[
https://issues.apache.org/jira/browse/FLINK-36716?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Alexander Fedulov resolved FLINK-36716.
---------------------------------------
Resolution: Fixed
> Address vulnerabilities in Flink UI
> -----------------------------------
>
> Key: FLINK-36716
> URL: https://issues.apache.org/jira/browse/FLINK-36716
> Project: Flink
> Issue Type: Improvement
> Components: Runtime / Web Frontend
> Affects Versions: 2.0.0, 1.19.0, 1.20.0
> Reporter: Mehdi
> Assignee: Mehdi
> Priority: Major
> Fix For: 2.0.0, 1.19.2, 1.20.1
>
>
> When running `npm audit` we get 36 vulnerabilities (1 low, 15 moderate, 17
> high, 3 critical) we should address any current, open vulnerabilities.
> These critical vulnerabilities gone by raising the version of angular and we
> do need also to raise node version, so there is two sub tasks for this ticket
> Result of the npm audit:
> {code:java}
> npm audit report@adobe/css-tools <=4.3.1
> Severity: moderate
> @adobe/css-tools Regular Expression Denial of Service (ReDOS) while Parsing
> CSS - https://github.com/advisories/GHSA-hpx4-r86g-5jrg
> @adobe/css-tools Improper Input Validation and Inefficient Regular Expression
> Complexity - https://github.com/advisories/GHSA-prr3-c3m5-p7q2
> fix available via `npm audit fix`
> node_modules/@adobe/css-tools@babel/traverse <7.23.2
> Severity: critical
> Babel vulnerable to arbitrary code execution when compiling specifically
> crafted malicious code - https://github.com/advisories/GHSA-67hx-6x53-jw92
> fix available via `npm audit fix`
> node_modules/@babel/traversebody-parser <1.20.3
> Severity: high
> body-parser vulnerable to denial of service when url encoding is enabled -
> https://github.com/advisories/GHSA-qwcr-r2fm-qrc7
> fix available via `npm audit fix`
> node_modules/body-parser
> express <=4.21.0 || 5.0.0-alpha.1 - 5.0.0
> Depends on vulnerable versions of body-parser
> Depends on vulnerable versions of cookie
> Depends on vulnerable versions of path-to-regexp
> Depends on vulnerable versions of send
> Depends on vulnerable versions of serve-static
> node_modules/expressbraces <3.0.3
> Severity: high
> Uncontrolled resource consumption in braces -
> https://github.com/advisories/GHSA-grv7-fg5c-xmjg
> fix available via `npm audit fix`
> node_modules/bracescookie <0.7.0
> cookie accepts cookie name, path, and domain with out of bounds characters -
> https://github.com/advisories/GHSA-pxg6-pf52-xh8x
> fix available via `npm audit fix`
> node_modules/cookie
> node_modules/express/node_modules/cookie
> engine.io 0.7.8 - 0.7.9 || 1.8.0 - 6.6.1
> Depends on vulnerable versions of cookie
> Depends on vulnerable versions of ws
> node_modules/engine.io
> socket.io 1.6.0 - 4.7.5
> Depends on vulnerable versions of engine.io
> node_modules/socket.iod3-color <3.1.0
> Severity: high
> d3-color vulnerable to ReDoS -
> https://github.com/advisories/GHSA-36jr-mh4h-2g58
> fix available via `npm audit fix`
> node_modules/d3-interpolate/node_modules/d3-color
> d3-interpolate 0.1.3 - 2.0.1
> Depends on vulnerable versions of d3-color
> node_modules/d3-interpolate
> @antv/g-base <=0.5.11
> Depends on vulnerable versions of d3-interpolate
> node_modules/@antv/g-basefollow-redirects <=1.15.5
> Severity: moderate
> Follow Redirects improperly handles URLs in the url.parse() function -
> https://github.com/advisories/GHSA-jchw-25xp-jwwc
> follow-redirects' Proxy-Authorization header kept across hosts -
> https://github.com/advisories/GHSA-cxjh-pqwp-8mfp
> fix available via `npm audit fix`
> node_modules/follow-redirectshttp-proxy-middleware <2.0.7
> Severity: high
> Denial of service in http-proxy-middleware -
> https://github.com/advisories/GHSA-c7qv-q95q-8v27
> fix available via `npm audit fix`
> node_modules/http-proxy-middlewareip *
> Severity: high
> NPM IP package incorrectly identifies some private IP addresses as public -
> https://github.com/advisories/GHSA-78xj-cgh5-2h22
> ip SSRF improper categorization in isPublic -
> https://github.com/advisories/GHSA-2p57-rm9w-gvfp
> fix available via `npm audit fix`
> node_modules/iploader-utils 3.0.0 - 3.2.0
> Severity: high
> loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS)
> via url variable - https://github.com/advisories/GHSA-3rfm-jhwj-7488
> loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) -
> https://github.com/advisories/GHSA-hhq3-ff78-jv3g
> fix available via `npm audit fix`
> node_modules/loader-utils
> @angular-devkit/build-angular *
> Depends on vulnerable versions of loader-utils
> Depends on vulnerable versions of postcss
> Depends on vulnerable versions of protractor
> Depends on vulnerable versions of semver
> Depends on vulnerable versions of webpack
> Depends on vulnerable versions of webpack-dev-middleware
> node_modules/@angular-devkit/build-angularmicromatch <4.0.8
> Severity: moderate
> Regular Expression Denial of Service (ReDoS) in micromatch -
> https://github.com/advisories/GHSA-952p-6rrq-rcjv
> fix available via `npm audit fix`
> node_modules/micromatchpath-to-regexp <0.1.10
> Severity: high
> path-to-regexp outputs backtracking regular expressions -
> https://github.com/advisories/GHSA-9wv6-86v2-598j
> fix available via `npm audit fix`
> node_modules/path-to-regexppostcss <8.4.31
> Severity: moderate
> PostCSS line return parsing error -
> https://github.com/advisories/GHSA-7fh5-64p2-3v2j
> fix available via `npm audit fix`
> node_modules/postcssrequest *
> Severity: moderate
> Server-Side Request Forgery in Request -
> https://github.com/advisories/GHSA-p8p7-x288-28g6
> Depends on vulnerable versions of tough-cookie
> fix available via `npm audit fix --force`
> Will install [email protected], which is a breaking change
> node_modules/request
> webdriver-manager *
> Depends on vulnerable versions of request
> Depends on vulnerable versions of xml2js
> node_modules/webdriver-manager
> protractor >=1.3.0
> Depends on vulnerable versions of selenium-webdriver
> Depends on vulnerable versions of webdriver-js-extender
> Depends on vulnerable versions of webdriver-manager
> node_modules/protractorsemver <=5.7.1 || 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
> Severity: high
> semver vulnerable to Regular Expression Denial of Service -
> https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
> semver vulnerable to Regular Expression Denial of Service -
> https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
> semver vulnerable to Regular Expression Denial of Service -
> https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
> fix available via `npm audit fix`
> node_modules/@angular-devkit/build-angular/node_modules/semver
> node_modules/@angular/cli/node_modules/semver
> node_modules/@babel/core/node_modules/semver
> node_modules/@babel/helper-compilation-targets/node_modules/semver
> node_modules/@babel/helper-define-polyfill-provider/node_modules/semver
> node_modules/@babel/plugin-transform-runtime/node_modules/semver
> node_modules/@babel/preset-env/node_modules/semver
> node_modules/babel-plugin-polyfill-corejs2/node_modules/semver
> node_modules/istanbul-lib-instrument/node_modules/semver
> node_modules/less/node_modules/semver
> node_modules/make-dir/node_modules/semver
> node_modules/read-pkg/node_modules/semver
> node_modules/semver
> node_modules/webdriver-manager/node_modules/semver
> @angular/cli 9.1.0-next.0 - 14.2.11 || 15.0.0-next.0 - 15.2.8 ||
> 16.0.0-next.0 - 16.1.1
> Depends on vulnerable versions of semver
> node_modules/@angular/clisend <0.19.0
> Severity: moderate
> send vulnerable to template injection that can lead to XSS -
> https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
> fix available via `npm audit fix`
> node_modules/send
> serve-static <=1.16.0
> Depends on vulnerable versions of send
> node_modules/serve-static tar <6.2.1
> Severity: moderate
> Denial of service while parsing a tar file due to lack of folders count
> validation - https://github.com/advisories/GHSA-f5x3-32g6-xq36
> fix available via `npm audit fix`
> node_modules/tartough-cookie <4.1.3
> Severity: moderate
> tough-cookie Prototype Pollution vulnerability -
> https://github.com/advisories/GHSA-72xf-g2v4-qvf3
> fix available via `npm audit fix --force`
> Will install [email protected], which is a breaking change
> node_modules/tough-cookiewebpack 5.0.0-alpha.0 - 5.93.0
> Severity: critical
> Cross-realm object access in Webpack 5 -
> https://github.com/advisories/GHSA-hc6q-2mpp-qw7j
> Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads
> to XSS - https://github.com/advisories/GHSA-4vvj-4cpr-p986
> fix available via `npm audit fix`
> node_modules/webpackwebpack-dev-middleware <=5.3.3
> Severity: high
> Path traversal in webpack-dev-middleware -
> https://github.com/advisories/GHSA-wr3j-pwj9-hqq6
> fix available via `npm audit fix`
> node_modules/webpack-dev-middlewareword-wrap <1.2.4
> Severity: moderate
> word-wrap vulnerable to Regular Expression Denial of Service -
> https://github.com/advisories/GHSA-j8xg-fqg3-53r7
> fix available via `npm audit fix`
> node_modules/word-wrapws 8.0.0 - 8.17.0
> Severity: high
> ws affected by a DoS when handling a request with many HTTP headers -
> https://github.com/advisories/GHSA-3h5v-q93c-6h6q
> fix available via `npm audit fix`
> node_modules/ws
> socket.io-adapter 2.5.2 - 2.5.4
> Depends on vulnerable versions of ws
> node_modules/socket.io-adapterxml2js <0.5.0
> Severity: moderate
> xml2js is vulnerable to prototype pollution -
> https://github.com/advisories/GHSA-776f-qx25-q3cc
> fix available via `npm audit fix --force`
> Will install [email protected], which is a breaking change
> node_modules/xml2js
> selenium-webdriver 2.43.1 - 4.0.0-rc-2
> Depends on vulnerable versions of xml2js
> node_modules/selenium-webdriver
> webdriver-js-extender *
> Depends on vulnerable versions of selenium-webdriver
> node_modules/webdriver-js-extender36 vulnerabilities (1 low, 15 moderate,
> 17 high, 3 critical) {code}
> h4.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)