-
-
Notifications
You must be signed in to change notification settings - Fork 9.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: The latest version depends on the highly vulnerable ip
package
#26014
Comments
This comment was marked as spam.
This comment was marked as spam.
1 similar comment
This comment was marked as spam.
This comment was marked as spam.
For people searching by CVE number, it is: CVE-2023-42282 |
Just to set some context for the The affected @fyodorio Please feel free to create a PR with the quick fix :) |
This comment was marked as spam.
This comment was marked as spam.
For those looking for inspiration, |
@valentinpalkovic which branch should I target the fix PR to? Hadn't found any rules/strategies on that. As I can see, most of the PRs are targeted to |
Hey @fyodorio. I guess into the latest-release. |
Correct! |
@valentinpalkovic made the suggestion via #26025, please review, any feedback is welcome, as I'm a first-time contributor here. |
This comment was marked as spam.
This comment was marked as spam.
Please use the 👍 emoji reaction on the initial issue message to upvote the issue, otherwise all core maintainers and participants get notified every time someone posts a „+1“ message, which additionally adds a lot of noise to the thread. |
is the plan to add this to 8.0 or will there be the possibility of a 7.X security patch when a solution is chosen 😊 |
I definitely plan to patch this back to 7.6.x! |
I'm replacing |
Seems to be fixed with |
Heads up: The 7.6.17 release contains the fix. |
@valentinpalkovic Thanks it's working fine! |
Unfortunately the vulnerabilty was not fixed completely in ip:2.0.1 and the new CVE-2024-29415 is So reopening this thread and switching to a replacement for the ip package would probably be the way to go. |
#26073 seems the best way to fix the problem. Could be reopened too ? |
That would be great. Or use https://www.npmjs.com/package/address as an alternative solution? CVE-2023-42282 is annoying and not fixed in |
Describe the bug
EDIT: New vulnerability is described here: CVE-2024-29415
The vulnerability is described here: GHSA-78xj-cgh5-2h22.
As far as I can see now, the
ip
package is used only ones in thecore-server
package here — https://github.com/storybookjs/storybook/blob/ece1fb269cc44f43a5384f986a2b9f48613b0095/code/lib/core-server/src/utils/server-address.ts#L13C1-L13C80This can easily be swapped with some other package, like for instance https://www.npmjs.com/package/ip-address, the way
socks
' lib maintainer did here — https://github.com/JoshGlazebrook/socks/pull/94/files.WDYT guys? Is it a good candidate for a quick fix? I could participate if necessary with the PR, for sure.
To Reproduce
Install any storybook flavour via
npm
(most of them depend on the vulnerable package throughcore-server
)System
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: