CVE-2022-29244: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. --workspaces
, --workspace=<name>
). Anyone who has run npm pack
or npm publish
inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they does not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.
References
- github.com/advisories/GHSA-hj9c-8jmm-8c52
- github.com/nodejs/node/pull/43210
- github.com/nodejs/node/releases/tag/v16.15.1
- github.com/nodejs/node/releases/tag/v17.9.1
- github.com/nodejs/node/releases/tag/v18.3.0
- github.com/npm/cli/releases/tag/v8.11.0
- github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52
- github.com/npm/cli/tree/latest/workspaces/libnpmpack
- github.com/npm/cli/tree/latest/workspaces/libnpmpublish
- github.com/npm/npm-packlist
- nvd.nist.gov/vuln/detail/CVE-2022-29244
Detect and mitigate CVE-2022-29244 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →