Publish 0.19.3 to npmjs.org to fix security vulnerability CVE-2023-30533 #2961
Labels
No Label
DBF
Dates
Defined Names
Features
Formula
HTML
Images
Infrastructure
Integration
International
ODS
Operations
Performance
PivotTables
Pro
Protection
Read Bug
SSF
SYLK
Style
Write Bug
good first issue
No Milestone
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: sheetjs/sheetjs#2961
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
The latest version of SheetJS that is published to the public npm registry is
0.18.5
.That version of SheetJS contains the security vulnerability described in CVE-2023-30533
The vulnerability has been fixed in SheetJS
0.19.3
, but that version has not published to npmjs.org. This leaves many existing customers vulnerable who refer thexlsx
package in theirpackage.json
file.Publishing the latest version to npmjs.org could fix this situation.
As mentioned in the note in https://docs.sheetjs.com/docs/getting-started/installation/nodejs#installation
For example, the GatsbyJS demo uses
gatsby-transformer-excel
which depends on the public registry. The complete demo sets theoverrides
field to ensure thatnpm install
pulls the correct version.Yes, it's doable, thanks for pointing out this workaround for future readers of this ticket. 👍
According to npmjs.org there were 915K downloads of the vulnerable 0.18.5 version in the last 7 days from the public registry. I believe the majority of those downloads did not explicitly specify the version but always download the latest version.
Again, according to npmjs.org there are 3868 other public packages that depend on SheetJS, with only God knows how many downloads per week in total.
You created a successful, very popular library, and the open source community depends on it, depends on your work, depends on you. Not publishing a security fix for the old channel is not responsible to your users, to the open source community.
(Similarly, operating system vendors often decide that new features are published only for the new version of the OS, but the old version is supported with security fixes for a longer time.)
Thank you.