[ 
https://issues.apache.org/jira/browse/CB-10590?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15144541#comment-15144541
 ] 

Patrick Mueller commented on CB-10590:
--------------------------------------

Thanks for the report!

While I don't have time to work on this now, I'm willing to take a PR/patch.

Patcher may want to look at adding qs/connect - the affected packages - 
directly as top-level packages, which express would then pick up (maybe, if 
allowed for in it's package deps semvers).  May be easier at upgrading express, 
which is currently at 2.5 - not sure how easy upgrading to something more 
modern would be.

> Known security vulnerabilities in dependencies of current version of express: 
> [email protected] and [email protected]
> ------------------------------------------------------------------------------------------------------
>
>                 Key: CB-10590
>                 URL: https://issues.apache.org/jira/browse/CB-10590
>             Project: Apache Cordova
>          Issue Type: Bug
>          Components: weinre
>            Reporter: Spencer A Claxton
>            Assignee: Patrick Mueller
>
> There are known security vulnerabilities in dependencies of current version 
> of express: [email protected] and [email protected]. See 
> https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking and 
> https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting
>  for more detail. Can we bump express so that these vulnerabilities go away?



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to