-
-
Notifications
You must be signed in to change notification settings - Fork 9.4k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[Bug]: The latest version depends on the highly vulnerable ip
package
#26014
Comments
This comment was marked as spam.
This comment was marked as spam.
1 similar comment
This comment was marked as spam.
This comment was marked as spam.
For people searching by CVE number, it is: CVE-2023-42282 |
Just to set some context for the The affected @fyodorio Please feel free to create a PR with the quick fix :) |
This comment was marked as spam.
This comment was marked as spam.
For those looking for inspiration, |
@valentinpalkovic which branch should I target the fix PR to? Hadn't found any rules/strategies on that. As I can see, most of the PRs are targeted to |
Hey @fyodorio. I guess into the latest-release. |
Correct! |
@valentinpalkovic made the suggestion via #26025, please review, any feedback is welcome, as I'm a first-time contributor here. |
This comment was marked as spam.
This comment was marked as spam.
Please use the 👍 emoji reaction on the initial issue message to upvote the issue, otherwise all core maintainers and participants get notified every time someone posts a „+1“ message, which additionally adds a lot of noise to the thread. |
is the plan to add this to 8.0 or will there be the possibility of a 7.X security patch when a solution is chosen 😊 |
I definitely plan to patch this back to 7.6.x! |
I'm replacing |
Seems to be fixed with |
Heads up: The 7.6.17 release contains the fix. |
@valentinpalkovic Thanks it's working fine! |
Unfortunately the vulnerabilty was not fixed completely in ip:2.0.1 and the new CVE-2024-29415 is So reopening this thread and switching to a replacement for the ip package would probably be the way to go. |
#26073 seems the best way to fix the problem. Could be reopened too ? |
That would be great. Or use https://www.npmjs.com/package/address as an alternative solution? CVE-2023-42282 is annoying and not fixed in |
Describe the bug
EDIT: New vulnerability is described here: CVE-2024-29415
The vulnerability is described here: GHSA-78xj-cgh5-2h22.
As far as I can see now, the
ip
package is used only ones in thecore-server
package here — https://github.com/storybookjs/storybook/blob/ece1fb269cc44f43a5384f986a2b9f48613b0095/code/lib/core-server/src/utils/server-address.ts#L13C1-L13C80This can easily be swapped with some other package, like for instance https://www.npmjs.com/package/ip-address, the way
socks
' lib maintainer did here — https://github.com/JoshGlazebrook/socks/pull/94/files.WDYT guys? Is it a good candidate for a quick fix? I could participate if necessary with the PR, for sure.
To Reproduce
Install any storybook flavour via
npm
(most of them depend on the vulnerable package throughcore-server
)System
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: