-
-
Notifications
You must be signed in to change notification settings - Fork 6.3k
High Security Vulnerability (Denial of Service) issue 1486 in http-proxy #5489
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Tracked here: http-party/node-http-proxy#1446 Note: as it's only used for the local development server, it's not an actual security vulnerability on Vue CLI projects. Feel free to ignore it if |
We're also waiting for a fix, meanwhile we set http-proxy to our audit-ci whitelist |
The latest progress on the issue is tracked here: webpack/webpack-dev-server#2616 |
@sodatea there is fixed version for this([email protected]),
|
@sailfish009 |
I am also facing the all my audit fix because of cli |
@mayankpw Please start using "Fenced code blocks" It helps readability. 😉
https://guides.github.com/pdfs/markdown-cheatsheet-online.pdf |
Version
4.3.1
Reproduction link
https://github.com/itsalaidbacklife/vue-http-proxy-vulnerability-1486
Environment info
Steps to reproduce
npm audit
What is expected?
Newly created projects will not have high-severity security vulnerabilities and will pass npm audit without issues.
What is actually happening?
npm audit
reports 1 high-severity security vulnerability 1486Issue is with Denial of service in
@vue/cli-service > webpack-dev-server > http-proxy-middleware > http-proxy
No patch is currently available. Npm recommends [Considering] "using an alternative package until a fix is made available."
The text was updated successfully, but these errors were encountered: