-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sonatype scan raises critical vulnerability: [CVE-2022-37598] Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.X.X via the name variable in ast.js. #5721
Comments
Please refrain from restating automated tooling reports verbatim without further, proper analysis whether it is genuinely valid. |
@alexlamsl , I highly suggest you to update the CVE record by filing this form: https://cveform.mitre.org/ Otherwise, all tools that monitor CVE issues will raise a critical issue on UglifyJS package. |
@CarlG12 I did not opt for or file any CVEs in the first place, so I failed to see how it is my responsibility to "Report Spam". You have my full blessing to tell whoever's in charge to remove any records with regards to UglifyJS − and perhaps ask them to obtain a maintainer's opinion/concensus in the future before causing inconvenience to the user community. |
@alexlamsl I am in the same boat as @ciarancolgan and many many others. Cooperate vulnerability scanners will force us to remove UglifyJS and find other solutions and never look back. I believe this tool's user community will drop drastically if the CVE isn't resolved. If you disagree with the verdict that this is a true vulnerability, please reach out to NIST.gov and make your case. @ciarancolgan here seems to be the area: Line 46 in 352a944
Line 79 in 352a944
|
Synopsys BlackDuck scan also reports this as a critical vulnerability. |
@ciarancolgan @CarlG12 @jimmyjames177414 @jeensingh - the responsibility for clarifying this belongs to @Supraja9726 who was responsible for filing the issue #5699 that appears to have set this whole chain of events into motion. I've added a comment to that issue clarifying that I agree with the assessment that this issue is invalid, and I've asked for @Supraja9726 to defend the claim that such a vulnerability exists. |
@robbytx thanks for your assessment and the attempt to rectify this situation 👍 |
**Uglify version **
At least all versions from our current (3.13.2) to latest
**Issue **
As of 25/10/22, running an
auditjs ossi
scan on our codebase throws this issue as a critical error:Vulnerability Title: [CVE-2022-37598] Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.13.2 via the name variable in ast.js.
Reference: https://ossindex.sonatype.org/vulnerability/CVE-2022-37598?component-type=npm&component-name=uglify-js&utm_source=auditjs&utm_medium=integration&utm_content=4.0.38
According to Sonatype this affects all published versions of UglifyJS so upgrading wont help.
The same issue was reported here: #5699 but has been closed, marked as invalid?
Would you be able to look into this, or point me at the area and I can take a look at getting a PR raised? Thanks!
The text was updated successfully, but these errors were encountered: