-
Notifications
You must be signed in to change notification settings - Fork 7
Vulnerable Regular Expression #4
Comments
@cristianstaicu Yeah I noticed that too , as Snyk warns me about them vulnerabilities 😄 @get will be there any patches ?! |
text quoted from snyk vuln page : Link |
It's also worth noting that anyone that uses snyk / nsp & socket.io-client has broken client builds |
@d3viant0ne WOW , didn't expect that coming, Why's that? |
If you run the nsp or snyk checks in a CI run as a part of your validations, you get a non zero exit code, thus broken as |
Any plans to fix this? |
Anyone have an update on this anyone? Need a fix soon since some packages we use are using this and is out of our control. Our company's security group is needing this fixed. I am willing to help out as well and or try to fix this. |
Is there a reason you can't just replace line 20 with I want to issue an MR, but if you have compatability concerns then it's not as simple I suppose. |
Is there a fix for this? |
If you're coming in here from an audit log/warning: this package looks to be essentially unmaintained, and in any case your packages, and their dependencies, should be using You might need to hunt through your |
@cristianstaicu you seem the most familiar with this. Would you (or anyone else) be willing to submit a PR with a patch and or fork the repo with a patch if this repo isn't maintained? |
In my case I did: Which outputted:
And fixed using: |
This fixes remaining vulnerabilities raised by `npm audit`. Follow-up to badges#2258. Related issues from dependencies: - camp upgrade: espadrine/sc#64 - socket.io vulnerability: galkn/parsejson#4
This fixes remaining vulnerabilities raised by `npm audit`. Follow-up to badges#2258. Related issues from dependencies: - camp upgrade: espadrine/sc#64 - socket.io vulnerability: galkn/parsejson#4
This fixes remaining vulnerabilities raised by `npm audit`. Follow-up to #2258. Related issues from dependencies: - camp upgrade: espadrine/sc#64 - socket.io vulnerability: galkn/parsejson#4
I had this problem - for future visitors: |
This is a CVE with a |
I am getting a |
Hey everyone, as mentioned above this package looks like it's clearly unmaintained. I recieved this secuirty warning as a knock-on affect of another unmaintained package. Was able to track down the root cause via |
The following regular expression used in parsing the JSON file is vulnerable to ReDoS:
/\s+$/
The slowdown is moderately low: for 50.000 characters around 2 seconds matching time. However, I would still suggest one of the following:
If needed, I can provide an actual example showing the slowdown.
The text was updated successfully, but these errors were encountered: