Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: revert breaking change in results creation #2591

Merged
merged 7 commits into from
Apr 17, 2024

Conversation

wellwelwel
Copy link
Collaborator

@wellwelwel wellwelwel commented Apr 12, 2024

The previous solution (#2574) aimed to create a clean object, but it caused a major change.

Instead, I just grouped the object's private properties:

const privateObjectProps = new Set([
  '__defineGetter__',
  '__defineSetter__',
  '__lookupGetter__',
  '__lookupSetter__',
  '__proto__',
]);

Then, it will perform a simple validation to ensure that the fields[i].name is safe:

if (helpers.privateObjectProps.has(fields[i].name)) {
  throw new Error(
    `The field name (${fieldName}) can't be the same as an object's private property.`,
  );
}

By this way, it's possible to:

  • use the native methods available from an object
  • deep compare results with an expected variable
  • test the vulnerability without use a query for that
  • If an user, for some reason, wants to create or customize a prototype after the query has been finished, they can

Basically, as it should be for a patch/minor bump 🙋🏻‍♂️

@wellwelwel wellwelwel linked an issue Apr 12, 2024 that may be closed by this pull request
Copy link

codecov bot commented Apr 12, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 90.32%. Comparing base (6dccf55) to head (a866100).
Report is 2 commits behind head on master.

Additional details and impacted files
@@           Coverage Diff           @@
##           master    #2591   +/-   ##
=======================================
  Coverage   90.32%   90.32%           
=======================================
  Files          71       71           
  Lines       15717    15725    +8     
  Branches     1334     1339    +5     
=======================================
+ Hits        14196    14204    +8     
  Misses       1521     1521           
Flag Coverage Δ
compression-0 90.32% <100.00%> (+<0.01%) ⬆️
compression-1 90.32% <100.00%> (+<0.01%) ⬆️
tls-0 89.85% <100.00%> (+<0.01%) ⬆️
tls-1 90.14% <100.00%> (+<0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@wellwelwel wellwelwel marked this pull request as ready for review April 12, 2024 18:42
@sidorares
Copy link
Owner

Let's run some benchmarks before merging

@wellwelwel wellwelwel marked this pull request as draft April 13, 2024 02:58
@wellwelwel wellwelwel marked this pull request as ready for review April 13, 2024 05:41
@wellwelwel
Copy link
Collaborator Author

wellwelwel commented Apr 13, 2024

@sidorares, I rewrote the logic and description of this PR.

Could you check again? 🙋🏻‍♂️

@wellwelwel
Copy link
Collaborator Author

wellwelwel commented Apr 15, 2024

Using Set and has instead of Array and includes, due to:

Basic benchmark:

const arrayIncludes = (field) => {
  console.time('Array.includes');

  const privateObjectProps = [
    '__defineGetter__',
    '__defineSetter__',
    '__lookupGetter__',
    '__lookupSetter__',
    '__proto__',
  ];

  for (let i = 0; i < 1000000; i++) privateObjectProps.includes(field);

  console.timeEnd('Array.includes');
};

const setHas = (field) => {
  console.time('Set.has');

  const privateObjectProps = new Set([
    '__defineGetter__',
    '__defineSetter__',
    '__lookupGetter__',
    '__lookupSetter__',
    '__proto__',
  ]);

  for (let i = 0; i < 1000000; i++) privateObjectProps.has(field);

  console.timeEnd('Set.has');
};

for (let i = 0; i < 5; i++) arrayIncludes('field');
for (let i = 0; i < 5; i++) setHas('field');

Results:

Array.includes: 1.869ms
Array.includes: 0.621ms
Array.includes: 0.644ms
Array.includes: 0.658ms
Array.includes: 0.677ms
Set.has: 1.275ms
Set.has: 0.572ms
Set.has: 0.599ms
Set.has: 0.619ms
Set.has: 0.553ms

Compatibility:

Set: Node.js 0.12.18.

MrSwitch referenced this pull request Apr 15, 2024
…ation (#2572)

Fixes a potential RCE attack vulnerability reported by Vsevolod Kokorin (Slonser) of Solidlab
@wellwelwel
Copy link
Collaborator Author

Bringing a comment here: 74abf9e#r140992502 🤝

@wellwelwel
Copy link
Collaborator Author

wellwelwel commented Apr 17, 2024

As suggested by @sidorares:

Instead of checking the field name manually, we have some alternatives:

  • Refactor the results object to a mapped object
  • Keep it as Object.create(null) by adding a config option to use a standard object for results (not sure about bump a major version for this)

Although the issue #2585 doesn't have that many interactions, I think it's important to consider the users who don't participate directly 🙋🏻‍♂️

Also, if we consider the current solution, it's possible to return an empty object instead of throwing an error, as in mysqljs/mysql.

@wellwelwel wellwelwel removed the request for review from sidorares April 17, 2024 09:44
@wellwelwel
Copy link
Collaborator Author

wellwelwel commented Apr 17, 2024

Merging this.

For a major release, I recommend reverting this PR and include a safer approach in docs, such as:

Object.hasOwn(row, 'column');

https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Object/hasOwnProperty#objects_created_with_object.createnull

@wellwelwel wellwelwel merged commit f7c60d0 into sidorares:master Apr 17, 2024
64 checks passed
@ert78gb
Copy link

ert78gb commented Apr 17, 2024

thank you so much for the solution

Vylpes pushed a commit to Vylpes/Droplet that referenced this pull request May 28, 2024
This PR contains the following updates:

| Package | Type | Update | Change |
|---|---|---|---|
| [mysql2](https://sidorares.github.io/node-mysql2/docs) ([source](https://github.com/sidorares/node-mysql2)) | dependencies | patch | [`3.9.3` -> `3.9.7`](https://renovatebot.com/diffs/npm/mysql2/3.9.3/3.9.7) |

---

### Release Notes

<details>
<summary>sidorares/node-mysql2 (mysql2)</summary>

### [`v3.9.7`](https://github.com/sidorares/node-mysql2/blob/HEAD/Changelog.md#397-2024-04-21)

[Compare Source](sidorares/node-mysql2@v3.9.6...v3.9.7)

##### Bug Fixes

-   **security:** sanitize timezone parameter value to prevent code injection ([#&#8203;2608](sidorares/node-mysql2#2608)) ([7d4b098](sidorares/node-mysql2@7d4b098))

### [`v3.9.6`](https://github.com/sidorares/node-mysql2/blob/HEAD/Changelog.md#396-2024-04-18)

[Compare Source](sidorares/node-mysql2@v3.9.5...v3.9.6)

##### Bug Fixes

-   binary parser sometimes reads out of packet bounds when results contain null and typecast is false ([#&#8203;2601](sidorares/node-mysql2#2601)) ([705835d](sidorares/node-mysql2@705835d))

### [`v3.9.5`](https://github.com/sidorares/node-mysql2/blob/HEAD/Changelog.md#395-2024-04-17)

[Compare Source](sidorares/node-mysql2@v3.9.4...v3.9.5)

##### Bug Fixes

-   revert breaking change in results creation ([#&#8203;2591](sidorares/node-mysql2#2591)) ([f7c60d0](sidorares/node-mysql2@f7c60d0))

### [`v3.9.4`](https://github.com/sidorares/node-mysql2/blob/HEAD/Changelog.md#394-2024-04-09)

[Compare Source](sidorares/node-mysql2@v3.9.3...v3.9.4)

##### Bug Fixes

-   **docs:** improve the contribution guidelines ([#&#8203;2552](sidorares/node-mysql2#2552)) ([8a818ce](sidorares/node-mysql2@8a818ce))
-   **security:** improve results object creation ([#&#8203;2574](sidorares/node-mysql2#2574)) ([4a964a3](sidorares/node-mysql2@4a964a3))
-   **security:** improve supportBigNumbers and bigNumberStrings sanitization ([#&#8203;2572](sidorares/node-mysql2#2572)) ([74abf9e](sidorares/node-mysql2@74abf9e))

</details>

---

### Configuration

📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNy4wLjAiLCJ1cGRhdGVkSW5WZXIiOiIzNy4wLjAiLCJ0YXJnZXRCcmFuY2giOiJkZXZlbG9wIn0=-->

Reviewed-on: https://git.vylpes.xyz/RabbitLabs/Droplet/pulls/304
Co-authored-by: Renovate Bot <renovate@vylpes.com>
Co-committed-by: Renovate Bot <renovate@vylpes.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Release 3.9.4 breaks code that depended on .hasOwnProperty()
3 participants