-
Notifications
You must be signed in to change notification settings - Fork 358
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Magento vulnerabilities should cover the magento/project-community-edition
package as well
#5245
Comments
Hi @bbutkovic, thank you for reaching out about adding Additionally, I noticed that the latest version of I compiled a list of advisories with lower bounds on their vulnerable version ranges that include GHSA-269w-pqc7-68q9 I'm going to show these advisories to my colleagues to see how we want to handle |
Hi! Good news, let me know what you decide. Magento's repos currently publish new versions under Maybe someone can correct me, but it looks to me like |
Currently, advisories for Magento only reference the
magento/community-edition
package, notmagento/project-community-edition
.A lot of Magento websites are set up to pull packages from Magento's own repos (https://repo.magento.com/), meaning they use the
magento/project-community-edition
metapackage, notmagento/community-edition
, making reports formagento/community-edition
not apply for vulnerabilities in Magento's repos. Magento advises installs to use theproject-*
metapackage in their official documentation, too.An example of the recent CVE-2024-34102 shows exactly this.
This is unfortunate as Dependabot alerts for Magento projects are essentially ineffective as Dependabot will not check for vulnerabilities in
magento/community-edition
.FriendsOfPHP actually refer only to the
magento/project-community-edition
package in their advisory.Perhaps it would be good to add
magento/project-community-edition
to theaffected
array retroactively and in future vulnerabilities.I can update the current GHSAs with the added package if needed.
The text was updated successfully, but these errors were encountered: