Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dependency vulnerability in stringstream v0.0.5 #38

Closed
spencern opened this issue May 30, 2018 · 4 comments
Closed

Dependency vulnerability in stringstream v0.0.5 #38

spencern opened this issue May 30, 2018 · 4 comments

Comments

@spencern
Copy link

spencern commented May 30, 2018

Issue

Snyk has flagged stringstream v0.0.5 as a security vulnerability.

Affected versions of this package are vulnerable to Uninitialized Memory Exposure. An attacker could extract sensitive data from uninitialized memory or to cause a DoS by passing in a large number, in setups where typed user input can be passed to the stream (e.g. from JSON).

https://snyk.io/vuln/npm:stringstream:20180511

Remediation

Upgrade stringstream to version 0.0.6 or higher.

It appears that this vulnerability is pulled in via request v2.83.0. request v2.86.0 and higher do not include this dependency.

@Shwetajain148
Copy link

Hi @spencern, Currently, I'm busy with some ongoing issues but certainly, I'll pick this up once I get some time.

Thanks for reporting.

@Shwetajain148
Copy link

Hi @spencern, So I looked at this issue and could see that the request is already at v2.87.0 which doesn't include the stringstream dependency. Please see the screenshot below-

npm list

From the comment here, I checked on nodejs v4.x(see above screenshot) still there is no stringstream dependency.

To confirm more, I also verified with NSP for any vulnerability but there was not any. See another screenshot below-

nsp

Can you please check once again or share more information so that I can reproduce?

@spencern
Copy link
Author

This vulnerability is no longer reported via snyk at this point either.
I think we can close. Thank you for checking into it.

@Shwetajain148
Copy link

Great @spencern.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants