Skip to content

High Severity Vulnerability #29429

Answered by thibautsabot
rajeshK88 asked this question in Help
Sep 27, 2021 · 1 comments · 7 replies
Discussion options

You must be logged in to vote

Hello!

While you are absolutely right that there is a security vulnerability in the package, I think we should nuance its criticality.
ansi-regex is mostly used for for command-line tools, not in servers. One of chalk maintainer actually said :

The vulnerability itself is not major - unless you're allowing long AND unsanitized user input to hit the API directly, the vulnerability doesn't affect you.

To verify this, I used npm list ansi-regex on the canary branch of the Next.js repository.

Here are the results:

postcss-purgecss -> used within yargs -> terminal interface only.
@testing-library/react -> only in dev envs.
@types/jest -> only in dev envs.
@zeit/next-css-> used within chalk

Replies: 1 comment 7 replies

Comment options

You must be logged in to vote
7 replies
@thibautsabot
Comment options

@Izook
Comment options

@ijjk
Comment options

@thibautsabot
Comment options

@rajeshK88
Comment options

Answer selected by ijjk
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Help
Labels
None yet
5 participants