x
)- [X] bug report -> please search issues before submitting
- [ ] feature request
x
)- [ ] new
- [ ] build
- [ ] serve
- [ ] test
- [ ] e2e
- [ ] generate
- [ ] add
- [ ] update
- [ ] lint
- [ ] xi18n
- [ ] run
- [ ] config
- [ ] help
- [ ] version
- [ ] doc
- [X] dependencies
node: 10.14.2
npm: 6.4.1
Angular CLI: 7.1.4
Node: 10.14.2
OS: win32 x64
Angular: 7.1.4
@angular-devkit/architect 0.10.7
@angular-devkit/build-angular 0.11.4
@angular-devkit/build-optimizer 0.11.4
@angular-devkit/build-webpack 0.10.7
@angular-devkit/core 7.0.7
@angular-devkit/schematics 7.1.4
@ngtools/webpack 7.1.4
@schematics/angular 7.1.4
@schematics/update 0.11.4
rxjs 6.3.3
typescript 3.1.6
webpack 4.19.1
--
npm install
=== npm audit security report === Manual Review
Some vulnerabilities require your attention to resolve
Visit https://go.npm.me/audit-guide for additional guidance
High Missing Origin Validation
Package webpack-dev-server
Patched in >=3.1.11
Dependency of @angular-devkit/build-angular [dev]
Path @angular-devkit/build-angular > webpack-dev-server
More info https://nodesecurity.io/advisories/725
found 1 high severity vulnerability in 78596 scanned packages
1 vulnerability requires manual review. See the full report for details.
--
I guess it will be fixed in next release https://github.com/angular/angular-cli/pull/13277
I’ll back port the fix to the patch branch later on today
updating to version 3.1.14 may not work, as per https://github.com/webpack/webpack-dev-server/issues/1615
Actually, upgrading to 3.1.14 might work, if the typo in the vulnerability database had been fixed: https://npm.community/t/npm-audit-sweems-to-get-semver-wrong/4352/4
Thanks @Diaan for your input.
I am also getting the Missing Origin Validation vulnerability.
Steps to reproduce:
npm uninstall -g @angular/cli
npm cache verify
npm install -g @angular/cli
npm cache verify
cd c:\src
c:\src>ng new spa
? Would you like to add Angular routing? Yes
? Which stylesheet format would you like to use? SCSS [ http://sass-lang.com ]
added 1133 packages from 1180 contributors and audited 40178 packages in 41.531s
found _1 high severity vulnerability_
c:\src >cd spa
c:\src\spa>npm audit
=== npm audit security report === Manual Review Some vulnerabilities require your attention to resolve Visit https://go.npm.me/audit-guide for additional guidance
High Missing Origin Validation
Package webpack-dev-server
Patched in >=3.1.11
Dependency of @angular-devkit/build-angular [dev]
Path @angular-devkit/build-angular > webpack-dev-server
More info https://nodesecurity.io/advisories/725found 1 high severity vulnerability in 40178 scanned packages
1 vulnerability requires manual review. See the full report for details.c:\src\spa>npm audit fix
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: [email protected] (node_modulesfsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for [email protected]: wanted {"os":"darwin","arch":"any"} (current: {"os":"win32","arch":"x64"})up to date in 5.196s
_fixed 0 of 1 vulnerability_ in 40178 scanned packages
1 vulnerability required manual review and could not be updatedc:\src\spa>npm install webpack-dev-server --save-dev
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: [email protected] (node_modulesfsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for [email protected]: wanted {"os":"darwin","arch":"any"} (current: {"os":"win32","arch":"x64"})
[email protected]
added 39 packages from 17 contributors, updated 4 packages and audited 43619 packages in 10.377s
_found 1 high severity vulnerability_
runnpm audit fix
to fix them, ornpm audit
for detailsc:srcspa>npm audit
=== npm audit security report === Manual Review Some vulnerabilities require your attention to resolve Visit https://go.npm.me/audit-guide for additional guidance
High Missing Origin Validation
Package webpack-dev-server
Patched in >=3.1.11
Dependency of @angular-devkit/build-angular [dev]
Path @angular-devkit/build-angular > webpack-dev-server
More info https://nodesecurity.io/advisories/725found _1 high severity vulnerability_ in 43619 scanned packages
1 vulnerability requires manual review. See the full report for details.c:\src\spa>ng update
We analyzed your package.json and everything seems to be in order. Good work!
Notice the different
webpack
andwebpack-dev-server
dependencies:
{
"_from": "@angular-devkit/build-angular@~0.11.0",
"_id": "@angular-devkit/[email protected]",
"dependencies": {
"webpack": "4.23.1",
"webpack-dev-server": "3.1.10",
},
}
{
"_from": "@angular-devkit/[email protected]",
"_id": "@angular-devkit/[email protected]",
"peerDependencies": {
"webpack": "^4.6.0",
"webpack-dev-server": "^3.1.4"
},
}
C:srcspanode_moduleswebpack-dev-serverpackage.json
{
"_from": "[email protected]",
"_id": "[email protected]",
"peerDependencies": {
"webpack": "^4.0.0"
},
}
[https://github.com/angular/angular-cli/blob/master/packages/angular_devkit/build_angular/package.json]
(updated 7 days ago)
{
"name": "@angular-devkit/build-angular",
"dependencies": {
"webpack-dev-server": "3.1.14"
},
}
[https://www.npmjs.com/package/@angular-devkit/build-angular]
(published 14 days ago)
cref:
https://nodesecurity.io/advisories/725
https://npm.community/t/npm-audit-sweems-to-get-semver-wrong/4352/9
https://github.com/facebook/create-react-app/issues/6109
Am getting this same error.
