Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix CVE–2021–43616 #377

Merged

Conversation

debricked[bot]
Copy link
Contributor

@debricked debricked bot commented May 3, 2022

CVE–2021–43616

Vulnerable dependency:     npm (npm)    7.24.2

Vulnerability details

Description

Insufficient Verification of Data Authenticity

The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

NVD

The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json.

CVSS details - 9.8

 

CVSS3 metrics
Attack Vector Network
Attack Complexity Low
Privileges Required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity High
Availability High
References

    NVD - CVE-2021-43616
    [BUG] npm ci succeeds when package-lock.json doesn't match package.json · Issue #2701 · npm/cli · GitHub
    npm-ci | npm Docs
    GitHub - icatalina/CVE-2021-43616: Repo demonstrating CVE-2021-43616 / https://github.com/npm/cli/issues/2701
    Our dependencies are under attack, and this time we were lucky… | by Rotem Bar | Cider Security | Medium
    CVE-2021-43616 NPM Vulnerability in NetApp Products | NetApp Product Security
    fix(ci): lock file validation · npm/cli@457e0ae · GitHub
    [SECURITY] Fedora 35 Update: nodejs-16.14.0-2.fc35 - package-announce - Fedora Mailing-Lists

 

Related information

📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more about the CVE

 

@ghost
Copy link

ghost commented May 3, 2022

CodeSee Review Map:

Review these changes using an interactive CodeSee Map

Review in an interactive map

View more CodeSee Maps

Legend

CodeSee Map Legend

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant