass it by replacing with a maintained busboy fork:
"resolutions": {
"busboy": "npm:@fastify/busboy@^2.1.0"
}
This is for yarn
. I believe that with npm
you may have to replace "resolutions":
with "overrides":
.
It seems I may have just done this wrong then, since I had thought I had updated busboy.
@widget- The official busboy
package is maintained. It however no longer uses dicer
, so upgrading the copy of busboy
is sufficient to resolve this particular issue.
Closing this as most upstream packages are indirectly using dicer
via an old, unsupported version of busboy
and upgrading busboy
will resolve the problem.
Please find the link below for the git hub security alert.
https://github.com/advisories/GHSA-wm7h-9275-46v2