@grpc/grpc-js@0.6.14 vulnerabilities

gRPC Library for Node - pure JS implementation

Direct Vulnerabilities

Known vulnerabilities in the @grpc/grpc-js package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Uncontrolled Resource Consumption

@grpc/grpc-js is a gRPC Library for Node

Affected versions of this package are vulnerable to Uncontrolled Resource Consumption via the grpc.max_receive_message_length channel option. An attacker can cause a denial of service by sending messages that exceed the configured limits, which are then buffered or decompressed into memory.

How to fix Uncontrolled Resource Consumption?

Upgrade @grpc/grpc-js to version 1.8.22, 1.9.15, 1.10.9 or higher.

<1.8.22 >=1.9.0 <1.9.15 >=1.10.0 <1.10.9
  • H
Prototype Pollution

@grpc/grpc-js is a gRPC Library for Node

Affected versions of this package are vulnerable to Prototype Pollution via loadPackageDefinition.

POC:

const { loadPackageDefinition } = require('grpc');
loadPackageDefinition({'__proto__.polluted': true});
console.log(polluted);

How to fix Prototype Pollution?

Upgrade @grpc/grpc-js to version 1.1.8 or higher.

<1.1.8