-
-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade Growl to 1.10.2 #2930
Upgrade Growl to 1.10.2 #2930
Conversation
* Growl 1.9.2 is vulnerable to arbitrary code injection, and causes security warnings for Mocha users * Upgrade Growl to 1.10.2, and address issue mochajs#2791
@ScottFreeCode I just noticed that #2924 was opened and closed about this issue already. Let me know what I can do to help get this merged! |
If Growl has released a working version containing the security fix without loss of compatibility with any of the browsers and Node versions Mocha 3.x supports, then we should use that exact version. (Based on the dependencies all being exact versions as it is, I'm going to say that whichever version of Growl we use should be specified exactly, by the way.) However, if updating Growl at all requires loss of support for some Node versions and/or browsers, then we'll need to get a few pieces of info:
Then with that info the Mocha team would need to discuss which option we'd prefer:
To reiterate the very first point: all that is if we can't just pin a Growl version that fixes the vulnerability without losing support for any particular environment, which would be the obvious easy solution as long as such a version of Growl exists. |
Thanks for such a quick and detailed response! From digging around the history in growl, it appears that the vulnerable line in question was some of the earliest code committed. It doesn't look likely that there's a version we can pin that would allow us to sidestep the issue. It seems like the bulk of the compatibility issues are related to the (relatively little) ES6 that has been added since 1.9.2. I've opened an issue asking about whether that will continue to be the case moving forward. I don't have much input on whether growl belongs in the browser bundle, what the attack vectors actually are, or whether there's any demand for growl as part of Mocha in the first place, but I'd be happy to hear others chime in! |
Even just a version |
Updated my list of possible options with a "conditional require if feasible" option that came to mind this morning. By the way, if I forgot to say so before, thanks for the PR! Hopefully we'll be able to review this issue soon. |
Added a "peer dependency" option to the list of available solutions; it's similar to the "only |
thanks. we've worked this in to another set of PRs |
To resolve dependency on potentially vulnerable version of growl. See mochajs/mocha#2930
and causes security warnings for Mocha users