Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DoS vulnerability #1719

Closed
aaronroberson opened this issue Jul 8, 2016 · 4 comments
Closed

DoS vulnerability #1719

aaronroberson opened this issue Jul 8, 2016 · 4 comments

Comments

@aaronroberson
Copy link

Node Security (nodesecurity.io) is reporting a vulnerability with the minimatch package this module implicitly depends on:

https://nodesecurity.io/advisories/118

@yocontra
Copy link
Member

yocontra commented Jul 9, 2016

@callumacrae No, not true - there's absolutely no case where this would ever be a problem with gulp.

I'm all for fixing security issues (literally used to be my job!) but this nodesecurity stuff is ridiculous.

You could say the same "DoS exploit" about array.forEach:

WARNING! array.forEach DoS exploit! Beware! Proof of concept:

var genstr = function (len) {
  var result = [];
  for (i=0; i<=len; i++) {
    result.push(0);
  }
  return result;
}

var exploit = genarr(10000000000000000000);

// wow, incredible exploit.
console.log(“starting forEach”);
exploit.forEach(function() {
  // haha owned! omg!
})
console.log(“finishing epic exploit”);

Jokes aside, don't worry about this. If you have some crazy case where you're taking unsanitized user input and passing it directly into gulp.src you have other serious issues on your hands.

@erikvold
Copy link
Contributor

Why not just update the dependency version?

@phated
Copy link
Member

phated commented Jul 18, 2017

@erikvold it's called Semver.

@gulpjs gulpjs locked and limited conversation to collaborators Jul 18, 2017
@yocontra
Copy link
Member

yocontra commented Jul 18, 2017

@erikvold There are breaking changes that would surface in our API, which means we would break our API and break other people's perfectly fine code to solve a non-problem. Our next breaking release uses the latest version, you can use that if the warning really bothers you. Real security vulnerabilities get backported by any means necessary, but non-issues like this get no priority and will be out in the next release.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants