Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2023-29827 #3342

Open
Prozect2024 opened this issue Aug 7, 2024 · 3 comments
Open

CVE-2023-29827 #3342

Prozect2024 opened this issue Aug 7, 2024 · 3 comments

Comments

@Prozect2024
Copy link

Library Affected:
workbox-build v7.1.0 and workbox-webpack-plugin v7.1.0.

Browser & Platform:
All Browsers

Issue or Feature Request Description:

Dear Maintainer/Project Team,

I am writing to inform you about a security vulnerability in the EJS template engine (version 3.1.10) that affects your project via transitive dependencies. Specifically, the vulnerability is present in surma/rollup-plugin-off-main-thread v2.2.3, which is a dependency of workbox-build v7.1.0 and workbox-webpack-plugin v7.1.0.

Given the potential security risks associated with this vulnerability, I would like to request an update to your project that removes or replaces the vulnerable dependency. A possible solution could be updating to a non-vulnerable version of EJS (3.1.11 or later) or switching to an alternative templating engine if feasible.

Addressing this issue would help ensure that projects depending on your library can maintain security best practices. Please let me know if there are any plans to release an update or if there are workarounds that can be implemented in the meantime.

Thank you for your attention to this matter and for your continued work on this important project.

Best regards,
Kate.

@dmoebius
Copy link

@Prozect2024 There is no version EJS 3.1.11, so this won't help.

@dmoebius
Copy link

Dear workbox developers, it would really help if you could take a look at that CVE-2023-29827 issue (or rather, its update CVE-2024-33883), whether workbox is affected or not. We especially like to know whether workbox (or its third party dependency surma/rollup-plugin-off-main-thread) passes unsanitized input to the ejs render function. Our customer is very nervous about this. Thank you.

@dmoebius
Copy link

Hi workbox developers, @tropicadri,

another way to solve this issue would be to mark the dependency surma/rollup-plugin-off-main-thread as a devDependency instead of a runtime dependency. It is only needed at build time.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants