Mehdi created FLINK-36716:
-----------------------------
Summary: Address vulnerabilities in Flink UI
Key: FLINK-36716
URL: https://issues.apache.org/jira/browse/FLINK-36716
Project: Flink
Issue Type: Improvement
Components: Runtime / Web Frontend
Affects Versions: 1.20.0, 2.0.0
Reporter: Mehdi
When running `npm audit` we get 36 vulnerabilities (1 low, 15 moderate, 17
high, 3 critical) we should address any current, open vulnerabilities.
These critical vulnerabilities gone by raising the version of angular.
Result of the npm audit:
{code:java}
npm audit report@adobe/css-tools <=4.3.1
Severity: moderate
@adobe/css-tools Regular Expression Denial of Service (ReDOS) while Parsing CSS
- https://github.com/advisories/GHSA-hpx4-r86g-5jrg
@adobe/css-tools Improper Input Validation and Inefficient Regular Expression
Complexity - https://github.com/advisories/GHSA-prr3-c3m5-p7q2
fix available via `npm audit fix`
node_modules/@adobe/css-tools@babel/traverse <7.23.2
Severity: critical
Babel vulnerable to arbitrary code execution when compiling specifically
crafted malicious code - https://github.com/advisories/GHSA-67hx-6x53-jw92
fix available via `npm audit fix`
node_modules/@babel/traversebody-parser <1.20.3
Severity: high
body-parser vulnerable to denial of service when url encoding is enabled -
https://github.com/advisories/GHSA-qwcr-r2fm-qrc7
fix available via `npm audit fix`
node_modules/body-parser
express <=4.21.0 || 5.0.0-alpha.1 - 5.0.0
Depends on vulnerable versions of body-parser
Depends on vulnerable versions of cookie
Depends on vulnerable versions of path-to-regexp
Depends on vulnerable versions of send
Depends on vulnerable versions of serve-static
node_modules/expressbraces <3.0.3
Severity: high
Uncontrolled resource consumption in braces -
https://github.com/advisories/GHSA-grv7-fg5c-xmjg
fix available via `npm audit fix`
node_modules/bracescookie <0.7.0
cookie accepts cookie name, path, and domain with out of bounds characters -
https://github.com/advisories/GHSA-pxg6-pf52-xh8x
fix available via `npm audit fix`
node_modules/cookie
node_modules/express/node_modules/cookie
engine.io 0.7.8 - 0.7.9 || 1.8.0 - 6.6.1
Depends on vulnerable versions of cookie
Depends on vulnerable versions of ws
node_modules/engine.io
socket.io 1.6.0 - 4.7.5
Depends on vulnerable versions of engine.io
node_modules/socket.iod3-color <3.1.0
Severity: high
d3-color vulnerable to ReDoS - https://github.com/advisories/GHSA-36jr-mh4h-2g58
fix available via `npm audit fix`
node_modules/d3-interpolate/node_modules/d3-color
d3-interpolate 0.1.3 - 2.0.1
Depends on vulnerable versions of d3-color
node_modules/d3-interpolate
@antv/g-base <=0.5.11
Depends on vulnerable versions of d3-interpolate
node_modules/@antv/g-basefollow-redirects <=1.15.5
Severity: moderate
Follow Redirects improperly handles URLs in the url.parse() function -
https://github.com/advisories/GHSA-jchw-25xp-jwwc
follow-redirects' Proxy-Authorization header kept across hosts -
https://github.com/advisories/GHSA-cxjh-pqwp-8mfp
fix available via `npm audit fix`
node_modules/follow-redirectshttp-proxy-middleware <2.0.7
Severity: high
Denial of service in http-proxy-middleware -
https://github.com/advisories/GHSA-c7qv-q95q-8v27
fix available via `npm audit fix`
node_modules/http-proxy-middlewareip *
Severity: high
NPM IP package incorrectly identifies some private IP addresses as public -
https://github.com/advisories/GHSA-78xj-cgh5-2h22
ip SSRF improper categorization in isPublic -
https://github.com/advisories/GHSA-2p57-rm9w-gvfp
fix available via `npm audit fix`
node_modules/iploader-utils 3.0.0 - 3.2.0
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via
url variable - https://github.com/advisories/GHSA-3rfm-jhwj-7488
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) -
https://github.com/advisories/GHSA-hhq3-ff78-jv3g
fix available via `npm audit fix`
node_modules/loader-utils
@angular-devkit/build-angular *
Depends on vulnerable versions of loader-utils
Depends on vulnerable versions of postcss
Depends on vulnerable versions of protractor
Depends on vulnerable versions of semver
Depends on vulnerable versions of webpack
Depends on vulnerable versions of webpack-dev-middleware
node_modules/@angular-devkit/build-angularmicromatch <4.0.8
Severity: moderate
Regular Expression Denial of Service (ReDoS) in micromatch -
https://github.com/advisories/GHSA-952p-6rrq-rcjv
fix available via `npm audit fix`
node_modules/micromatchpath-to-regexp <0.1.10
Severity: high
path-to-regexp outputs backtracking regular expressions -
https://github.com/advisories/GHSA-9wv6-86v2-598j
fix available via `npm audit fix`
node_modules/path-to-regexppostcss <8.4.31
Severity: moderate
PostCSS line return parsing error -
https://github.com/advisories/GHSA-7fh5-64p2-3v2j
fix available via `npm audit fix`
node_modules/postcssrequest *
Severity: moderate
Server-Side Request Forgery in Request -
https://github.com/advisories/GHSA-p8p7-x288-28g6
Depends on vulnerable versions of tough-cookie
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/request
webdriver-manager *
Depends on vulnerable versions of request
Depends on vulnerable versions of xml2js
node_modules/webdriver-manager
protractor >=1.3.0
Depends on vulnerable versions of selenium-webdriver
Depends on vulnerable versions of webdriver-js-extender
Depends on vulnerable versions of webdriver-manager
node_modules/protractorsemver <=5.7.1 || 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
Severity: high
semver vulnerable to Regular Expression Denial of Service -
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
semver vulnerable to Regular Expression Denial of Service -
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
semver vulnerable to Regular Expression Denial of Service -
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
fix available via `npm audit fix`
node_modules/@angular-devkit/build-angular/node_modules/semver
node_modules/@angular/cli/node_modules/semver
node_modules/@babel/core/node_modules/semver
node_modules/@babel/helper-compilation-targets/node_modules/semver
node_modules/@babel/helper-define-polyfill-provider/node_modules/semver
node_modules/@babel/plugin-transform-runtime/node_modules/semver
node_modules/@babel/preset-env/node_modules/semver
node_modules/babel-plugin-polyfill-corejs2/node_modules/semver
node_modules/istanbul-lib-instrument/node_modules/semver
node_modules/less/node_modules/semver
node_modules/make-dir/node_modules/semver
node_modules/read-pkg/node_modules/semver
node_modules/semver
node_modules/webdriver-manager/node_modules/semver
@angular/cli 9.1.0-next.0 - 14.2.11 || 15.0.0-next.0 - 15.2.8 ||
16.0.0-next.0 - 16.1.1
Depends on vulnerable versions of semver
node_modules/@angular/clisend <0.19.0
Severity: moderate
send vulnerable to template injection that can lead to XSS -
https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
fix available via `npm audit fix`
node_modules/send
serve-static <=1.16.0
Depends on vulnerable versions of send
node_modules/serve-static tar <6.2.1
Severity: moderate
Denial of service while parsing a tar file due to lack of folders count
validation - https://github.com/advisories/GHSA-f5x3-32g6-xq36
fix available via `npm audit fix`
node_modules/tartough-cookie <4.1.3
Severity: moderate
tough-cookie Prototype Pollution vulnerability -
https://github.com/advisories/GHSA-72xf-g2v4-qvf3
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/tough-cookiewebpack 5.0.0-alpha.0 - 5.93.0
Severity: critical
Cross-realm object access in Webpack 5 -
https://github.com/advisories/GHSA-hc6q-2mpp-qw7j
Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads to
XSS - https://github.com/advisories/GHSA-4vvj-4cpr-p986
fix available via `npm audit fix`
node_modules/webpackwebpack-dev-middleware <=5.3.3
Severity: high
Path traversal in webpack-dev-middleware -
https://github.com/advisories/GHSA-wr3j-pwj9-hqq6
fix available via `npm audit fix`
node_modules/webpack-dev-middlewareword-wrap <1.2.4
Severity: moderate
word-wrap vulnerable to Regular Expression Denial of Service -
https://github.com/advisories/GHSA-j8xg-fqg3-53r7
fix available via `npm audit fix`
node_modules/word-wrapws 8.0.0 - 8.17.0
Severity: high
ws affected by a DoS when handling a request with many HTTP headers -
https://github.com/advisories/GHSA-3h5v-q93c-6h6q
fix available via `npm audit fix`
node_modules/ws
socket.io-adapter 2.5.2 - 2.5.4
Depends on vulnerable versions of ws
node_modules/socket.io-adapterxml2js <0.5.0
Severity: moderate
xml2js is vulnerable to prototype pollution -
https://github.com/advisories/GHSA-776f-qx25-q3cc
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/xml2js
selenium-webdriver 2.43.1 - 4.0.0-rc-2
Depends on vulnerable versions of xml2js
node_modules/selenium-webdriver
webdriver-js-extender *
Depends on vulnerable versions of selenium-webdriver
node_modules/webdriver-js-extender36 vulnerabilities (1 low, 15 moderate,
17 high, 3 critical) {code}
h4.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)