You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@cordova.apache.org by "Patrick Mueller (JIRA)" <ji...@apache.org> on 2016/02/12 13:56:18 UTC
[jira] [Commented] (CB-10590) Known security vulnerabilities in
dependencies of current version of express: qs@0.4.x and connect@1.x
[ https://issues.apache.org/jira/browse/CB-10590?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15144541#comment-15144541 ]
Patrick Mueller commented on CB-10590:
--------------------------------------
Thanks for the report!
While I don't have time to work on this now, I'm willing to take a PR/patch.
Patcher may want to look at adding qs/connect - the affected packages - directly as top-level packages, which express would then pick up (maybe, if allowed for in it's package deps semvers). May be easier at upgrading express, which is currently at 2.5 - not sure how easy upgrading to something more modern would be.
> Known security vulnerabilities in dependencies of current version of express: qs@0.4.x and connect@1.x
> ------------------------------------------------------------------------------------------------------
>
> Key: CB-10590
> URL: https://issues.apache.org/jira/browse/CB-10590
> Project: Apache Cordova
> Issue Type: Bug
> Components: weinre
> Reporter: Spencer A Claxton
> Assignee: Patrick Mueller
>
> There are known security vulnerabilities in dependencies of current version of express: qs@0.4.x and connect@1.x. See https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking and https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting for more detail. Can we bump express so that these vulnerabilities go away?
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)
---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscribe@cordova.apache.org
For additional commands, e-mail: issues-help@cordova.apache.org