-
-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerability in dependency growl 1.9.2 #2791
Comments
Is there a way we can tell Snyk that Growl 1.9.3 does not in fact exist, and that the commit they reference is only in a fork (so it is possible that in the future Growl 1.9.3 could be published before fixing this issue, thus rendering their instructions incorrect once 1.9.3 does exist)? If anybody wants to look at whether Mocha is actually at risk from this, I believe these would be the lines to examine: Lines 241 to 257 in 8a3cab0
|
Got same warning in Node Security Platform https://nodesecurity.io/advisories/146 |
See issue tj/node-growl#60 and PRs tj/node-growl#61 and tj/node-growl#62 |
Got same warning using retire.js |
Following-up on mochajs#2798 & mochajs#2791, update growl that is known to be vulnerable
* Growl 1.9.2 is vulnerable to arbitrary code injection, and causes security warnings for Mocha users * Upgrade Growl to 1.10.2, and address issue mochajs#2791
I am getting the same error and my tests in circleCI are not passing because of this "vulnerability" (+) 1 vulnerabilities found |
As a workaround, until a decision was made on #2930 and mocha being a dev dependency in almost all cases, you can resort to only check your production dependencies with |
@janvennemann thanks
|
fixed |
I have updated to 1.10.5 still have this issue. |
Hi,
I got a report that mocha includes growl 1.9.2 which is vulnerable to an arbitrary code injection.
https://snyk.io/vuln/npm%3Agrowl%3A20160721?utm_campaign=vuln_alert&utm_medium=email&utm_source=Vuln
This issue is closed in growl 1.9.3.
Thanks.
The text was updated successfully, but these errors were encountered: