Navigation Menu

Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Request module to Avoid Security Vulnerability #506

Open
akras14 opened this issue Mar 28, 2016 · 10 comments
Open

Update Request module to Avoid Security Vulnerability #506

akras14 opened this issue Mar 28, 2016 · 10 comments

Comments

@akras14
Copy link
Contributor

akras14 commented Mar 28, 2016

nsp module points out vulnerability in hawk module that is being used by request module.

Looks like the hawk version has just been bumped up in the request module, but it has not release yet. Next release after v2.69.1 should have it, since the commit was already made: request/request@ebb2c3b

Just wanted to put it on your radar.

$: nsp check
(+) 1 vulnerabilities found
┌───────────────┬───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┐
│               │ Regular Expression Denial of Service                                                                                                                                              │
├───────────────┼───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Name          │ hawk                                                                                                                                                                              │
├───────────────┼───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Installed     │ 1.1.1                                                                                                                                                                             │
├───────────────┼───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Vulnerable    │ < 3.1.3  || >= 4.0.0 <4.1.1                                                                                                                                                       │
├───────────────┼───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Patched       │ >=3.1.3 < 4.0.0 || >=4.1.1                                                                                                                                                        │
├───────────────┼───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ Path          │ firebet@0.0.1 > pkgcloud@1.3.0 > request@2.40.0 > hawk@1.1.1                                                                                                                      │
├───────────────┼───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┤
│ More Info     │ https://nodesecurity.io/advisories/77                                                                                                                                             │
└───────────────┴───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┘
@CIPowell
Copy link

CIPowell commented Apr 6, 2016

please do fix this, we've seen the same advisory

@3rd-Eden
Copy link
Contributor

3rd-Eden commented Apr 6, 2016

Hawk isn't used by pkgcloud. Just because it's bundled by request doesn't make the whole module vulnerable.

If you actually look at the code base of request, you'll see that hawk is only used for hawk based authentication. Which is a encoding some rando invented and is not used by any of the cloud providers.

@kenperkins
Copy link
Member

I can probably look at bumping our dependencies none-the-less.

@CIPowell
Copy link

CIPowell commented Apr 6, 2016

Thanks @kenperkins

@akras14
Copy link
Contributor Author

akras14 commented Apr 6, 2016

As can be seen in the path for the report that I posted:

firebet@0.0.1 > pkgcloud@1.3.0 > request@2.40.0 > hawk@1.1.1

Hawk is used by request.

Looks like Request have been updated (since I've reported the issue) to bump up Hawk version so using request request@2.70.1 should fixed the issue.

@indexzero
Copy link
Member

The point that @3rd-Eden was making was that pkgcloud does not take advantage of the hawk features exposed by request, thus we are not actually vulenerable if I understand hawk correctly. Nonetheless I agree with @kenperkins we should bump versions.

@akras14
Copy link
Contributor Author

akras14 commented Apr 6, 2016

@indexzero Ah, I see. Thanks and good to know.

@kenperkins
Copy link
Member

FYI @akras14 I don't see request@2.70.1 published yet?

@akras14
Copy link
Contributor Author

akras14 commented Apr 6, 2016

@kenperkins Thanks, my bad. I've double checked and 2.70.0 is published and has the Hawk version bump.

@mikewli
Copy link

mikewli commented Apr 17, 2017

Hi,

Just did another NSP scan. pkgcloud@1.4.0 uses request@2.40.0 which has another vulnerability listed in addition to the one aforementioned:
https://nodesecurity.io/advisories/309 (Remote Memory Exposure)

I'm currently ignoring https://nodesecurity.io/advisories/77 as well, since I have a CI build system but that's obviously not ideal. Would be great if you guys could knock out 2 of them by updating the request dependency version.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants