-
Notifications
You must be signed in to change notification settings - Fork 475
Description
Consider the following advisories:
- chalk-template GHSA-3jjr-pvq7-4jq5
- supports-hyperlinks GHSA-hggr-35mp-qcxg
- has-ansi GHSA-jff9-gjh4-j359
- slice-ansi GHSA-9xjj-cmqc-578p
- wrap-ansi GHSA-2rv4-jp6r-xgq7
- ansi-regex GHSA-jvhh-2m83-6w29
- supports-color GHSA-pj3j-3w3f-j752
- strip-ansi GHSA-vfjc-p7x3-q864
- chalk GHSA-2v46-p5h4-248w
- ansi-styles GHSA-p5rr-crjh-x7gr
- color-convert GHSA-ch7m-m9rf-8gvv
- color-string GHSA-3q87-f72r-3gm6
- backslash GHSA-m2xf-jp99-f298
- is-arrayish GHSA-hfm8-9jrf-7g9w
- simple-swizzle GHSA-wwpx-h6g5-c7x6
- color-name GHSA-m99c-cfww-cxqx
- error-ex GHSA-5g7q-qh7p-jjvm
- debug GHSA-8mgj-vmr8-frr6
Affected versions
All advisories were listing every version (>= 0
) as vulnerable.
However, it seems the real impact is limited.
For example, [email protected]
(now unpublished) is cited as affected.
Is there a particular reason why a wildcard range was used to mark everything as vulnerable?
Honestly, I think I lost a few years of life 😅.
Clarity of description
The advisories currently states:
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
This suggests a full system compromise.
However, the following discussions indicate that the real impact is uncertain:
- (RESOLVED) Version 4.4.2 published to npm is compromised debug-js/debug#1005 (comment)
- Version 5.6.1 published to npm is compromised (RESOLVED) chalk/chalk#656 (comment)
- Version 5.6.1 published to npm is compromised (RESOLVED) chalk/chalk#656 (comment)
From analysis, it appears the malicious code was designed to run in the browser, and may not actually execute in a Node.js environment.
Is there any plan to update the description to reflect this?
This is my first time engaging in a security advisory discussion, so I apologize if some of my questions come across as basic.