You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, advisories for Magento only reference the magento/community-edition package, not magento/project-community-edition.
A lot of Magento websites are set up to pull packages from Magento's own repos (https://repo.magento.com/), meaning they use the magento/project-community-edition metapackage, not magento/community-edition, making reports for magento/community-edition not apply for vulnerabilities in Magento's repos. Magento advises installs to use the project-* metapackage in their official documentation, too.
An example of the recent CVE-2024-34102 shows exactly this.
This is unfortunate as Dependabot alerts for Magento projects are essentially ineffective as Dependabot will not check for vulnerabilities in magento/community-edition.
Hi @bbutkovic, thank you for reaching out about adding magento/project-community-edition to advisories that currently only have magento/community-edition listed as an affected product. Community contributions support changing only one advisory per pull request, so updating the advisories isn't as straightforward as merging one bulk pull request.
Additionally, I noticed that the latest version of magento/project-community-edition is 2.0.2, but 197 of the advisories that list magento/community-edition as an affected product have a lower bound on their vulnerable version ranges, such as >= 2.2 or >= 2.3, that is higher than 2.0.2. GHSA-3q5x-7mxp-rp6j is an example of an advisory that lists 2.2 as the lowest vulnerable version. I don't want to issue unnecessary alerts if it turns out that magento/community-edition didn't become vulnerable to a particular issue until after magento/project-community-edition stopped releasing new versions.
I compiled a list of advisories with lower bounds on their vulnerable version ranges that include magento/project-community-edition's latest version. They are:
I'm going to show these advisories to my colleagues to see how we want to handle magento/project-community-edition. Thanks for bringing magento/project-community-edition and I'll keep you posted on what our plans our with respect to these advisories.
Currently, advisories for Magento only reference the
magento/community-edition
package, notmagento/project-community-edition
.A lot of Magento websites are set up to pull packages from Magento's own repos (https://repo.magento.com/), meaning they use the
magento/project-community-edition
metapackage, notmagento/community-edition
, making reports formagento/community-edition
not apply for vulnerabilities in Magento's repos. Magento advises installs to use theproject-*
metapackage in their official documentation, too.An example of the recent CVE-2024-34102 shows exactly this.
This is unfortunate as Dependabot alerts for Magento projects are essentially ineffective as Dependabot will not check for vulnerabilities in
magento/community-edition
.FriendsOfPHP actually refer only to the
magento/project-community-edition
package in their advisory.Perhaps it would be good to add
magento/project-community-edition
to theaffected
array retroactively and in future vulnerabilities.I can update the current GHSAs with the added package if needed.
The text was updated successfully, but these errors were encountered: