Skip to content
This repository has been archived by the owner on Jul 24, 2019. It is now read-only.

Updating request module version #211

Merged
merged 1 commit into from
Aug 14, 2014
Merged

Updating request module version #211

merged 1 commit into from
Aug 14, 2014

Conversation

pdehaan
Copy link
Contributor

@pdehaan pdehaan commented Aug 10, 2014

request@2.40.0 was released to fix a recent security issue w/ qs. See request/request#992 and https://blog.liftsecurity.io/2014/08/06/denial-of-service-in-qs

**request@2.40.0** was released to fix a recent security issue w/ **qs**. See request/request#992 and https://blog.liftsecurity.io/2014/08/06/denial-of-service-in-qs
@pdehaan
Copy link
Contributor Author

pdehaan commented Aug 10, 2014

Steps to reproduce

$ git clone git@github.com:Medium/phantomjs.git .
$ npm i
$ npm shrinkwrap --dev
wrote npm-shrinkwrap.json

$ [sudo] npm i nsp -g
$ nsp shrinkwrap
Name  Installed  Patched  Vulnerable Dependency
qs      0.6.6     >= 1.x  phantomjs > request

@pdehaan
Copy link
Contributor Author

pdehaan commented Aug 12, 2014

Link to eslint/eslint#1149

@nicks
Copy link
Contributor

nicks commented Aug 14, 2014

just to verify, this is only a security issue if we pass untrusted urls to qs, right?

@pdehaan
Copy link
Contributor Author

pdehaan commented Aug 14, 2014

No clue, there was also https://nodesecurity.io/advisories/qs_dos_memory_exhaustion recently as well as https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking recently (which is why request was updated).

I was mainly filing it because our project's build task was failing the Travis build because of vulnerable modules in dependencies.

@nicks
Copy link
Contributor

nicks commented Aug 14, 2014

ya, looking at it, i don't think this is a real issue, but there's no harm in updating.

nicks added a commit that referenced this pull request Aug 14, 2014
Updating request module version
@nicks nicks merged commit 8490eb1 into Medium:master Aug 14, 2014
@nicks
Copy link
Contributor

nicks commented Aug 14, 2014

thanks for the patch

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants