Ends in:
7 DAYS
23 HRS
11 MIN
32 SEC
Ends in:
7 D
23 H
11 M
32 S
Open Closed

MEND/WhiteSource Vulnerability report on many javascript libraries #4324


User avatar
0
joe@tronactive.com created
  • ABP Framework version: v6.0.2
  • UI type:Blazor
  • DB provider: EF Core
  • Tiered (MVC) or Identity Server Separated (Angular): yes

For our project we scan our source code during the pipeline build with the service MEND formerly known as WhiteSource. I use LeptonX in our project and the scan is finding a lot of javascript library vulnerabilities that the security team needs me to fix ASAP. The problem I see is, I don't seem to have much control over these files and how I can update them since they are apart of the LeptonX code base. Does anyone have any ideas of what I can do?


9 Answer(s)
  • User Avatar
    0
    alper created
    Support Team Director

    you can update the High and Critical levels of packages. I'm creating an issue for this. You are using the Blazor UI, right?

  • User Avatar
    0
    joe@tronactive.com created

    Yes that is correct. We are using Blazor Server version.

    How do I update those. I can't find the correct Package.json file

  • User Avatar
    0
    enisn created
    Support Team .NET Developer

    Hi joe@tronactive.com

    You marked as you're using blazor with a tiered solution. So, you have 3 different projects whiches are *.Blazor, *.HttpApi.Host and *.AuthServer.

    All of them stands for a reason but users can only interact with Blazor and HttpApi.Host project. So, you can update package.json file in those project folders.

    By the way, please don't add direct reference to those files, just use resolution parameter of package.json

    If you don't have an idea for it, here is an easy usage: https://classic.yarnpkg.com/lang/en/docs/selective-version-resolutions/#toc-how-to-use-it

  • User Avatar
    0
    alper created
    Support Team Director

    internal issue number is volo#13195

  • User Avatar
    0
    joe@tronactive.com created

    Awesome. Thank you very much. I appreciate the help.

  • User Avatar
    0
    joe@tronactive.com created

    Alper, you may want to consider using MEND (formerly WhiteSource, www.mend.io) to show vulnerabilities reported in .NET and NPM packages; it also tells you what versions the vulnerabilities have been fixed in. The second one you may want to look into is Sonarcloud (sonarcloud.io) which is incredible for finding security vulnerabilities in the actual source code.

    My work uses both for compliance reasons, and they work fantastically to keep the codebase as secure as possible before deploying to the server.

  • User Avatar
    -1
    alper created
    Support Team Director

    We are using OWASP ZAP tool for pen testing. But I noted down MEND and NPM thank you.

  • User Avatar
    0
    joe@tronactive.com created

    That isn't going to find package level vulnerabilities. Completely different. Also, for code vulnerabilities, OWASP could catch a lot of those. But SonarCloud will find them much quicker and will point directly to the code that is a vulnerability. OWASP wouldn't do that. Just to a basic API Endpoint level. Also, SonarCloud and Mend can easily be put into the build pipeline to check during each build. Or on a schedule.

  • User Avatar
    0
    alper created
    Support Team Director

    thanks for the extra info

Made with ❤️ on ABP v9.1.0-preview. Updated on November 20, 2024, 13:06