-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
connect-mongodb-session depends on vulnerable versions of archetype #113
Comments
+1 Also seeing this issue |
force fix doesn't fix it, cause it wants to downgrade you to version 2.2.0 changing archetype to use lodash instead of lodash.clonedeep and lodash.set would resolve the issue. |
actually here is a quickfix: npm install https://github.com/LaurentGoderre/archetype.git#fix-lodash_set-vuln |
Any chance this will be fixed? |
Can we get a fix for this? |
I just got an orange card during a code audit. Please handle this security point. |
Is there anything in the pipeline to get this issue fixed? This is popping up in all of our security approval requests. We will have to find alternatives if this doesn't get fixed soon enough. Can we increase the priority for this issue? |
Have you tried the fix mentioned above? That will fix the issue: npm install https://github.com/LaurentGoderre/archetype.git#fix-lodash_set-vuln |
I was looking for an official fix. Fortunately, there is a fix provided by So I could do something like this,
|
I just noticed this seems to have resolved itself on my end by automatically utilizing [email protected], so it doesn't look like we need to do anything special (unofficial or otherwise) to get around it now. |
Issue Description:
I'm encountering a vulnerability issue with my Node.js project that involves the
lodash.set
package. Despite attempting the suggested fix vianpm audit fix --force
and manually addressing the vulnerable packages, the issue persists.Problem:
The npm audit identifies a high severity vulnerability related to Prototype Pollution in
lodash.set
. However, the fix provided vianpm audit fix --force
does not resolve the vulnerability. Manually updating the affected packages also fails to mitigate the issue.Steps Taken:
npm audit fix --force
to apply the suggested fix.lodash.set
,archetype
, andconnect-mongodb-session
) to their latest versions.Audit Output:
The text was updated successfully, but these errors were encountered: