-
Notifications
You must be signed in to change notification settings - Fork 141
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Project Dependencies] Vulnerability in the unset-value
dependency
#382
Comments
I don't know what primsa is @priyaramu - can you provide more context here. |
It sounds like it is this reported vulnerability with the NPM 'unset-value' package; The full paper is here; From the bits I have read, it appears a few of the dependencies used (eg; lodash/handlebars) would be vulnerable. The fix would be to ensure all dependencies are updated to the latest releases. (Which from a quick glance, they are). |
@DannyDainton Prisma tool is used to scan docker images and find the vulnerabilities if any -> https://prisma.pan.dev/docs/cloud/ |
@DannyDainton - this is still coming even after upgrading unset-value is one of the transitive dependencies of
the above is the output Please let us know if a fix is planned for this. This is becoming a blocker of sorts in our organization. |
It's not something I'm working on, this project is not my day job and unfortunately those things will always take priority. If this is some that you can fix or you want to contribute to the project - PRs are very welcome. This goes without saying but your organisation has chosen to use a 3rd party tool that they basically have no control over, there is never any guarantees that it will continue to work forever...that's the nature of software. |
unset-value
dependency
Is There An Existing Issue
What Are You Seeing
There is a high vulnerability reported by prisma while using newmna-reporter-htmlextra. The vulnerability is in unset-value 1.0.0 package which is a transitive dependency of @budibase/handlebars-helpers in newman-reporter-htmlextra. This is fixed in the unset-value 2.0.1 version.
Impacted versions: <2.0.1
Discovered: less than an hour ago
Published: 59 days ago
unset-value package versions before 2.0.1 are vulnerable to Prototype Pollution. unset() function in index.js files allows for access to object prototype properties. An attacker can exploit this to override the behavior of object prototypes, resulting in a possible Denial of Service (DoS), Remote Code Execution (RCE), or other unexpected behavior.
Steps To Reproduce The Issue
Run a prisma scan against a docker image which contains newman-reporter-htmlextra package (latest version)
Full Newman Command Or Node Script
HTMLEXTRA Version
1.22.8
Newman Version
5.3.2
Additional Context
No response
The text was updated successfully, but these errors were encountered: