-
Notifications
You must be signed in to change notification settings - Fork 0
Add override to prevent vulnerable ip package versions #15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add override to prevent vulnerable ip package versions #15
Conversation
|
Important Review skippedBot user detected. To trigger a single review, invoke the You can disable this status message by setting the Comment |
Co-authored-by: granatonatalia <[email protected]>
PR Compliance Guide 🔍Below is a summary of compliance checks for this PR:
Compliance status legend🟢 - Fully Compliant🟡 - Partial Compliant 🔴 - Not Compliant ⚪ - Requires Further Human Verification 🏷️ - Compliance label |
|||||||||||||||||||||||
PR Code Suggestions ✨Explore these optional code suggestions:
|
|||||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This PR adds a package override to address CVE-2023-42282 in the ip package, which incorrectly identifies certain private IP addresses (e.g., 0x7F.1) as public, potentially enabling SSRF attacks.
- Adds override for
ippackage to enforce patched versions - Prevents future regressions when package-lock.json regenerates
- Addresses a transitive dependency from
dns-packet
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| "@types/d3-dispatch": "3.0.6", | ||
| "@types/linkify-it": "3.0.5" | ||
| "@types/linkify-it": "3.0.5", | ||
| "ip": ">=1.1.9" |
Copilot
AI
Jan 8, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The version constraint >=1.1.9 will allow the vulnerable version 2.0.0 to be installed. According to the PR description and CVE-2023-42282, version 2.0.0 is vulnerable while versions 1.1.9 and 2.0.1 are patched. The constraint should be updated to either 1.1.9 (to pin to this specific version) or ^1.1.9 (to allow patch updates in the 1.x range but exclude 2.0.0), or use a more explicit constraint like >=1.1.9 <2.0.0 || >=2.0.1 to allow both patched versions while excluding the vulnerable 2.0.0.
| "ip": ">=1.1.9" | |
| "ip": ">=1.1.9 <2.0.0 || >=2.0.1" |
User description
The
ippackage (CVE-2023-42282) incorrectly identifies private IPs in uncommon formats (e.g.,0x7F.1) as public, enabling SSRF attacks. Versions< 1.1.9and= 2.0.0are vulnerable;1.1.9and2.0.1are patched.Changes
"ip": ">=1.1.9"to package.json overrides to enforce patched versiondns-packetspecified^1.1.0, which would allow vulnerable versions if lock file regeneratesVerification
Current installation already at
1.1.9; override prevents future regressions.Original prompt
✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.
PR Type
Bug fix
Description
Add npm package override to enforce patched ip version
Prevents vulnerable ip versions from being installed
Addresses CVE-2023-42282 SSRF vulnerability in ip package
Ensures versions >=1.1.9 are used, blocking vulnerable <1.1.9 and 2.0.0
Diagram Walkthrough
File Walkthrough
package.json
Add ip package version override for securitypackage.json
"ip": ">=1.1.9"to the overrides section