Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Vulnerability Issue [CVE-2020-24025] #3067

Closed
LiuJinghao opened this issue Feb 5, 2021 · 6 comments
Closed

Security Vulnerability Issue [CVE-2020-24025] #3067

LiuJinghao opened this issue Feb 5, 2021 · 6 comments

Comments

@LiuJinghao
Copy link

https://nvd.nist.gov/vuln/detail/CVE-2020-24025

Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.

#567 (comment)

Version 5.0.0 was released in October, but through reading the source code of 5.0.0, we found that this issue is still unresolved.

Is there a plan to fix this issue?

@zmariscal
Copy link

I noticed #3086 has been closed. Is there any plans to resolve this CVE or a documented workaround?

@saper
Copy link
Member

saper commented Apr 27, 2021

The workaround is to download or compile the binding.node file itself (https://github.com/sass/node-sass/blob/master/README.md#rebuilding-binaries) and provide that binary to your installations either via direct installation in the vendor subdirectory or by using the environment variables.

@xzyfer
Copy link
Contributor

xzyfer commented Apr 27, 2021 via email

@AWare
Copy link

AWare commented May 25, 2021

@zmariscal my sincere apologies for not following through. I found the process highly dispiriting, and the workaround we decided upon was to stop using node-sass and move to the dart implementation.

If you (or anyone else really) are willing to set up an https interceptor, and do the requested edge-case testing; then I'd be happy for you to take over the PR- it's otherwise fine.

@zmariscal
Copy link

@xzyfer is there any movement on this issue? I know @AWare was working on #3086. Should they open the PR back up?

@LiuJinghao
Copy link
Author

I noticed #3149 has been merged, and version 7.0.0 was released in November. It will set rejectUnauthorized to true by default In version 7.0.0.

v7.0.0 can fixed this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants