socketio/engine.io-client

Vulnerability in xmlhttprequest-ssl

Hawxy opened this issue ยท 7 comments

Hawxy commented

Just a heads up that the current xmlhttprequest-ssl version shipped with this package has an open vulnerability:
https://app.snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936

I was pinged about this as I have a dependency that uses an old version of this package before xmlhttprequest-ssl was internalized, however the issue still remains.

Thanks for the heads-up! ๐Ÿ‘

Technically, I think we are always using async: true when using the XMLHttpRequest instance (here and here).

I'll update the dependency once the issue is fixed upstream though.

Is xmlhttprequest-ssl maintained any more? The readme at https://github.com/mjwwit/node-XMLHttpRequest seems to suggest it was explicitly created/forked for engine.io-client, but the last commit is 18 months old. The repo also won't take new issues.

@andyedwardsdfdl I don't think it is actively maintained, but we could indeed try to reach the maintainer.

Regarding the vulnerability, a solution would be to remove the synchronous part (async: false) and publish a new major version (or fork it, though that's a lot of work for something we don't actually use...)

Hawxy commented

Got pinged with this additional vun: https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1255647

A patched version of the package that fixes both of the above issues appears available on the fork and is being pushed to npm: https://github.com/mjwwit/node-XMLHttpRequest

Looks like xmlhttprequest-ssl has another security issue: https://www.npmjs.com/advisories/1665 . any chance the maintainer could bump it's version to a passing build(1.6.2) for version 3.5.x?

Also for 4.1.x if possible please! ๐Ÿ™

This should be fixed now:

Thanks for the heads-up ๐Ÿ™