Skip to content

Bump node-forge from 1.3.1 to 1.3.3 in /zeppelin-web-angular/projects/zeppelin-react#5173

Closed
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/npm_and_yarn/zeppelin-web-angular/projects/zeppelin-react/node-forge-1.3.3
Closed

Bump node-forge from 1.3.1 to 1.3.3 in /zeppelin-web-angular/projects/zeppelin-react#5173
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/npm_and_yarn/zeppelin-web-angular/projects/zeppelin-react/node-forge-1.3.3

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Mar 6, 2026

Bumps node-forge from 1.3.1 to 1.3.3.

Changelog

Sourced from node-forge's changelog.

1.3.3 - 2025-12-02

Fixed

  • [pkcs12] Make digestAlgorithm parameters optional to fix PKCS#12/PFX issues introduced in 1.3.2.

1.3.2 - 2025-11-25

Security

  • HIGH: ASN.1 Validator Desynchronization
    • An Interpretation Conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.
    • Reported by Hunter Wodzenski.
    • CVE ID: CVE-2025-12816
    • GHSA ID: GHSA-5gfm-wpxj-wjgq
  • HIGH: ASN.1 Unbounded Recursion
    • An Uncontrolled Recursion (CWE-674) vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs.
    • Reported by Hunter Wodzenski.
    • CVE ID: CVE-2025-66031
    • GHSA ID: GHSA-554w-wpv2-vw27
  • MODERATE: ASN.1 OID Integer Truncation
    • An Integer Overflow (CWE-190) vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions.
    • Reported by Hunter Wodzenski.
    • CVE ID: CVE-2025-66030
    • GHSA ID: GHSA-65ch-62r8-g69g

Fixed

  • [asn1] Fix for vulnerability identified by CVE-2025-12816 PKCS#12 MAC verification bypass due to missing macData enforcement and improper asn1.validate routine.
  • [asn1] Add fromDer() max recursion depth check.
    • Add a asn1.maxDepth global configurable maximum depth of 256.
    • Add a asn1.fromDer() per-call maxDepth option.
    • NOTE: The default maximum is assumed to be higher than needed for valid data. If this assumption is false then this could be a breaking change. Please file an issue if there are use cases that need a higher maximum.
    • NOTE: The per-call maxDepth parameter has not been exposed up through all of the API stack due to the complexities involved. Please file an issue if there are use cases that require this instead of changing the default

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [node-forge](https://github.com/digitalbazaar/forge) from 1.3.1 to 1.3.3.
- [Changelog](https://github.com/digitalbazaar/forge/blob/main/CHANGELOG.md)
- [Commits](digitalbazaar/forge@v1.3.1...v1.3.3)

---
updated-dependencies:
- dependency-name: node-forge
  dependency-version: 1.3.3
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code labels Mar 6, 2026
tbonelee pushed a commit that referenced this pull request Mar 9, 2026
### What is this PR for?
Resolved all 16 npm audit vulnerabilities (8 high, 6 moderate, 2 low) in zeppelin-web-angular/projects/zeppelin-react.

Direct dependency upgrades:
- webpack 5.88.0 → 5.105.4 (moderate: DOM Clobbering XSS, SSRF)
- webpack-dev-server 4.15.0 → 5.2.3 (moderate: source code theft vulnerability)
- <at>antv/g2plot 2.4.35 → 2.3.32 (high: XSS, Path Traversal)
  - g2plot 2.4.35 pulls in fmin → rollup<at>2.x as transitive dependency, which has 2 high severity vulnerabilities
  - g2plot 2.3.32 does not depend on fmin, so rollup is removed entirely
  - No API breaking changes — Column, Line, Pie, Scatter all available in 2.3.32
- xlsx 0.18.5 → replaced with xlsx-js-style 1.2.0 (high: Prototype Pollution, ReDoS)
  - All versions of xlsx on npm are vulnerable with no patched version available
  - xlsx-js-style is an API-compatible community fork with the vulnerabilities fixed
- <at>types/xlsx 0.0.36 → removed (no longer needed after xlsx replacement)

Transitive dependency fixes (via npm audit fix):
- lodash 4.17.21 → 4.17.23 (moderate: Prototype Pollution)
- lodash-es 4.17.21 → 4.17.23 (moderate: Prototype Pollution)
- node-forge 1.3.1 → 1.3.3 (high: ASN.1 vulnerabilities)
- serialize-javascript — resolved via webpack upgrade (high: RCE, dep removed in newer terser-webpack-plugin)
- qs/express/body-parser — audit fix (moderate: DoS)
- ajv — audit fix (moderate: ReDoS)

Constraints:
- Node 18 environment maintained (serialize-javascript 7.x requires Node >= 20, resolved by upgrading webpack instead)

Verification:
- npm audit → 0 vulnerabilities
- npm run build → success

Related Dependabot PRs (redundant, to be closed):
- #5168, #5169, #5170, #5171, #5172, #5173


### What type of PR is it?
Hot Fix

### Todos

### What is the Jira issue?
ZEPPELIN-6401

### How should this be tested?

### Screenshots (if appropriate)

### Questions:
* Does the license files need to update? No
* Is there breaking changes for older versions? No
* Does this needs documentation? No

Closes #5176 from dididy/fix/zeppelin-react-audit.

Signed-off-by: ChanHo Lee <chanholee@apache.org>
@tbonelee
Copy link
Contributor

tbonelee commented Mar 9, 2026

@dependabot rebase

@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Mar 9, 2026

Looks like node-forge is no longer a dependency, so this is no longer needed.

@dependabot dependabot bot closed this Mar 9, 2026
@dependabot dependabot bot deleted the dependabot/npm_and_yarn/zeppelin-web-angular/projects/zeppelin-react/node-forge-1.3.3 branch March 9, 2026 14:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant