Skip to content
  • Recent
  • Tags
  • 0 Unread 0
  • Categories
  • Unreplied
  • Popular
  • GitHub
  • Docu
  • Hilfe
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Logo
  1. ioBroker Community Home
  2. Deutsch
  3. ioBroker Allgemein
  4. js-controller 4.0.x jetzt für alle User im STABLE!

NEWS

  • Wartung am 15.11. – Forum ab 22:00 Uhr nicht erreichbar
    BluefoxB
    Bluefox
    11
    2
    211

  • UPDATE 31.10.: Amazon Alexa - ioBroker Skill läuft aus ?
    apollon77A
    apollon77
    48
    3
    7.9k

  • Monatsrückblick – September 2025
    BluefoxB
    Bluefox
    13
    1
    1.7k

js-controller 4.0.x jetzt für alle User im STABLE!

js-controller 4.0.x jetzt für alle User im STABLE!

Scheduled Pinned Locked Moved ioBroker Allgemein
501 Posts 83 Posters 154.5k Views 58 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • apollon77A apollon77

    Heute kommt auch das js.controller update 4.0.18 ins Stable mit einigen kleineren Bugfixes die noch aufgefallen waren.

    P Offline
    P Offline
    Pupsimupsi
    wrote on last edited by
    #163

    @apollon77

    Die Installation 4.0.18 wurde mir heute angeboten und hat soweit auch problemlos geklappt.
    Alles läuft!
    Habe jedoch diese Meldungen beim Update bekommen:

    The following notifications happened during sync: 
    - Ignoring Directory "info.admin" because officially not created as meta object. Please remove directory!
    - Ignoring Directory "netatmo-energy.admin" because officially not created as meta object. Please remove directory!
    

    Was bedeutet das?
    Kann oder muss ich da was tun?

    apollon77A 1 Reply Last reply
    0
    • P Pupsimupsi

      @apollon77

      Die Installation 4.0.18 wurde mir heute angeboten und hat soweit auch problemlos geklappt.
      Alles läuft!
      Habe jedoch diese Meldungen beim Update bekommen:

      The following notifications happened during sync: 
      - Ignoring Directory "info.admin" because officially not created as meta object. Please remove directory!
      - Ignoring Directory "netatmo-energy.admin" because officially not created as meta object. Please remove directory!
      

      Was bedeutet das?
      Kann oder muss ich da was tun?

      apollon77A Offline
      apollon77A Offline
      apollon77
      wrote on last edited by
      #164

      @pupsimupsi sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

      Was bedeutet das?
      Kann oder muss ich da was tun?

      Steht oben in der FAQ ... Post #2 in diesem Thread 🙂

      Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

      • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
      • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
      P Mr EnglishM 2 Replies Last reply
      1
      • apollon77A apollon77

        @pupsimupsi sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

        Was bedeutet das?
        Kann oder muss ich da was tun?

        Steht oben in der FAQ ... Post #2 in diesem Thread 🙂

        P Offline
        P Offline
        Pupsimupsi
        wrote on last edited by
        #165

        @apollon77

        DANKE und sorry!
        Habe nach dem erfolgreichen Update auf Version 4 nicht damit gerechnet das nach einem weiteren Update auf eine höhere 4er Version die gleichen Fehler passieren können...

        Habe gerade "iob upload all" durchgeführt.
        War´s das?
        Kann ich das iwie prüfen ob nun alles OK ist?

        apollon77A 1 Reply Last reply
        0
        • P Pupsimupsi

          @apollon77

          DANKE und sorry!
          Habe nach dem erfolgreichen Update auf Version 4 nicht damit gerechnet das nach einem weiteren Update auf eine höhere 4er Version die gleichen Fehler passieren können...

          Habe gerade "iob upload all" durchgeführt.
          War´s das?
          Kann ich das iwie prüfen ob nun alles OK ist?

          apollon77A Offline
          apollon77A Offline
          apollon77
          wrote on last edited by
          #166

          @pupsimupsi Jett liess nochmal oben ... da steht was Du tun kannst wenn diese meldungen kommen. Da sind Daten "out of sync" oder wurden ggf nicht aufgeräumt irgendwann mal. Da steht nicht das irgendein Automatismus dies gefixt hat.

          Und für dich mal herkopiert was oben steht:

          Bitte ein iob upload all ausführen. Falls Einträge von Adaptern enthalten sein sollten die nicht mehr installiert sind, dann können diese Dateien manuell gelöscht werden.

          Aaaaalllssoooooo ... sind denn info und netatmo-energy bei Dir noch installiert?

          Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

          • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
          • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
          P 1 Reply Last reply
          0
          • apollon77A apollon77

            @pupsimupsi Jett liess nochmal oben ... da steht was Du tun kannst wenn diese meldungen kommen. Da sind Daten "out of sync" oder wurden ggf nicht aufgeräumt irgendwann mal. Da steht nicht das irgendein Automatismus dies gefixt hat.

            Und für dich mal herkopiert was oben steht:

            Bitte ein iob upload all ausführen. Falls Einträge von Adaptern enthalten sein sollten die nicht mehr installiert sind, dann können diese Dateien manuell gelöscht werden.

            Aaaaalllssoooooo ... sind denn info und netatmo-energy bei Dir noch installiert?

            P Offline
            P Offline
            Pupsimupsi
            wrote on last edited by
            #167

            @apollon77

            Aaaaalllssoooooo:
            Da muss wohl etwas falsch rüber gekommen sein...!?
            Ich habe, wie gesagt, nach deinem Hinweis, die FAQ gelesen und "iob upload all" ausgeführt.

            Von nem automatischem Fix o.Ä., hab ich nie gesprochen...🤔
            Ich wollte lediglich wissen, ob ich evtl. irgendwie überprüfen kann, dass nun (nach dem iob upload all) alles "OK" ist.
            Sorry für´s Nachfragen. Das verkneif ich mir in Zukunft...😞

            Ja, sind beide noch installiert.
            Netatmo-energy sogar recht frisch. Erst seit ein paar Tagen.

            F apollon77A 2 Replies Last reply
            0
            • P Pupsimupsi

              @apollon77

              Aaaaalllssoooooo:
              Da muss wohl etwas falsch rüber gekommen sein...!?
              Ich habe, wie gesagt, nach deinem Hinweis, die FAQ gelesen und "iob upload all" ausgeführt.

              Von nem automatischem Fix o.Ä., hab ich nie gesprochen...🤔
              Ich wollte lediglich wissen, ob ich evtl. irgendwie überprüfen kann, dass nun (nach dem iob upload all) alles "OK" ist.
              Sorry für´s Nachfragen. Das verkneif ich mir in Zukunft...😞

              Ja, sind beide noch installiert.
              Netatmo-energy sogar recht frisch. Erst seit ein paar Tagen.

              F Offline
              F Offline
              Feinfinger
              wrote on last edited by
              #168

              Hallo zusammen,

              bekomme beim Versich von 4.0.15 auf 4.0.18 upzudaten folgenden Fehler:

              host.ioBroker Cannot install iobroker.js-controller@4.0.18: 217
              

              Ich bin nach Anleitung vorgegangen, also iob stop, iob update, iob fix und dann iob upgrade self.

              iob als LXC im Proxmox
              Node.js: v22.19.0
              NPM: 10.9.3
              js-controller 7.0.7

              arteckA 1 Reply Last reply
              0
              • F Feinfinger

                Hallo zusammen,

                bekomme beim Versich von 4.0.15 auf 4.0.18 upzudaten folgenden Fehler:

                host.ioBroker Cannot install iobroker.js-controller@4.0.18: 217
                

                Ich bin nach Anleitung vorgegangen, also iob stop, iob update, iob fix und dann iob upgrade self.

                arteckA Offline
                arteckA Offline
                arteck
                Developer Most Active
                wrote on last edited by
                #169

                @feinfinger da wird was mit npm sein

                machmal

                npm i iobroker.js-controller@4.0.18 --production
                

                dann siehst du wo es hängt

                zigbee hab ich, zwave auch, nuc's genauso und HA auch

                F 1 Reply Last reply
                0
                • P Pupsimupsi

                  @apollon77

                  Aaaaalllssoooooo:
                  Da muss wohl etwas falsch rüber gekommen sein...!?
                  Ich habe, wie gesagt, nach deinem Hinweis, die FAQ gelesen und "iob upload all" ausgeführt.

                  Von nem automatischem Fix o.Ä., hab ich nie gesprochen...🤔
                  Ich wollte lediglich wissen, ob ich evtl. irgendwie überprüfen kann, dass nun (nach dem iob upload all) alles "OK" ist.
                  Sorry für´s Nachfragen. Das verkneif ich mir in Zukunft...😞

                  Ja, sind beide noch installiert.
                  Netatmo-energy sogar recht frisch. Erst seit ein paar Tagen.

                  apollon77A Offline
                  apollon77A Offline
                  apollon77
                  wrote on last edited by
                  #170

                  @pupsimupsi sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                  Sorry für´s Nachfragen. Das verkneif ich mir in Zukunft...

                  Alles gut, nachfragen darf man immer. Wenn nur Infos fehlen was Du gemacht hast kann ich nur bestmöglich raten ... Und dann kommen manchmal solche Antworten bei raus.

                  Ja, sind beide noch installiert.
                  Netatmo-energy sogar recht frisch. Erst seit ein paar Tagen.

                  Dann sollte das "upload all" das Problem gefixt haben ... wirst DU beim nächsten js-controller update sehen 🙂

                  Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

                  • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
                  • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
                  1 Reply Last reply
                  1
                  • arteckA arteck

                    @feinfinger da wird was mit npm sein

                    machmal

                    npm i iobroker.js-controller@4.0.18 --production
                    

                    dann siehst du wo es hängt

                    F Offline
                    F Offline
                    Feinfinger
                    wrote on last edited by
                    #171

                    @arteck

                    root@ioBroker:~# npm i iobroker.js-controller@4.0.18 --production
                    
                    added 150 packages, removed 169 packages, changed 46 packages, and audited 311 packages in 1m
                    
                    16 packages are looking for funding
                      run `npm fund` for details
                    
                    4 moderate severity vulnerabilities
                    
                    To address all issues (including breaking changes), run:
                      npm audit fix --force
                    
                    Run `npm audit` for details.
                    root@ioBroker:~# npm fund
                    root
                    +-- https://opencollective.com/ioredis
                    |   `-- ioredis@4.28.5
                    +-- https://github.com/sindresorhus/execa?sponsor=1
                    | | `-- execa@5.1.1
                    | `-- https://github.com/sponsors/sindresorhus
                    |     `-- get-stream@6.0.1, is-stream@2.0.1, onetime@5.1.2
                    +-- https://github.com/sponsors/RubenVerborgh
                    |   `-- follow-redirects@1.14.9
                    +-- https://paulmillr.com/funding/
                    | | `-- chokidar@3.5.3
                    | `-- https://github.com/sponsors/jonschlinkert
                    |     `-- picomatch@2.3.1
                    +-- https://github.com/sponsors/feross
                    |   `-- safe-buffer@5.2.1
                    +-- https://github.com/sponsors/ljharb
                    |   `-- is-nan@1.3.2, call-bind@1.0.2, get-intrinsic@1.1.1, has-symbols@1.0.3
                    +-- https://github.com/sponsors/epoberezkin
                    |   `-- ajv@6.12.6
                    `-- https://github.com/chalk/wrap-ansi?sponsor=1
                      | `-- wrap-ansi@7.0.0
                      `-- https://github.com/chalk/ansi-styles?sponsor=1
                          `-- ansi-styles@4.3.0
                    
                    root@ioBroker:~# npm audit
                    # npm audit report
                    
                    ansi-regex  >2.1.1 <5.0.1
                    Severity: moderate
                     Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
                    fix available via `npm audit fix`
                    node_modules/ansi-regex
                      strip-ansi  4.0.0 - 5.2.0
                      Depends on vulnerable versions of ansi-regex
                      node_modules/strip-ansi
                        cliui  4.0.0 - 5.0.0
                        Depends on vulnerable versions of strip-ansi
                        node_modules/cliui
                          yargs  8.0.0-candidate.0 - 15.0.0
                          Depends on vulnerable versions of cliui
                          Depends on vulnerable versions of yargs-parser
                          node_modules/yargs
                            iobroker.js-controller  <=2.1.1
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            node_modules/iobroker.js-controller
                        string-width  2.1.0 - 4.1.0
                        Depends on vulnerable versions of strip-ansi
                        node_modules/string-width
                    
                    debug  <2.6.9
                    Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                    fix available via `npm audit fix`
                    node_modules/engine.io-client/node_modules/debug
                    node_modules/engine.io/node_modules/debug
                    node_modules/socket.io-adapter/node_modules/debug
                    node_modules/socket.io-client/node_modules/debug
                    node_modules/socket.io-parser/node_modules/debug
                    node_modules/socket.io/node_modules/debug
                      engine.io  <=4.0.0-alpha.1
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of ws
                      node_modules/engine.io
                        socket.io  <=2.4.1
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                      engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of parsejson
                      Depends on vulnerable versions of ws
                      Depends on vulnerable versions of xmlhttprequest-ssl
                      node_modules/engine.io-client
                        socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io-client
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io-client
                      socket.io-adapter  <=1.1.0
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of socket.io-parser
                      node_modules/socket.io-adapter
                      socket.io-parser  <=3.3.1
                      Depends on vulnerable versions of debug
                      node_modules/socket.io-parser
                    
                    engine.io  <=4.0.0-alpha.1
                    Severity: high
                    Resource exhaustion in engine.io  - https://github.com/advisories/GHSA-j4f2-536g-r55m
                    Depends on vulnerable versions of debug
                    Depends on vulnerable versions of ws
                    fix available via `npm audit fix`
                    node_modules/engine.io
                      socket.io  <=2.4.1
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of engine.io
                      Depends on vulnerable versions of socket.io-parser
                      node_modules/socket.io
                        iobroker.js-controller  <=2.1.1
                        Depends on vulnerable versions of redis
                        Depends on vulnerable versions of socket.io
                        Depends on vulnerable versions of socket.io-client
                        Depends on vulnerable versions of winston-daily-rotate-file
                        Depends on vulnerable versions of yargs
                        node_modules/iobroker.js-controller
                    
                    iobroker.js-controller  <=2.1.1
                    Severity: high
                    Arbitrary File Write in iobroker.js-controller - https://github.com/advisories/GHSA-cmch-296j-wfvw
                    Depends on vulnerable versions of redis
                    Depends on vulnerable versions of socket.io
                    Depends on vulnerable versions of socket.io-client
                    Depends on vulnerable versions of winston-daily-rotate-file
                    Depends on vulnerable versions of yargs
                    fix available via `npm audit fix`
                    node_modules/iobroker.js-controller
                    
                    minimist  <0.2.1
                    Severity: moderate
                    Prototype Pollution in minimist - https://github.com/advisories/GHSA-vh95-rmgr-6w4m
                    fix available via `npm audit fix`
                    node_modules/winston-daily-rotate-file/node_modules/minimist
                      mkdirp  0.4.1 - 0.5.1
                      Depends on vulnerable versions of minimist
                      node_modules/winston-daily-rotate-file/node_modules/mkdirp
                        winston-daily-rotate-file  1.7.0 - 1.7.2
                        Depends on vulnerable versions of mkdirp
                        node_modules/winston-daily-rotate-file
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                    
                    parsejson  *
                    Severity: high
                    Regular Expression Denial of Service in parsejson - https://github.com/advisories/GHSA-q75g-2496-mxpp
                    fix available via `npm audit fix`
                    node_modules/parsejson
                      engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of parsejson
                      Depends on vulnerable versions of ws
                      Depends on vulnerable versions of xmlhttprequest-ssl
                      node_modules/engine.io-client
                        socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io-client
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io-client
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                    
                    redis  2.6.0 - 3.1.0
                    Potential exponential regex in monitor mode - https://github.com/advisories/GHSA-35q2-47q7-3pc3
                    fix available via `npm audit fix`
                    node_modules/redis
                      iobroker.js-controller  <=2.1.1
                      Depends on vulnerable versions of redis
                      Depends on vulnerable versions of socket.io
                      Depends on vulnerable versions of socket.io-client
                      Depends on vulnerable versions of winston-daily-rotate-file
                      Depends on vulnerable versions of yargs
                      node_modules/iobroker.js-controller
                    
                    socket.io  <=2.4.1
                    Severity: high
                    Insecure defaults due to CORS misconfiguration in socket.io - https://github.com/advisories/GHSA-fxwf-4rqh-v8g3
                    Depends on vulnerable versions of debug
                    Depends on vulnerable versions of engine.io
                    Depends on vulnerable versions of socket.io-parser
                    fix available via `npm audit fix`
                    node_modules/socket.io
                      iobroker.js-controller  <=2.1.1
                      Depends on vulnerable versions of redis
                      Depends on vulnerable versions of socket.io
                      Depends on vulnerable versions of socket.io-client
                      Depends on vulnerable versions of winston-daily-rotate-file
                      Depends on vulnerable versions of yargs
                      node_modules/iobroker.js-controller
                    
