Issue #3332Opened March 11, 2021by AmtechInnovarch1 reactions

Nearly half the packages specified have high risk vulnerabilities, all have some vulnerability.

Question

After npm i we can see that the level of vulnerabilities is unacceptable.

added 646 packages from 383 contributors and audited 762 packages in 7.892s found 724 vulnerabilities (353 low, 23 moderate, 348 high) run npm audit fix to fix them, or npm audit for details

I'm trying to fix the problem, at least locally. It will take a long time because every single specified package has a vulnerability.

Answers (3)

AmtechInnovarchMarch 11, 20211 reactions

This is why veteran coders with decades of experience disapprove of JS as a back-end language. Javascript is not intended to be a server side language, and these node packages create vulnerabilities that get servers hacked.

grapesjs$ npm audit fix

changed 1 package, and audited 2026 packages in 3s

# npm audit report

diff  <3.5.0
Severity: high
Regular Expression Denial of Service - https://npmjs.com/advisories/1631
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/diff
  disparity  <=2.0.0
  Depends on vulnerable versions of diff
  node_modules/disparity
    documentation  4.0.0-beta - 13.0.1
    Depends on vulnerable versions of disparity
    Depends on vulnerable versions of yargs
    node_modules/documentation

mem  <4.0.0
Denial of Service - https://npmjs.com/advisories/1084
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/mem
  os-locale  2.0.0 - 3.0.0
  Depends on vulnerable versions of mem
  node_modules/os-locale
    yargs  4.0.0-alpha1 - 12.0.5 || 14.1.0 || 15.0.0 - 15.2.0
    Depends on vulnerable versions of os-locale
    Depends on vulnerable versions of yargs-parser
    node_modules/yargs
      documentation  4.0.0-beta - 13.0.1
      Depends on vulnerable versions of disparity
      Depends on vulnerable versions of yargs
      node_modules/documentation

yargs-parser  <=13.1.1 || 14.0.0 - 15.0.0 || 16.0.0 - 18.1.1
Prototype Pollution - https://npmjs.com/advisories/1500
fix available via `npm audit fix --force`
Will install [email protected], which is a breaking change
node_modules/yargs-parser
  yargs  4.0.0-alpha1 - 12.0.5 || 14.1.0 || 15.0.0 - 15.2.0
  Depends on vulnerable versions of os-locale
  Depends on vulnerable versions of yargs-parser
  node_modules/yargs
    documentation  4.0.0-beta - 13.0.1
    Depends on vulnerable versions of disparity
    Depends on vulnerable versions of yargs
    node_modules/documentation

7 vulnerabilities (4 low, 3 high)

This is a serious security concern and should be addressed by the developer, or there should be adequate warning in the readme.md that discourages production use without fixing all these vulnerabilities.

Is there a way to only use the client side layer of GrapesJS? Can the developer please identify the client side files?

KernelDeimosMarch 11, 20210 reactions

GrapesJS has a server-side layer?

KernelDeimosMarch 11, 20210 reactions

Javascript is not intended to be a server side language, and these node packages create vulnerabilities that get servers hacked.

Are you implying that Javascript is the only language where dependancies can introduce security vulnerabilities? If there's some trait of Javascript that makes these sort of vulnerabilities more likely you ought to specify this in your statement, otherwise what you're saying is just subjective nonsense.

Related Questions and Answers

Continue research with similar issue discussions.

Paid Plugins That Match This Issue

Curated by issue keywords and label relevance to help you ship faster.

View all plugins

Loading paid plugin recommendations...

Browse Plugin Categories

Jump directly to plugin category pages on the marketplace.