-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
V5 Vulnerability fix: bump xml-parser to v4.4.1 for V5 #13657
Comments
Is #13663 the resolution? |
Hello, @jackirvine97 and thank you for opening this issue. As you already saw, PR #13663 is indeed the resolution to this! The release for this will happen within the next week, but we are working on getting it to build on the "unstable" branch. We'll update this issue when that's ready, as well as when the release happens that includes this. |
Brilliant @cwomack , thank you so much for the update and for patching though this fix |
@cwomack Just wanting to double check that the resolution in PR #13663 is enough to fix the issue? There are exact dependency versions for various @AWS-SDK packages specified within some @aws-amplify packages that are also vulnerable, the @AWS-SDK packages have been updated to "3.621.0" and might require dependency updates in the amplify packages as well. |
Other than upgrading to v6, skipping "high" vulnerabilities in my node audit run, or moving to a CICD where I can do a targeted ignore of CVEs, I assume there are no other workarounds? (I have a PRD patch hanging off this) |
Some context can be found here: aws/aws-sdk-js-v3#6331 (comment) |
Hi everyone, the fix for this is now released on version 5.3.21. Please let us know if there are any question or comments on the fix. |
@ashika112 What about aws-amplify v6? I'm having this issue on the latest version too 6.5.0: |
@navv-christofer-flores v6 has the fix as well. In your screenshot I see |
Is this related to a new or existing framework?
React
Is this related to a new or existing API?
Authentication
Is this related to another service?
No response
Describe the feature you'd like to request
Describe the solution you'd like
Given the complexity and time required to migrate from v5 to v6, can this dependency be bumped so v5 apps are not blocked from deployments and not exposed to this vulnerability
Describe alternatives you've considered
n/a
Additional context
n/a
Is this something that you'd be interested in working on?
The text was updated successfully, but these errors were encountered: