Mehdi created FLINK-36716:
-----------------------------

             Summary: Address vulnerabilities in Flink UI
                 Key: FLINK-36716
                 URL: https://issues.apache.org/jira/browse/FLINK-36716
             Project: Flink
          Issue Type: Improvement
          Components: Runtime / Web Frontend
    Affects Versions: 1.20.0, 2.0.0
            Reporter: Mehdi


When running `npm audit` we get 36 vulnerabilities (1 low, 15 moderate, 17 
high, 3 critical) we should address any current, open vulnerabilities.

These critical vulnerabilities gone by raising the version of angular.

Result of the npm audit:
{code:java}
npm audit report@adobe/css-tools  <=4.3.1
Severity: moderate
@adobe/css-tools Regular Expression Denial of Service (ReDOS) while Parsing CSS 
- https://github.com/advisories/GHSA-hpx4-r86g-5jrg
@adobe/css-tools Improper Input Validation and Inefficient Regular Expression 
Complexity - https://github.com/advisories/GHSA-prr3-c3m5-p7q2
fix available via `npm audit fix`
node_modules/@adobe/css-tools@babel/traverse  <7.23.2
Severity: critical
Babel vulnerable to arbitrary code execution when compiling specifically 
crafted malicious code - https://github.com/advisories/GHSA-67hx-6x53-jw92
fix available via `npm audit fix`
node_modules/@babel/traversebody-parser  <1.20.3
Severity: high
body-parser vulnerable to denial of service when url encoding is enabled - 
https://github.com/advisories/GHSA-qwcr-r2fm-qrc7
fix available via `npm audit fix`
node_modules/body-parser
  express  <=4.21.0 || 5.0.0-alpha.1 - 5.0.0
  Depends on vulnerable versions of body-parser
  Depends on vulnerable versions of cookie
  Depends on vulnerable versions of path-to-regexp
  Depends on vulnerable versions of send
  Depends on vulnerable versions of serve-static
  node_modules/expressbraces  <3.0.3
Severity: high
Uncontrolled resource consumption in braces - 
https://github.com/advisories/GHSA-grv7-fg5c-xmjg
fix available via `npm audit fix`
node_modules/bracescookie  <0.7.0
cookie accepts cookie name, path, and domain with out of bounds characters - 
https://github.com/advisories/GHSA-pxg6-pf52-xh8x
fix available via `npm audit fix`
node_modules/cookie
node_modules/express/node_modules/cookie
  engine.io  0.7.8 - 0.7.9 || 1.8.0 - 6.6.1
  Depends on vulnerable versions of cookie
  Depends on vulnerable versions of ws
  node_modules/engine.io
    socket.io  1.6.0 - 4.7.5
    Depends on vulnerable versions of engine.io
    node_modules/socket.iod3-color  <3.1.0
Severity: high
d3-color vulnerable to ReDoS - https://github.com/advisories/GHSA-36jr-mh4h-2g58
fix available via `npm audit fix`
node_modules/d3-interpolate/node_modules/d3-color
  d3-interpolate  0.1.3 - 2.0.1
  Depends on vulnerable versions of d3-color
  node_modules/d3-interpolate
    @antv/g-base  <=0.5.11
    Depends on vulnerable versions of d3-interpolate
    node_modules/@antv/g-basefollow-redirects  <=1.15.5
Severity: moderate
Follow Redirects improperly handles URLs in the url.parse() function - 
https://github.com/advisories/GHSA-jchw-25xp-jwwc
follow-redirects' Proxy-Authorization header kept across hosts - 
https://github.com/advisories/GHSA-cxjh-pqwp-8mfp
fix available via `npm audit fix`
node_modules/follow-redirectshttp-proxy-middleware  <2.0.7
Severity: high
Denial of service in http-proxy-middleware - 
https://github.com/advisories/GHSA-c7qv-q95q-8v27
fix available via `npm audit fix`
node_modules/http-proxy-middlewareip  *
Severity: high
NPM IP package incorrectly identifies some private IP addresses as public - 
https://github.com/advisories/GHSA-78xj-cgh5-2h22
ip SSRF improper categorization in isPublic - 
https://github.com/advisories/GHSA-2p57-rm9w-gvfp
fix available via `npm audit fix`
node_modules/iploader-utils  3.0.0 - 3.2.0
Severity: high
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via 
url variable - https://github.com/advisories/GHSA-3rfm-jhwj-7488
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) - 
https://github.com/advisories/GHSA-hhq3-ff78-jv3g
fix available via `npm audit fix`
node_modules/loader-utils
  @angular-devkit/build-angular  *
  Depends on vulnerable versions of loader-utils
  Depends on vulnerable versions of postcss
  Depends on vulnerable versions of protractor
  Depends on vulnerable versions of semver
  Depends on vulnerable versions of webpack
  Depends on vulnerable versions of webpack-dev-middleware
  node_modules/@angular-devkit/build-angularmicromatch  <4.0.8
Severity: moderate
Regular Expression Denial of Service (ReDoS) in micromatch - 
https://github.com/advisories/GHSA-952p-6rrq-rcjv
fix available via `npm audit fix`
node_modules/micromatchpath-to-regexp  <0.1.10
Severity: high
path-to-regexp outputs backtracking regular expressions - 
https://github.com/advisories/GHSA-9wv6-86v2-598j
fix available via `npm audit fix`
node_modules/path-to-regexppostcss  <8.4.31
Severity: moderate
PostCSS line return parsing error - 
https://github.com/advisories/GHSA-7fh5-64p2-3v2j
fix available via `npm audit fix`
node_modules/postcssrequest  *
Severity: moderate
Server-Side Request Forgery in Request - 
https://github.com/advisories/GHSA-p8p7-x288-28g6
Depends on vulnerable versions of tough-cookie
fix available via `npm audit fix --force`
Will install protractor@3.3.0, which is a breaking change
node_modules/request
  webdriver-manager  *
  Depends on vulnerable versions of request
  Depends on vulnerable versions of xml2js
  node_modules/webdriver-manager
    protractor  >=1.3.0
    Depends on vulnerable versions of selenium-webdriver
    Depends on vulnerable versions of webdriver-js-extender
    Depends on vulnerable versions of webdriver-manager
    node_modules/protractorsemver  <=5.7.1 || 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
Severity: high
semver vulnerable to Regular Expression Denial of Service - 
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
semver vulnerable to Regular Expression Denial of Service - 
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
semver vulnerable to Regular Expression Denial of Service - 
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
fix available via `npm audit fix`
node_modules/@angular-devkit/build-angular/node_modules/semver
node_modules/@angular/cli/node_modules/semver
node_modules/@babel/core/node_modules/semver
node_modules/@babel/helper-compilation-targets/node_modules/semver
node_modules/@babel/helper-define-polyfill-provider/node_modules/semver
node_modules/@babel/plugin-transform-runtime/node_modules/semver
node_modules/@babel/preset-env/node_modules/semver
node_modules/babel-plugin-polyfill-corejs2/node_modules/semver
node_modules/istanbul-lib-instrument/node_modules/semver
node_modules/less/node_modules/semver
node_modules/make-dir/node_modules/semver
node_modules/read-pkg/node_modules/semver
node_modules/semver
node_modules/webdriver-manager/node_modules/semver
  @angular/cli  9.1.0-next.0 - 14.2.11 || 15.0.0-next.0 - 15.2.8 || 
16.0.0-next.0 - 16.1.1
  Depends on vulnerable versions of semver
  node_modules/@angular/clisend  <0.19.0
Severity: moderate
send vulnerable to template injection that can lead to XSS - 
https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
fix available via `npm audit fix`
node_modules/send
  serve-static  <=1.16.0
  Depends on vulnerable versions of send
  node_modules/serve-static tar  <6.2.1
Severity: moderate
Denial of service while parsing a tar file due to lack of folders count 
validation - https://github.com/advisories/GHSA-f5x3-32g6-xq36
fix available via `npm audit fix`
node_modules/tartough-cookie  <4.1.3
Severity: moderate
tough-cookie Prototype Pollution vulnerability - 
https://github.com/advisories/GHSA-72xf-g2v4-qvf3
fix available via `npm audit fix --force`
Will install protractor@3.3.0, which is a breaking change
node_modules/tough-cookiewebpack  5.0.0-alpha.0 - 5.93.0
Severity: critical
Cross-realm object access in Webpack 5 - 
https://github.com/advisories/GHSA-hc6q-2mpp-qw7j
Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads to 
XSS - https://github.com/advisories/GHSA-4vvj-4cpr-p986
fix available via `npm audit fix`
node_modules/webpackwebpack-dev-middleware  <=5.3.3
Severity: high
Path traversal in webpack-dev-middleware - 
https://github.com/advisories/GHSA-wr3j-pwj9-hqq6
fix available via `npm audit fix`
node_modules/webpack-dev-middlewareword-wrap  <1.2.4
Severity: moderate
word-wrap vulnerable to Regular Expression Denial of Service - 
https://github.com/advisories/GHSA-j8xg-fqg3-53r7
fix available via `npm audit fix`
node_modules/word-wrapws  8.0.0 - 8.17.0
Severity: high
ws affected by a DoS when handling a request with many HTTP headers - 
https://github.com/advisories/GHSA-3h5v-q93c-6h6q
fix available via `npm audit fix`
node_modules/ws
  socket.io-adapter  2.5.2 - 2.5.4
  Depends on vulnerable versions of ws
  node_modules/socket.io-adapterxml2js  <0.5.0
Severity: moderate
xml2js is vulnerable to prototype pollution - 
https://github.com/advisories/GHSA-776f-qx25-q3cc
fix available via `npm audit fix --force`
Will install protractor@3.3.0, which is a breaking change
node_modules/xml2js
  selenium-webdriver  2.43.1 - 4.0.0-rc-2
  Depends on vulnerable versions of xml2js
  node_modules/selenium-webdriver
    webdriver-js-extender  *
    Depends on vulnerable versions of selenium-webdriver
    node_modules/webdriver-js-extender36 vulnerabilities (1 low, 15 moderate, 
17 high, 3 critical) {code}
h4.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to