sindresorhus/parse-json

Upgrade unicode to v10.0.0 to resolve https MITM vulnerability

cevn opened this issue · 6 comments

Where exactly am I using unicode?

cevn commented

vendor/unicode.js :\ I don't understand how it was generated or I would make my own PR. Also worth mentioning is that this package is being flagged for this unicode vuln in our scans, but personally I think it's a false positive based on how the unicode package works and also on how this package includes it, so you can decide whether it's really worth the effort to fix.

Yes this is an issue for me too. The unicode 6.3.0 sets off vulnerability scanners even though it no longer has the insecure http:// URL

Can you provide any hints for how the unicode.js file is generated?

To be clear, the issue is that the newest npm relies on parse-json@2.2.0 which contains the bad version of unicode

My sad short term solution

RUN cd /tmp && \
    git clone https://github.com/sindresorhus/parse-json.git && \
    rm -r /usr/lib/node_modules/npm/node_modules/libnpx/node_modules/yargs/node_modules/read-pkg-up/node_modules/read-pkg/node_modules/load-json-file/node_modules/parse-json && \
    cp -r parse-json /usr/lib/node_modules/npm/node_modules/libnpx/node_modules/yargs/node_modules/read-pkg-up/node_modules/read-pkg/node_modules/load-json-file/node_modules/parse-json

This is no longer relevant as the unicode.js file is gone in the latest release.