` npm audit
=== npm audit security report ===
Manual Review
Some vulnerabilities require your attention to resolve
Visit https://go.npm.me/audit-guide for additional guidance
High Missing Origin Validation
Package webpack-dev-server
Patched in >=3.1.11
Dependency of @angular-devkit/build-angular
Path @angular-devkit/build-angular > webpack-dev-server
More info https://nodesecurity.io/advisories/725`
please let me know if there any patch update for the devkit or it transient webpack
@alan-agius4 I am really surprised that this isn't being addressed quicker.
It impacts every single person using @angular-devkit/build-angular
The frequency isn't low, it is high.
While it may be a false positive in terms of the actual security risk (just a typo), it is clearly an issue for those trying use npm audit
in their build pipeline.
Just coming in late to this thread.
It impacts every single person using @angular-devkit/build-angular
If I read the vulnerability correctly, it only affects people doing HMR, and having a server listening on something too permissive (we default to localhost), right? This is far from "every single person".
That being said, we should still fix it. In general though, I would avoid hyperboles when it comes to security. NPM audit is known to be crying wolf a bit.
@hansl npm audit
throws a big red flag for anyone who installs @angular-devkit/build-angular
npm install @angular-devkit/build-angular
+ @angular-devkit/[email protected]
found 1 high severity vulnerability
run `npm audit fix` to fix them, or `npm audit` for details
After reading the details of what is presumed to be the issue, a typo, I agree and stated in my post that from a security perspective it isn't a huge deal (in an effort to avoid hyperbole), but it took me some digging to make that determination myself. Wouldn't you want a clean install of @angular-devkit/build-angular ?
So, yes, it is every single person that installs @angular-devkit/build-angular will see that audit error. We can debate the validity of npm audit
but the high severity vulnerability message displays to everyone.
Feel free to correct me if I am wrong.
+1
@hansl
I get this alert now in 5 of my angular project.
This PR and comment provides information on likely fix "next Wednesday" https://github.com/angular/angular-cli/pull/13347#issuecomment-451145500
@mjknight50, Yes, we do agree that this should be addressed, and as a mater of fact there is a PR in the merge queue and it will be released earlier next week.
While the audit message is shown to everybody the vulnerability itself only impacts a small group of people, and hence cutting a release late in the week for this week had a small benefit with a high risk.
+1 waiting for fix
+1 waiting for fix
The problem is that everybody who sees this error and cares about his projects has to spend the time to find out what's going on. Took me "only" 20..30 minutes, but could be better spent.
+1 waiting for fix
+1 waiting for fix
Spamming „+1 waiting for fix“ does not speed up the process 🤨
But adding +1 might increase your bug frequency label from 'low' to 'high' :)
we are getting emails from GitHub to fix vulnerabilities in our angular repos
this is very annoying and cause waste of time for every angular developer because there is no solution yet
from what i read i understand it has low freq (as standalone attack) but nowadays its rarely for cyber attack to use just one vulnerability, but usually its a sophisticated attack using multiple vulnerabilities
so you had better better fix it asap
Hey everyone, in the tomorrow's release we'll publish this fix. The update will be available in 7.1.5.
You can follow the releases page (preferably) for updates or twitter.
FYI, Angular CLI LTS release already introduced this security fix https://github.com/angular/angular-cli/releases/tag/v6.2.9.
FYI, Angular CLI LTS release already introduced this security fix https://github.com/angular/angular-cli/releases/tag/v6.2.9.
from https://angular.io/guide/releases
6 months of active support, during which regularly-scheduled updates and patches are released.
12 months of long-term support (LTS), during which only critical fixes and security patches are released.
so from what i understand the active should have more updates and patches than the LTS (because they will fix a bug even if its not critical), but all will have security patches
there is nothing saying if you want the most secure angular project don't go with the active and stay with LTS
it seems that the issue is still in the 7.2.0 release?
@alan-agius4 @filipesilva this fix is not included in the 7.2.0
@Teamop, @alan-agius4 , @filipesilva
Edited to confirm that this was not included in the release.
why is this issue still in 7.2.0?
@ChristopherKiss That compare shows the changes between v7.2.0 and master right? If I am not mistaken this means changes in master after the v7.2.0 tag. It seems like it was not included to v7.2.0.
@kelsos,
My apologies, you are correct, I misread the link on the releases page.
It was not included in 7.2.
Hi all, we're looking at why this wasn't included in the 7.2 release and will probably do a new release with it later today.
Not fixed in 7.2.x. 😥
+1
Thank you @filipesilva
@angular/[email protected]
and @angular-devkit/[email protected]
are now released. Using these versions should remove the audit failure.
@michaelsanford you can simply run npm audit fix
after ng update
```
athlon_ua @ ~/GitHub/project - [master] $ npm audit fix
This issue has been automatically locked due to inactivity.
Please file a new issue if you are encountering a similar or related problem.
Read more about our automatic conversation locking policy.
_This action has been performed automatically by a bot._
Most helpful comment
@angular/[email protected]
and@angular-devkit/[email protected]
are now released. Using these versions should remove the audit failure.