By default qs protects against attacks that attempt to overwrite an object's existing prototype properties, such as toString(), hasOwnProperty(),etc. Overwriting these properties can impact application logic, potentially allowing attackers to work around security controls, modify data, make the application unstable and more. In versions of the package affected by this vulnerability, it is possible to circumvent this protection and overwrite prototype properties and functions by prefixing the name of the parameter with [ or ]. e.g. qs.parse("]=toString") will return {toString = true}, as a result, calling toString() on the object will throw an exception. References: https://snyk.io/vuln/npm:qs:20170213 Upstream patches: https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d https://github.com/ljharb/qs/commit/12152db9
Created nodejs-qs tracking bugs for this issue: Affects: epel-6 [bug 1427875] Affects: epel-7 [bug 1427876] Affects: fedora-all [bug 1427874]
rh-nodejs4-nodejs-qs is based on nodejs-qs-1.2.2, which does not have support for the allowPrototypes options, and is thus not affected by this.
External References: https://snyk.io/vuln/npm:qs:20170213
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS Via RHSA-2017:2672 https://access.redhat.com/errata/RHSA-2017:2672
Statement: Red Hat Quay include nodejs-qs as a build time dependency. Nodejs-qs is used by protractor for testing as build time, and is not included as runtime.