                    socket.io-parser  <=3.3.1
                    Severity: high
                    Resource exhaustion in socket.io-parser - https://github.com/advisories/GHSA-xfhh-g9f5-x4m4
                    Depends on vulnerable versions of debug
                    fix available via `npm audit fix`
                    node_modules/socket.io-parser
                      socket.io  <=2.4.1
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of engine.io
                      Depends on vulnerable versions of socket.io-parser
                      node_modules/socket.io
                        iobroker.js-controller  <=2.1.1
                        Depends on vulnerable versions of redis
                        Depends on vulnerable versions of socket.io
                        Depends on vulnerable versions of socket.io-client
                        Depends on vulnerable versions of winston-daily-rotate-file
                        Depends on vulnerable versions of yargs
                        node_modules/iobroker.js-controller
                      socket.io-adapter  <=1.1.0
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of socket.io-parser
                      node_modules/socket.io-adapter
                      socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of engine.io-client
                      Depends on vulnerable versions of socket.io-parser
                      node_modules/socket.io-client
                    
                    ws  <=1.1.4
                    Severity: high
                    Denial of Service in ws - https://github.com/advisories/GHSA-5v72-xg48-5rpm
                    fix available via `npm audit fix`
                    node_modules/engine.io-client/node_modules/ws
                    node_modules/engine.io/node_modules/ws
                      engine.io  <=4.0.0-alpha.1
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of ws
                      node_modules/engine.io
                        socket.io  <=2.4.1
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                      engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of parsejson
                      Depends on vulnerable versions of ws
                      Depends on vulnerable versions of xmlhttprequest-ssl
                      node_modules/engine.io-client
                        socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io-client
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io-client
                    
                    xmlhttprequest-ssl  <=1.6.1
                    Severity: critical
                    Improper Certificate Validation in xmlhttprequest-ssl - https://github.com/advisories/GHSA-72mh-269x-7mh5
                    Arbitrary Code Injection - https://github.com/advisories/GHSA-h4j5-c7cj-74xg
                    fix available via `npm audit fix`
                    node_modules/xmlhttprequest-ssl
                      engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of parsejson
                      Depends on vulnerable versions of ws
                      Depends on vulnerable versions of xmlhttprequest-ssl
                      node_modules/engine.io-client
                        socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io-client
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io-client
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                    
                    yargs-parser  6.0.0 - 13.1.1
                    Severity: moderate
                    Prototype Pollution in yargs-parser - https://github.com/advisories/GHSA-p9pc-299p-vxgp
                    fix available via `npm audit fix`
                    node_modules/yargs-parser
                      yargs  8.0.0-candidate.0 - 15.0.0
                      Depends on vulnerable versions of cliui
                      Depends on vulnerable versions of yargs-parser
                      node_modules/yargs
                        iobroker.js-controller  <=2.1.1
                        Depends on vulnerable versions of redis
                        Depends on vulnerable versions of socket.io
                        Depends on vulnerable versions of socket.io-client
                        Depends on vulnerable versions of winston-daily-rotate-file
                        Depends on vulnerable versions of yargs
                        node_modules/iobroker.js-controller
                    
                    21 vulnerabilities (2 low, 9 moderate, 7 high, 3 critical)
                    
                    To address all issues, run:
                      npm audit fix
                    

                    bedeutet das ein npm audit fix ausführen?

                    iob als LXC im Proxmox
                    Node.js: v22.19.0
                    NPM: 10.9.3
                    js-controller 7.0.7

                    arteckA Thomas BraunT 2 Replies Last reply
                    0
                    • F Feinfinger

                      @arteck

                      root@ioBroker:~# npm i iobroker.js-controller@4.0.18 --production
                      
                      added 150 packages, removed 169 packages, changed 46 packages, and audited 311 packages in 1m
                      
                      16 packages are looking for funding
                        run `npm fund` for details
                      
                      4 moderate severity vulnerabilities
                      
                      To address all issues (including breaking changes), run:
                        npm audit fix --force
                      
                      Run `npm audit` for details.
                      root@ioBroker:~# npm fund
                      root
                      +-- https://opencollective.com/ioredis
                      |   `-- ioredis@4.28.5
                      +-- https://github.com/sindresorhus/execa?sponsor=1
                      | | `-- execa@5.1.1
                      | `-- https://github.com/sponsors/sindresorhus
                      |     `-- get-stream@6.0.1, is-stream@2.0.1, onetime@5.1.2
                      +-- https://github.com/sponsors/RubenVerborgh
                      |   `-- follow-redirects@1.14.9
                      +-- https://paulmillr.com/funding/
                      | | `-- chokidar@3.5.3
                      | `-- https://github.com/sponsors/jonschlinkert
                      |     `-- picomatch@2.3.1
                      +-- https://github.com/sponsors/feross
                      |   `-- safe-buffer@5.2.1
                      +-- https://github.com/sponsors/ljharb
                      |   `-- is-nan@1.3.2, call-bind@1.0.2, get-intrinsic@1.1.1, has-symbols@1.0.3
                      +-- https://github.com/sponsors/epoberezkin
                      |   `-- ajv@6.12.6
                      `-- https://github.com/chalk/wrap-ansi?sponsor=1
                        | `-- wrap-ansi@7.0.0
                        `-- https://github.com/chalk/ansi-styles?sponsor=1
                            `-- ansi-styles@4.3.0
                      
                      root@ioBroker:~# npm audit
                      # npm audit report
                      
                      ansi-regex  >2.1.1 <5.0.1
                      Severity: moderate
                       Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
                      fix available via `npm audit fix`
                      node_modules/ansi-regex
                        strip-ansi  4.0.0 - 5.2.0
                        Depends on vulnerable versions of ansi-regex
                        node_modules/strip-ansi
                          cliui  4.0.0 - 5.0.0
                          Depends on vulnerable versions of strip-ansi
                          node_modules/cliui
                            yargs  8.0.0-candidate.0 - 15.0.0
                            Depends on vulnerable versions of cliui
                            Depends on vulnerable versions of yargs-parser
                            node_modules/yargs
                              iobroker.js-controller  <=2.1.1
                              Depends on vulnerable versions of redis
                              Depends on vulnerable versions of socket.io
                              Depends on vulnerable versions of socket.io-client
                              Depends on vulnerable versions of winston-daily-rotate-file
                              Depends on vulnerable versions of yargs
                              node_modules/iobroker.js-controller
                          string-width  2.1.0 - 4.1.0
                          Depends on vulnerable versions of strip-ansi
                          node_modules/string-width
                      
                      debug  <2.6.9
                      Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                      fix available via `npm audit fix`
                      node_modules/engine.io-client/node_modules/debug
                      node_modules/engine.io/node_modules/debug
                      node_modules/socket.io-adapter/node_modules/debug
                      node_modules/socket.io-client/node_modules/debug
                      node_modules/socket.io-parser/node_modules/debug
                      node_modules/socket.io/node_modules/debug
                        engine.io  <=4.0.0-alpha.1
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of ws
                        node_modules/engine.io
                          socket.io  <=2.4.1
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of engine.io
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io
                            iobroker.js-controller  <=2.1.1
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            node_modules/iobroker.js-controller
                        engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of parsejson
                        Depends on vulnerable versions of ws
                        Depends on vulnerable versions of xmlhttprequest-ssl
                        node_modules/engine.io-client
                          socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of engine.io-client
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io-client
                        socket.io-adapter  <=1.1.0
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io-adapter
                        socket.io-parser  <=3.3.1
                        Depends on vulnerable versions of debug
                        node_modules/socket.io-parser
                      
                      engine.io  <=4.0.0-alpha.1
                      Severity: high
                      Resource exhaustion in engine.io  - https://github.com/advisories/GHSA-j4f2-536g-r55m
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of ws
                      fix available via `npm audit fix`
                      node_modules/engine.io
                        socket.io  <=2.4.1
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                      
                      iobroker.js-controller  <=2.1.1
                      Severity: high
                      Arbitrary File Write in iobroker.js-controller - https://github.com/advisories/GHSA-cmch-296j-wfvw
                      Depends on vulnerable versions of redis
                      Depends on vulnerable versions of socket.io
                      Depends on vulnerable versions of socket.io-client
                      Depends on vulnerable versions of winston-daily-rotate-file
                      Depends on vulnerable versions of yargs
                      fix available via `npm audit fix`
                      node_modules/iobroker.js-controller
                      
                      minimist  <0.2.1
                      Severity: moderate
                      Prototype Pollution in minimist - https://github.com/advisories/GHSA-vh95-rmgr-6w4m
                      fix available via `npm audit fix`
                      node_modules/winston-daily-rotate-file/node_modules/minimist
                        mkdirp  0.4.1 - 0.5.1
                        Depends on vulnerable versions of minimist
                        node_modules/winston-daily-rotate-file/node_modules/mkdirp
                          winston-daily-rotate-file  1.7.0 - 1.7.2
                          Depends on vulnerable versions of mkdirp
                          node_modules/winston-daily-rotate-file
                            iobroker.js-controller  <=2.1.1
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            node_modules/iobroker.js-controller
                      
                      parsejson  *
                      Severity: high
                      Regular Expression Denial of Service in parsejson - https://github.com/advisories/GHSA-q75g-2496-mxpp
                      fix available via `npm audit fix`
                      node_modules/parsejson
                        engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of parsejson
                        Depends on vulnerable versions of ws
                        Depends on vulnerable versions of xmlhttprequest-ssl
                        node_modules/engine.io-client
                          socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of engine.io-client
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io-client
                            iobroker.js-controller  <=2.1.1
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            node_modules/iobroker.js-controller
                      
                      redis  2.6.0 - 3.1.0
                      Potential exponential regex in monitor mode - https://github.com/advisories/GHSA-35q2-47q7-3pc3
                      fix available via `npm audit fix`
                      node_modules/redis
                        iobroker.js-controller  <=2.1.1
                        Depends on vulnerable versions of redis
                        Depends on vulnerable versions of socket.io
                        Depends on vulnerable versions of socket.io-client
                        Depends on vulnerable versions of winston-daily-rotate-file
                        Depends on vulnerable versions of yargs
                        node_modules/iobroker.js-controller
                      
                      socket.io  <=2.4.1
                      Severity: high
                      Insecure defaults due to CORS misconfiguration in socket.io - https://github.com/advisories/GHSA-fxwf-4rqh-v8g3
                      Depends on vulnerable versions of debug
                      Depends on vulnerable versions of engine.io
                      Depends on vulnerable versions of socket.io-parser
                      fix available via `npm audit fix`
                      node_modules/socket.io
                        iobroker.js-controller  <=2.1.1
                        Depends on vulnerable versions of redis
                        Depends on vulnerable versions of socket.io
                        Depends on vulnerable versions of socket.io-client
                        Depends on vulnerable versions of winston-daily-rotate-file
                        Depends on vulnerable versions of yargs
                        node_modules/iobroker.js-controller
                      
                      socket.io-parser  <=3.3.1
                      Severity: high
                      Resource exhaustion in socket.io-parser - https://github.com/advisories/GHSA-xfhh-g9f5-x4m4
                      Depends on vulnerable versions of debug
                      fix available via `npm audit fix`
                      node_modules/socket.io-parser
                        socket.io  <=2.4.1
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                        socket.io-adapter  <=1.1.0
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io-adapter
                        socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io-client
                        Depends on vulnerable versions of socket.io-parser
                        node_modules/socket.io-client
                      
                      ws  <=1.1.4
                      Severity: high
                      Denial of Service in ws - https://github.com/advisories/GHSA-5v72-xg48-5rpm
                      fix available via `npm audit fix`
                      node_modules/engine.io-client/node_modules/ws
                      node_modules/engine.io/node_modules/ws
                        engine.io  <=4.0.0-alpha.1
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of ws
                        node_modules/engine.io
                          socket.io  <=2.4.1
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of engine.io
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io
                            iobroker.js-controller  <=2.1.1
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            node_modules/iobroker.js-controller
                        engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of parsejson
                        Depends on vulnerable versions of ws
                        Depends on vulnerable versions of xmlhttprequest-ssl
                        node_modules/engine.io-client
                          socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of engine.io-client
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io-client
                      
                      xmlhttprequest-ssl  <=1.6.1
                      Severity: critical
                      Improper Certificate Validation in xmlhttprequest-ssl - https://github.com/advisories/GHSA-72mh-269x-7mh5
                      Arbitrary Code Injection - https://github.com/advisories/GHSA-h4j5-c7cj-74xg
                      fix available via `npm audit fix`
                      node_modules/xmlhttprequest-ssl
                        engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of parsejson
                        Depends on vulnerable versions of ws
                        Depends on vulnerable versions of xmlhttprequest-ssl
                        node_modules/engine.io-client
                          socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of engine.io-client
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io-client
                            iobroker.js-controller  <=2.1.1
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            node_modules/iobroker.js-controller
                      
                      yargs-parser  6.0.0 - 13.1.1
                      Severity: moderate
                      Prototype Pollution in yargs-parser - https://github.com/advisories/GHSA-p9pc-299p-vxgp
                      fix available via `npm audit fix`
                      node_modules/yargs-parser
                        yargs  8.0.0-candidate.0 - 15.0.0
                        Depends on vulnerable versions of cliui
                        Depends on vulnerable versions of yargs-parser
                        node_modules/yargs
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                      
                      21 vulnerabilities (2 low, 9 moderate, 7 high, 3 critical)
                      
                      To address all issues, run:
                        npm audit fix
                      

                      bedeutet das ein npm audit fix ausführen?

                      arteckA Offline
                      arteckA Offline
                      arteck
                      Developer Most Active
                      wrote on last edited by arteck
                      #172

                      @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                      bedeutet das ein npm audit fix ausführen?

                      NEIN..

                      und stell dich mal richtig hin

                      cd /opt/iobroker
                      npm i iobroker.js-controller@4.0.18 --production
                      

                      und erst dann

                      wobei mach direkt die .19 drauf

                      npm i iobroker.js-controller@4.0.19 --production
                      

                      zigbee hab ich, zwave auch, nuc's genauso und HA auch

                      F 1 Reply Last reply
                      0
                      • F Feinfinger

                        @arteck

                        root@ioBroker:~# npm i iobroker.js-controller@4.0.18 --production
                        
                        added 150 packages, removed 169 packages, changed 46 packages, and audited 311 packages in 1m
                        
                        16 packages are looking for funding
                          run `npm fund` for details
                        
                        4 moderate severity vulnerabilities
                        
                        To address all issues (including breaking changes), run:
                          npm audit fix --force
                        
                        Run `npm audit` for details.
                        root@ioBroker:~# npm fund
                        root
                        +-- https://opencollective.com/ioredis
                        |   `-- ioredis@4.28.5
                        +-- https://github.com/sindresorhus/execa?sponsor=1
                        | | `-- execa@5.1.1
                        | `-- https://github.com/sponsors/sindresorhus
                        |     `-- get-stream@6.0.1, is-stream@2.0.1, onetime@5.1.2
                        +-- https://github.com/sponsors/RubenVerborgh
                        |   `-- follow-redirects@1.14.9
                        +-- https://paulmillr.com/funding/
                        | | `-- chokidar@3.5.3
                        | `-- https://github.com/sponsors/jonschlinkert
                        |     `-- picomatch@2.3.1
                        +-- https://github.com/sponsors/feross
                        |   `-- safe-buffer@5.2.1
                        +-- https://github.com/sponsors/ljharb
                        |   `-- is-nan@1.3.2, call-bind@1.0.2, get-intrinsic@1.1.1, has-symbols@1.0.3
                        +-- https://github.com/sponsors/epoberezkin
                        |   `-- ajv@6.12.6
                        `-- https://github.com/chalk/wrap-ansi?sponsor=1
                          | `-- wrap-ansi@7.0.0
                          `-- https://github.com/chalk/ansi-styles?sponsor=1
                              `-- ansi-styles@4.3.0
                        
                        root@ioBroker:~# npm audit
                        # npm audit report
                        
                        ansi-regex  >2.1.1 <5.0.1
                        Severity: moderate
                         Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
                        fix available via `npm audit fix`
                        node_modules/ansi-regex
                          strip-ansi  4.0.0 - 5.2.0
                          Depends on vulnerable versions of ansi-regex
                          node_modules/strip-ansi
                            cliui  4.0.0 - 5.0.0
                            Depends on vulnerable versions of strip-ansi
                            node_modules/cliui
                              yargs  8.0.0-candidate.0 - 15.0.0
                              Depends on vulnerable versions of cliui
                              Depends on vulnerable versions of yargs-parser
                              node_modules/yargs
                                iobroker.js-controller  <=2.1.1
                                Depends on vulnerable versions of redis
                                Depends on vulnerable versions of socket.io
                                Depends on vulnerable versions of socket.io-client
                                Depends on vulnerable versions of winston-daily-rotate-file
                                Depends on vulnerable versions of yargs
                                node_modules/iobroker.js-controller
                            string-width  2.1.0 - 4.1.0
                            Depends on vulnerable versions of strip-ansi
                            node_modules/string-width
                        
                        debug  <2.6.9
                        Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                        fix available via `npm audit fix`
                        node_modules/engine.io-client/node_modules/debug
                        node_modules/engine.io/node_modules/debug
                        node_modules/socket.io-adapter/node_modules/debug
                        node_modules/socket.io-client/node_modules/debug
                        node_modules/socket.io-parser/node_modules/debug
                        node_modules/socket.io/node_modules/debug
                          engine.io  <=4.0.0-alpha.1
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of ws
                          node_modules/engine.io
                            socket.io  <=2.4.1
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of engine.io
                            Depends on vulnerable versions of socket.io-parser
                            node_modules/socket.io
                              iobroker.js-controller  <=2.1.1
                              Depends on vulnerable versions of redis
                              Depends on vulnerable versions of socket.io
                              Depends on vulnerable versions of socket.io-client
                              Depends on vulnerable versions of winston-daily-rotate-file
                              Depends on vulnerable versions of yargs
                              node_modules/iobroker.js-controller
                          engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of parsejson
                          Depends on vulnerable versions of ws
                          Depends on vulnerable versions of xmlhttprequest-ssl
                          node_modules/engine.io-client
                            socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of engine.io-client
                            Depends on vulnerable versions of socket.io-parser
                            node_modules/socket.io-client
                          socket.io-adapter  <=1.1.0
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io-adapter
                          socket.io-parser  <=3.3.1
                          Depends on vulnerable versions of debug
                          node_modules/socket.io-parser
                        
                        engine.io  <=4.0.0-alpha.1
                        Severity: high
                        Resource exhaustion in engine.io  - https://github.com/advisories/GHSA-j4f2-536g-r55m
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of ws
                        fix available via `npm audit fix`
                        node_modules/engine.io
                          socket.io  <=2.4.1
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of engine.io
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io
                            iobroker.js-controller  <=2.1.1
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            node_modules/iobroker.js-controller
                        
                        iobroker.js-controller  <=2.1.1
                        Severity: high
                        Arbitrary File Write in iobroker.js-controller - https://github.com/advisories/GHSA-cmch-296j-wfvw
                        Depends on vulnerable versions of redis
                        Depends on vulnerable versions of socket.io
                        Depends on vulnerable versions of socket.io-client
                        Depends on vulnerable versions of winston-daily-rotate-file
                        Depends on vulnerable versions of yargs
                        fix available via `npm audit fix`
                        node_modules/iobroker.js-controller
                        
                        minimist  <0.2.1
                        Severity: moderate
                        Prototype Pollution in minimist - https://github.com/advisories/GHSA-vh95-rmgr-6w4m
                        fix available via `npm audit fix`
                        node_modules/winston-daily-rotate-file/node_modules/minimist
                          mkdirp  0.4.1 - 0.5.1
                          Depends on vulnerable versions of minimist
                          node_modules/winston-daily-rotate-file/node_modules/mkdirp
                            winston-daily-rotate-file  1.7.0 - 1.7.2
                            Depends on vulnerable versions of mkdirp
                            node_modules/winston-daily-rotate-file
                              iobroker.js-controller  <=2.1.1
                              Depends on vulnerable versions of redis
                              Depends on vulnerable versions of socket.io
                              Depends on vulnerable versions of socket.io-client
                              Depends on vulnerable versions of winston-daily-rotate-file
                              Depends on vulnerable versions of yargs
                              node_modules/iobroker.js-controller
                        
                        parsejson  *
                        Severity: high
                        Regular Expression Denial of Service in parsejson - https://github.com/advisories/GHSA-q75g-2496-mxpp
                        fix available via `npm audit fix`
                        node_modules/parsejson
                          engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of parsejson
                          Depends on vulnerable versions of ws
                          Depends on vulnerable versions of xmlhttprequest-ssl
                          node_modules/engine.io-client
                            socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of engine.io-client
                            Depends on vulnerable versions of socket.io-parser
                            node_modules/socket.io-client
                              iobroker.js-controller  <=2.1.1
                              Depends on vulnerable versions of redis
                              Depends on vulnerable versions of socket.io
                              Depends on vulnerable versions of socket.io-client
                              Depends on vulnerable versions of winston-daily-rotate-file
                              Depends on vulnerable versions of yargs
                              node_modules/iobroker.js-controller
                        
                        redis  2.6.0 - 3.1.0
                        Potential exponential regex in monitor mode - https://github.com/advisories/GHSA-35q2-47q7-3pc3
                        fix available via `npm audit fix`
                        node_modules/redis
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                        
                        socket.io  <=2.4.1
                        Severity: high
                        Insecure defaults due to CORS misconfiguration in socket.io - https://github.com/advisories/GHSA-fxwf-4rqh-v8g3
                        Depends on vulnerable versions of debug
                        Depends on vulnerable versions of engine.io
                        Depends on vulnerable versions of socket.io-parser
                        fix available via `npm audit fix`
                        node_modules/socket.io
                          iobroker.js-controller  <=2.1.1
                          Depends on vulnerable versions of redis
                          Depends on vulnerable versions of socket.io
                          Depends on vulnerable versions of socket.io-client
                          Depends on vulnerable versions of winston-daily-rotate-file
                          Depends on vulnerable versions of yargs
                          node_modules/iobroker.js-controller
                        
                        socket.io-parser  <=3.3.1
                        Severity: high
                        Resource exhaustion in socket.io-parser - https://github.com/advisories/GHSA-xfhh-g9f5-x4m4
                        Depends on vulnerable versions of debug
                        fix available via `npm audit fix`
                        node_modules/socket.io-parser
                          socket.io  <=2.4.1
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of engine.io
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io
                            iobroker.js-controller  <=2.1.1
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            node_modules/iobroker.js-controller
                          socket.io-adapter  <=1.1.0
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io-adapter
                          socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of engine.io-client
                          Depends on vulnerable versions of socket.io-parser
                          node_modules/socket.io-client
                        
