How to fix Security Vulnerabilities in NPM Dependencies in 3 Minutes

Written by vivek-nayyar | Published 2020/03/21
Tech Story Tags: javascript | npm | security | vulnerabilities | coding | github | code-quality | npm-modules

TLDR Vivek Nayyar is a Senior Software Engineer with 5 years' of experience building products for numerous domains. He has no idea how to fix a security vulnerability in NPM Dependencies in 3 minutes. He found acorn and minimist were being reported as security vulnerabilities. He fixed the issue using a resolution key in your package-lock.json file or for yarn users, delete your yarn.lock file. That solves the dependency issues which can not be updated using or uninstalling a new dependency.via the TL;DR App

Hola people!!! πŸ₯‘
It’s been a while since I have written a blog and now since most of us are working from home, the time that used to go in commute is now saved and I thought why not utilize this time and write about my recent experience of fixing a security vulnerability.
So if any of you in the recent time have seen something like this image below and have no clue how to fix it then this article is for you. When I saw it, I had no clue either but with some research I could fix this.

πŸ”¬ Problem:

So what this means is one of the dependencies in your package.json has some security implications which can be exploited by an attacker and can cause problems for you, your product or the company you work for.
This vulnerability could have caused a Regular Expression Denial of Service

πŸ’‘ Finding:

In order to find potential vulnerabilities in your repo, you can either do
1) npm audit β€” which should show you an output like the following image:
2) Github security policy can also notify you β€” something like the following image:
Today when I started working I had to deal with this error where acorn and minimist were being reported as security vulnerabilities.

πŸŽ‰ Solution

Solution to this problem is in steps:-
πŸ“¦ npm update
1) This is the first thing you should do and it's the simplest one too.
  • Run npm update β€” https://docs.npmjs.com/cli-commands/update.html
  • Delete your package-lock.json file or for yarn users, delete your yarn.lock file. In an ideal world this would work, but there might be some dependency which does not follow semver and might get updated too.
  • So a better solution here would be to only delete the lines corresponding to the vulnerable package in your package-lock.json(or yarn.lock) file.
  • Run npm install again
In an ideal scenario, this should have upgraded your dependencies to the next semver version and those libraries might have already fixed the version of there transitive dependencies.
πŸ”­ npm audit
2) But if that did not fix your issue, which for minimist did not fix for me, then follow the below mentioned steps:
2.1) To fix any dependency, you need to first know which npm package depends on that.
 npm audit
This will tell you the packages which are vulnerable.
This tells me that minimist is required by mkdirp and that is required by mocha.
A quick glance into package-lock.json can give you more information around the affected version.
In my case mocha(7.1.0) -> mkdirp(0.5.1) -> minimist(0.0.8) β€” the vulnerable version.
πŸ”‘ Resolutions key
3) And finally the fix was:
3.1) First npm install the non-vulnerable version, which in my case was 1.2.5
npm install minimist --save-dev
For yarn and npm users
3.2) Add a resolutions key in your package.json file
{
  "resolutions": {
    "minimist": "^1.2.5"
  }
}
For npm users, we need one more step for that resolutions key to work.
"scripts": {
  "preinstall": "npx npm-force-resolutions"
}
3.4) After that run
npm install
That’s it. That solves the dependency issues which can not be updated using either npm update or by uninstalling and reinstalling a new dependency.
To check if the dependency works correctly
 npm ls minimist
This should give you an output like the image below

πŸ”₯ Disclaimer

If some packages are only compatible with an older version, then this change might break your app. So be careful while resolving to a particular version and test your app before releasing this change.
πŸ‘― Share this article if you found it helpful!
You can follow me on twitter @VivekNayyar09 for more updates.
Also please don’t forget to maintain social distance to prevent the virus from spreading and wash your hands regularly. Stay safe and stay at home.
Previously published at https://dev.to/viveknayyar/fixing-security-vulnerabilities-in-npm-dependencies-in-less-than-3-mins-2p5g

Written by vivek-nayyar | πŸ‘‹ Senior Software Engineer with 5 years' of experience building products for numerous domains.
Published by HackerNoon on 2020/03/21