NODE_ENV in Keystone defaults to development with esbuild
Description
Keystone is a headless CMS for Node.js — built with GraphQL and React.@keystone-6/core@3.0.0 || 3.0.1 users that use NODE_ENV to trigger security-sensitive functionality in their production builds are vulnerable to NODE_ENV being inlined to "development" for user code, irrespective of what your environment variables. If you do not use NODE_ENV in your user code to trigger security-sensitive functionality, you are not impacted by this vulnerability. Any dependencies that use NODE_ENV to trigger particular behaviors (optimizations, security or otherwise) should still respect your environment's configured NODE_ENV variable. The application's dependencies, as found in node_modules (including @keystone-6/core), are typically not compiled as part of this process, and thus should be unaffected. We have tested this assumption by verifying that NODE_ENV=production yarn keystone start still uses secure cookies when using statelessSessions. This vulnerability has been fixed in @keystone-6/core@3.0.2, regression tests have been added for this vulnerability in #8063.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@keystone-6/corenpm | >= 3.0.0, < 3.0.2 | 3.0.2 |
Affected products
1- Range: >= 3.0.0, < 3.0.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-25mx-2mxm-6343ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-39382ghsaADVISORY
- github.com/keystonejs/keystone/pull/8031ghsaWEB
- github.com/keystonejs/keystone/pull/8063ghsaWEB
- github.com/keystonejs/keystone/security/advisories/GHSA-25mx-2mxm-6343ghsaWEB
- github.com/keystonejs/keystone/pull/8031/mitre
News mentions
0No linked articles in our index yet.