Closed ChuckCox closed 1 year ago
There is an ongoing discussion in another repo for this exact reason.
https://github.com/octokit/auth-app.js/issues/430
Let me sum it up:
universal-github-app-jwt
is now an ESM module as of v2jsonwebtoken
dependency was upgraded to v9 in v2.1 of universal-github-app-jwt
universal-github-app-jwt
On another note, we don't use any of the methods described in the CVE affecting jsonwebtoken
We use octokit for some integrations / automations, but our automated cve scanner picked this up.
If anyone comes across this issue until this is fixed upstream in the package, and you use yarn
, you can use yarn resolutions to specifically override the jsonwebtoken package:
In your package.json
:
"resolutions": {
"jsonwebtoken": "^9.0.0"
}
If you use npm 8.19.3 or later, you can also use npm overrides for similar overriding functionality.
Thanks all, for the great package.
Does that work for published packages? It would be a good stop-gap measure if it did
We are waiting for a backport to v1 of
universal-github-app-jwt
done: universal-github-app-jwt@1.1.1
deleting node_modules
and your lock file and installing from scratch should fix the problem.
@octokit/js @octokit/auth-app
should be updated next to force the update to v1.1.1
https://github.com/octokit/auth-app.js/blob/96291b7d942bb80a185fc5712c1af55bc2dacb8c/package.json#L34
:tada: This issue has been resolved in version 2.0.11 :tada:
The release is available on:
Your semantic-release bot :package::rocket:
Describe the need
The
jsonwebtoken
v8.5.1 package is reporting a high security vulnerability.Could this dependency be upgraded to v9.0.0 (https://github.com/auth0/node-jsonwebtoken/tags)?
Here is the npm audit report about the issue:
Here is a link to the known SNYK: https://security.snyk.io/vuln/SNYK-JS-JSONWEBTOKEN-3180020
SDK Version
No response
API Version
No response
Relevant log output
No response
Code of Conduct