apollo-server-core@3.10.4 vulnerabilities

Core engine for Apollo GraphQL server

Direct Vulnerabilities

Known vulnerabilities in the apollo-server-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Information Exposure

apollo-server-core is a core module of the Apollo community GraphQL Server.

Affected versions of this package are vulnerable to Information Exposure when it can log sensitive information, such as Studio API keys, if they are passed incorrectly with leading/trailing whitespace or if they have any characters that are invalid as part of a header value.

Note Users are affected only if all the conditions are true:

  • Use either the schema reporting or usage reporting feature.

  • Use an Apollo Studio API key which has invalid header values.

  • Use the default fetcher (node-fetch) or configure their own node-fetch fetcher

How to fix Information Exposure?

Upgrade apollo-server-core to version 2.26.1, 3.12.1 or higher.

<2.26.1 >=3.0.0 <3.12.1
  • M
Cache Poisoning

apollo-server-core is a core module of the Apollo community GraphQL Server.

Affected versions of this package are vulnerable to Cache Poisoning when processing batch POST requests. The cache-control response header can be manipulated to cause data that should not be shared to be accessible by other clients via a reverse proxy such as a CDN, or by a browser.

Plugins assemble separate response headers in parallel for each operation in a batch, and then the header sets are merged together. If plugins set the same header on multiple operations, one value is chosen arbitrarily, and its cache policy is applied. This allows the responses from operations whose policy does not allow caching to be cached.

How to fix Cache Poisoning?

Upgrade apollo-server-core to version 3.11.0 or higher.

>=3.0.0 <3.11.0