Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

potential security vulnerability when bundling via an outdated version of static-eval@0.2.4 etc. #2386

Closed
alhugot opened this issue Feb 20, 2018 · 3 comments

Comments

@alhugot
Copy link

alhugot commented Feb 20, 2018

Hi,
First, this is a great lib!
Second this is perhaps not the place to report it, please feel free to close the issue, but:

There is a quite complex dependency chain on static-eval in the package.json which is affected by this security vulnerability:
https://nodesecurity.io/advisories/548

plotly.js@1.34.0 › ndarray-homography@1.0.0 › ndarray-warp@1.0.1 › cwise@1.0.10 › static-module@1.5.0 › static-eval@0.2.4
plotly.js@1.34.0 › gl-plot3d@1.5.5 › gl-select-static@2.0.2 › cwise@1.0.10 › static-module@1.5.0 › static-eval@0.2.4
plotly.js@1.34.0 › gl-plot2d@1.3.1 › gl-select-static@2.0.2 › cwise@1.0.10 › static-module@1.5.0 › static-eval@0.2.4
plotly.js@1.34.0 › ndarray-fill@1.0.2 › cwise@1.0.10 › static-module@1.5.0 › static-eval@0.2.4
plotly.js@1.34.0 › gl-plot3d@1.5.5 › gl-spikes3d@1.0.6 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-plot3d@1.5.5 › gl-axes3d@1.2.7 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-plot3d@1.5.5 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-plot2d@1.3.1 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › regl-line2d@2.1.5 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › regl-scatter2d@2.1.17 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-scatter3d@1.0.11 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-surface3d@1.3.4 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-mesh3d@1.3.2 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-select-box@1.0.2 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-pointcloud2d@1.0.1 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-error3d@1.0.7 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-line3d@1.1.2 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-heatmap2d@1.0.4 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › gl-contour2d@1.1.4 › glslify@6.1.0 › static-eval@1.1.1
plotly.js@1.34.0 › glslify@6.1.0 › static-eval@1.1.1

There is already an issue entered for glslify at glslify/glslify#106
We would then need to move up in the dependency chain to the other components

Would also be good to have a security badge with:

snyk: https://github.com/snyk/snyk#badge
or
nsp: see https://github.com/dwyl/repo-badges

Thx
Alex

@etpinard
Copy link
Contributor

Thanks for the headsup!

I think it's important to stress that this potential security vulnerability only affects users that bundle plotly.js source files as glslify and cwise are only used while building plotly.js.

So, folks that use the dist/ or CDN bundles are not affected by this security bug.

@etpinard etpinard changed the title potential security vulnerability via an outdated version of static-eval@0.2.4 etc. potential security vulnerability when bundling via an outdated version of static-eval@0.2.4 etc. Feb 20, 2018
@etpinard etpinard mentioned this issue Feb 21, 2018
1 task
@etpinard
Copy link
Contributor

After 48e1124, we have:

image

So fixing scijs/cwise#19 should do it.

@k-sai-kiranmayee
Copy link

Hello,
Sorry but even after this #2386 (comment), I'm still facing a few vulnerabilities like :(
image
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants