3.13.0
8 years ago
2 years ago
Package is deprecated
Known vulnerabilities in the apollo-server-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
apollo-server-core is a core module of the Apollo community GraphQL Server. Affected versions of this package are vulnerable to Information Exposure in the request handling process. An attacker can infer sensitive information about server responses by issuing specially crafted authenticated GraphQL queries across origins using a browser with a specific CORS implementation bug, allowing them to analyze response times and deduce facts such as whether fields return null or the approximate number of list entries returned from fields. Note: This is only exploitable if the server relies on cookies or HTTP Basic Auth for authentication and the attack is performed from a browser affected by the CORS bug. How to fix Information Exposure? A fix was pushed into the | * |
apollo-server-core is a core module of the Apollo community GraphQL Server. Affected versions of this package are vulnerable to Information Exposure when it can log sensitive information, such as Studio API keys, if they are passed incorrectly with leading/trailing whitespace or if they have any characters that are invalid as part of a header value. Note Users are affected only if all the conditions are true:
How to fix Information Exposure? Upgrade | <2.26.1>=3.0.0 <3.12.1 |
apollo-server-core is a core module of the Apollo community GraphQL Server. Affected versions of this package are vulnerable to Denial of Service (DoS) by accepting an unbounded amount of memory in the cache. NOTE:
The size of a cache can be limited with the How to fix Denial of Service (DoS)? Upgrade | <3.9.0 |
apollo-server-core is a core module of the Apollo community GraphQL Server. Affected versions of this package are vulnerable to Information Exposure. It does not properly enforce validation rules when creating subscription servers, which includes a How to fix Information Exposure? Upgrade | <2.14.2 |