-
Notifications
You must be signed in to change notification settings - Fork 1.9k
Description
The latest version of sails has a variety of issues listed under NPM audit.
- There are 4 deprecation warnings, 1 of which references a memory leak issue.
- There are 7 vulnerabilities listed, 2 being moderate and 5 being high.
The 7 vulnerabilities come from 3 out-of-date packages, 1 of which is introduced via Express.
For context, I found this by creating a new project and running "npm init" followed by "npm install sails", to ensure no other packages were contaminating the results. To make things easier, the commands I ran and their output are specified at the bottom of this ticket.
I'm not using Grunt or any of the database adapters, so I've listed those as non-applicable below.
Node version: v18.14.0
Sails version (sails): 1.5.11
ORM hook version (sails-hook-orm): N/A ?
Sockets hook version (sails-hook-sockets): N/A
Organics hook version (sails-hook-organics): N/A
Grunt hook version (sails-hook-grunt): N/A
Uploads hook version (sails-hook-uploads): N/A
DB adapter & version (e.g. [email protected]): N/A
Skipper adapter & version (e.g. [email protected]): N/A
D:\temp>mkdir sailsTest
D:\temp>cd sailsTest
D:\temp\sailsTest>npm init
This utility will walk you through creating a package.json file.
It only covers the most common items, and tries to guess sensible defaults.
See `npm help init` for definitive documentation on these fields
and exactly what they do.
Use `npm install <pkg>` afterwards to install a package and
save it as a dependency in the package.json file.
Press ^C at any time to quit.
package name: (sailstest)
version: (1.0.0)
description:
entry point: (index.js)
test command:
git repository:
keywords:
author:
license: (ISC)
About to write to D:\temp\sailsTest\package.json:
{
"name": "sailstest",
"version": "1.0.0",
"description": "",
"main": "index.js",
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1"
},
"author": "",
"license": "ISC"
}
Is this OK? (yes)
D:\temp\sailsTest>npm install sails
npm WARN deprecated [email protected]: This module is not supported, and leaks memory. Do not use it. Check out lru-cache if you want a good and tested way to coalesce async requests by a key value, which is much more comprehensive and powerful.
npm WARN deprecated [email protected]: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated [email protected]: Glob versions prior to v9 are no longer supported
npm WARN deprecated [email protected]: Glob versions prior to v9 are no longer supported
added 248 packages, and audited 249 packages in 20s
17 packages are looking for funding
run `npm fund` for details
7 vulnerabilities (2 moderate, 5 high)
To address all issues, run:
npm audit fix
Run `npm audit` for details.
D:\temp\sailsTest>npm audit
# npm audit report
body-parser <1.20.3
Severity: high
body-parser vulnerable to denial of service when url encoding is enabled - https://github.com/advisories/GHSA-qwcr-r2fm-qrc7
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/body-parser
express <=4.19.2 || 5.0.0-alpha.1 - 5.0.0-beta.3
Depends on vulnerable versions of body-parser
Depends on vulnerable versions of path-to-regexp
Depends on vulnerable versions of send
Depends on vulnerable versions of serve-static
node_modules/express
sails *
Depends on vulnerable versions of express
Depends on vulnerable versions of path-to-regexp
Depends on vulnerable versions of router
Depends on vulnerable versions of serve-static
node_modules/sails
path-to-regexp <=0.1.9 || 0.2.0 - 1.8.0
Severity: high
path-to-regexp outputs backtracking regular expressions - https://github.com/advisories/GHSA-9wv6-86v2-598j
path-to-regexp outputs backtracking regular expressions - https://github.com/advisories/GHSA-9wv6-86v2-598j
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/express/node_modules/path-to-regexp
node_modules/path-to-regexp
node_modules/router/node_modules/path-to-regexp
router 1.0.0-beta.1 - 2.0.0-beta.2
Depends on vulnerable versions of path-to-regexp
node_modules/router
send <0.19.0
Severity: moderate
send vulnerable to template injection that can lead to XSS - https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/send
node_modules/serve-static/node_modules/send
serve-static <=1.16.0
Depends on vulnerable versions of send
node_modules/express/node_modules/serve-static
node_modules/serve-static
7 vulnerabilities (2 moderate, 5 high)
To address all issues (including breaking changes), run:
npm audit fix --force
D:\temp\sailsTest>notepad.exe package.json
D:\temp\sailsTest>node --version
v18.14.0
D:\temp\sailsTest>