-
-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GET // brings the entire web server down with adapter-node #2532
Comments
This is the second time in just a few months that I am affected by a major security vulnerability in SvelteKit, coming from polka. The first time was in #1488 polka does not seem to be actively maintained and seems to have only one regular contributor : https://github.com/lukeed/polka/commits/master Could a migration to a more solid web framework be envisioned, or is sveltekit tightly coupled with polka ? |
Also please add a SECURITY.md sveltejs/svelte#6430 as this should not be reported publicly. |
GET //
brings the entire web server down with adapter-node
GET //
brings the entire web server down with adapter-node
The original error comes from this line:
|
@lovasoa Again, any old error you find off the street isn't a denial of service attack. I'd appreciate you not trying to drag Polka every semblance of an opportunity you think you get, there are better ways to go about this than trying to inflate severity & cast doubt/shade on other projects. If you looked a bit closer, Polka is actively maintained and developed under the |
I didn't mean to upset anyone, but I don't think calling this a severe security vulnerability is an overstatement. Currently, if you deploy a sveltekit application in its default configuration, anyone on the internet can bring it down with a single HTTP request. This is the second time I find an instance of this in a few months, without actively looking. I don't want to cast shade on your project, but I don't think using it in SvelteKit is a good idea, if one keeps discovering new critical security vulnerabilities every few months because of it. Node has multiple battle-tested http frameworks to choose from, and I would feel safer running SvelteKit apps in production if it used one of those. |
You keep referencing a "2nd security issue" that doesn't exist. Polka@next has had the global try/catch in place for nearly 3 years. It was SK's choice (now reverted) to use This ticket is the first Polka-related issue & didn't actually report to Polka directly. Instead, much like last time, you preferred to make a fuss downstream and throw in your own comments/opinions. I don't actually care what SK uses, but it happens to use Polka because the projects' goals & philosophies re: perf/bloat align. And, hate to break it to you, but just like Polka, SvelteKit is still under a |
FWIW, But the linked PR should still go ahead for better/more granular error handling. |
I understand that you like your project, and don't like to see it being criticized. As a fellow opensource maintainer, I do respect your engagement, and the energy you put in your project. But pragmatically speaking, had SvelteKit used a more popular framework, both of these critical vulnerabilities would have been avoided. And I think it is important to make a fuss, as you say, about severe vulnerabilities. This attitude towards security (dodging responsibility for an insecure design last time, trying to minimize it this time) is part of the reason why I don't feel great about SvelteKit using polka. |
All feedback, including criticism, is fine & welcomed. I'm not here telling you Polka is perfect. If it were, it wouldn't be under To be clear, I'd be saying the same things if this were koa/tinyhttp/fastify too. The team's general approach here is to identify and fix issues upstream. @benmccann does an amazing job of this – he, and many others, are actively involved with vite's development now, which is directly a result of there being a number of vite-derived errors & bugs. Vite is new & currently undergoing its refinement/battle-testing phase. Is vite perfect? No, but getting there. Should SvelteKit move off vite? An emphatic no, even with/despite some work it's caused. The "making a fuss" is not the report itself. It's your commentary that goes with it. |
This fixes a critical vulnerability. See sveltejs/kit#2532
I landed here out of my frustration with using Polka along side Svelte Kit, and am commenting here due to that specific context, and in relation to prior discussion on this issue.
Seconded
Conflict of interest here, and this is on reason why I feel it was a poor choice to use your package in the project - you're viewing this through a lens of attack (which seems to be a trend in other projects), whereas an objective observer is viewing this through the lens of valid criticism. If you're unable to look at criticism of the project (
What about the maintenance of polka itself? All in all, having |
The defensiveness here came from the fact that multiple issues were opened here about Polka instead of raising/bringing those issue reports to Polka directly. They’ve since been fixed & published in |
It's not clear to me if there are still any issues people have hit using Polka with SvelteKit? As far as I know, all issues have been addressed. If you're still hitting some issue, and there are no issues that are currently open, please open a new issue |
I'd like to express my appreciation for fixing this. I've been stumbling into the issue for weeks and was out of my league for addressing it properly. |
Describe the bug
There is a very serious denial of service security vulnerability in the latest adapter-node, where a simple request with the path set to
//
brings the entire web server down.Reproduction
git clone git@github.com:lovasoa/sanipasse.git cd sanipasse git checkout 5ea330f npm start
then
Logs
System Info
Severity
blocking all usage of SvelteKit
Additional Information
No response
The text was updated successfully, but these errors were encountered: