Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

firebase-admin snyk issues #1718

Closed
harshagarwal00 opened this issue May 20, 2022 · 10 comments
Closed

firebase-admin snyk issues #1718

harshagarwal00 opened this issue May 20, 2022 · 10 comments
Assignees

Comments

@harshagarwal00
Copy link

Snyk is throwing a warning how to fix it ?
Link: https://snyk.io/test/npm/firebase-admin/10.2.0

node: v16.14.2
npm: 8.5.0

@google-oss-bot
Copy link

I found a few problems with this issue:

  • I couldn't figure out how to label this issue, so I've labeled it for a human to triage. Hang tight.
  • This issue does not seem to follow the issue template. Make sure you provide all the required information.

@harshagarwal00
Copy link
Author

This is duplicate of #1512
But needs a fix.. cant believe above issue got ignored for 5 months :)

@lahirumaramba
Copy link
Member

Thank you @harshagarwal00 for reporting this issue.
The Admin Node.js SDK uses dicer to parse multipart responses from Firebase and GCP backend servers.

const multipartParser = new dicer({ boundary });

IIUC the threat introduced by the vulnerability in dicer is pretty low here as we can trust the responses from the BE servers. However, if you are using the dicer package to parse responses in your own code then you might be at a higher risk. Having said that, we are looking into the fixes mentioned in #1512 and the potential to use the fixed version of dicer in Admin SDK. I will use this issue to update the progress.

@fbartho
Copy link

fbartho commented May 26, 2022

Thanks @lahirumaramba -- I recognize this is a low vulnerability point, but given that Github/Dependabot are alerting, it'd be great to address this issue permanently.

@Corrob
Copy link

Corrob commented May 27, 2022

Another reason to fix this quickly is that some people block our releases on "npm audit" results to make sure we don't have high vulnerabilities in our release build. Currently, our releases are blocked or must be worked around until firebase-admin stops being reported as being with a high vulnerability in the audit.

@samarpanB
Copy link

Rightly said @Corrob . We are also facing the same issue. We are blocked for deployment on production environment because of npm audit failing and snyk also failing. Reason is this issue only. How soon can we fix it ?

@harshagarwal00
Copy link
Author

harshagarwal00 commented Jun 9, 2022

@lahirumaramba : brilliant but its not tagged as a release... by when will we get that :)
waiting to import the fix
thanks!!!
[the latest version is 10.2.0]

@lahirumaramba
Copy link
Member

This should be fixed in v10.3.0. Thanks everyone for you patience while we were working on the fix.

@Diribar
Copy link

Diribar commented Dec 30, 2023

The alert is still showng, both in Github and nodejs. Do you have any news about the solution?

@ellie-ochieno
Copy link

ellie-ochieno commented Mar 13, 2024

Because multer vulnerability issue was being classified as severity:high in my nodejs application, i resolved by upgrading to another version "multer": "^1.4.5-lts.1" as an alternative and all seemed to work well.

@firebase firebase locked as resolved and limited conversation to collaborators Mar 13, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

8 participants