[
https://issues.apache.org/jira/browse/CB-10590?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15144541#comment-15144541
]
Patrick Mueller commented on CB-10590:
--------------------------------------
Thanks for the report!
While I don't have time to work on this now, I'm willing to take a PR/patch.
Patcher may want to look at adding qs/connect - the affected packages -
directly as top-level packages, which express would then pick up (maybe, if
allowed for in it's package deps semvers). May be easier at upgrading express,
which is currently at 2.5 - not sure how easy upgrading to something more
modern would be.
> Known security vulnerabilities in dependencies of current version of express:
> [email protected] and [email protected]
> ------------------------------------------------------------------------------------------------------
>
> Key: CB-10590
> URL: https://issues.apache.org/jira/browse/CB-10590
> Project: Apache Cordova
> Issue Type: Bug
> Components: weinre
> Reporter: Spencer A Claxton
> Assignee: Patrick Mueller
>
> There are known security vulnerabilities in dependencies of current version
> of express: [email protected] and [email protected]. See
> https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking and
> https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting
> for more detail. Can we bump express so that these vulnerabilities go away?
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]