                        ws  <=1.1.4
                        Severity: high
                        Denial of Service in ws - https://github.com/advisories/GHSA-5v72-xg48-5rpm
                        fix available via `npm audit fix`
                        node_modules/engine.io-client/node_modules/ws
                        node_modules/engine.io/node_modules/ws
                          engine.io  <=4.0.0-alpha.1
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of ws
                          node_modules/engine.io
                            socket.io  <=2.4.1
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of engine.io
                            Depends on vulnerable versions of socket.io-parser
                            node_modules/socket.io
                              iobroker.js-controller  <=2.1.1
                              Depends on vulnerable versions of redis
                              Depends on vulnerable versions of socket.io
                              Depends on vulnerable versions of socket.io-client
                              Depends on vulnerable versions of winston-daily-rotate-file
                              Depends on vulnerable versions of yargs
                              node_modules/iobroker.js-controller
                          engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of parsejson
                          Depends on vulnerable versions of ws
                          Depends on vulnerable versions of xmlhttprequest-ssl
                          node_modules/engine.io-client
                            socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of engine.io-client
                            Depends on vulnerable versions of socket.io-parser
                            node_modules/socket.io-client
                        
                        xmlhttprequest-ssl  <=1.6.1
                        Severity: critical
                        Improper Certificate Validation in xmlhttprequest-ssl - https://github.com/advisories/GHSA-72mh-269x-7mh5
                        Arbitrary Code Injection - https://github.com/advisories/GHSA-h4j5-c7cj-74xg
                        fix available via `npm audit fix`
                        node_modules/xmlhttprequest-ssl
                          engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                          Depends on vulnerable versions of debug
                          Depends on vulnerable versions of parsejson
                          Depends on vulnerable versions of ws
                          Depends on vulnerable versions of xmlhttprequest-ssl
                          node_modules/engine.io-client
                            socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of engine.io-client
                            Depends on vulnerable versions of socket.io-parser
                            node_modules/socket.io-client
                              iobroker.js-controller  <=2.1.1
                              Depends on vulnerable versions of redis
                              Depends on vulnerable versions of socket.io
                              Depends on vulnerable versions of socket.io-client
                              Depends on vulnerable versions of winston-daily-rotate-file
                              Depends on vulnerable versions of yargs
                              node_modules/iobroker.js-controller
                        
                        yargs-parser  6.0.0 - 13.1.1
                        Severity: moderate
                        Prototype Pollution in yargs-parser - https://github.com/advisories/GHSA-p9pc-299p-vxgp
                        fix available via `npm audit fix`
                        node_modules/yargs-parser
                          yargs  8.0.0-candidate.0 - 15.0.0
                          Depends on vulnerable versions of cliui
                          Depends on vulnerable versions of yargs-parser
                          node_modules/yargs
                            iobroker.js-controller  <=2.1.1
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            node_modules/iobroker.js-controller
                        
                        21 vulnerabilities (2 low, 9 moderate, 7 high, 3 critical)
                        
                        To address all issues, run:
                          npm audit fix
                        

                        bedeutet das ein npm audit fix ausführen?

                        Thomas BraunT Offline
                        Thomas BraunT Offline
                        Thomas Braun
                        Most Active
                        wrote on last edited by
                        #173

                        @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                        root@ioBroker

                        Und hüpf da nicht als root rum.

                        Linux-Werkzeugkasten:
                        https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                        NodeJS Fixer Skript:
                        https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                        iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                        1 Reply Last reply
                        0
                        • arteckA arteck

                          @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                          bedeutet das ein npm audit fix ausführen?

                          NEIN..

                          und stell dich mal richtig hin

                          cd /opt/iobroker
                          npm i iobroker.js-controller@4.0.18 --production
                          

                          und erst dann

                          wobei mach direkt die .19 drauf

                          npm i iobroker.js-controller@4.0.19 --production
                          
                          F Offline
                          F Offline
                          Feinfinger
                          wrote on last edited by
                          #174

                          @arteck

                          Danke für die Hilfe, aber da ist wohl mehr im Busch.

                          Frage mich, warum updates bisher immer geklappt haben?

                          root@ioBroker:/opt/iobroker# npm i iobroker.js-controller@4.0.19 --production
                          npm ERR! code ENOTEMPTY
                          npm ERR! syscall rename
                          npm ERR! path /opt/iobroker/node_modules/abab
                          npm ERR! dest /opt/iobroker/node_modules/.abab-bvmibCm3
                          npm ERR! errno -39
                          npm ERR! ENOTEMPTY: directory not empty, rename '/opt/iobroker/node_modules/abab' -> '/opt/iobroker/node_modules/.abab-bvmibCm3'
                          
                          npm ERR! A complete log of this run can be found in:
                          npm ERR!     /home/iobroker/.npm/_logs/2022-03-07T08_39_26_200Z-debug-0.log
                          

                          iob als LXC im Proxmox
                          Node.js: v22.19.0
                          NPM: 10.9.3
                          js-controller 7.0.7

                          Thomas BraunT 1 Reply Last reply
                          0
                          • F Feinfinger

                            @arteck

                            Danke für die Hilfe, aber da ist wohl mehr im Busch.

                            Frage mich, warum updates bisher immer geklappt haben?

                            root@ioBroker:/opt/iobroker# npm i iobroker.js-controller@4.0.19 --production
                            npm ERR! code ENOTEMPTY
                            npm ERR! syscall rename
                            npm ERR! path /opt/iobroker/node_modules/abab
                            npm ERR! dest /opt/iobroker/node_modules/.abab-bvmibCm3
                            npm ERR! errno -39
                            npm ERR! ENOTEMPTY: directory not empty, rename '/opt/iobroker/node_modules/abab' -> '/opt/iobroker/node_modules/.abab-bvmibCm3'
                            
                            npm ERR! A complete log of this run can be found in:
                            npm ERR!     /home/iobroker/.npm/_logs/2022-03-07T08_39_26_200Z-debug-0.log
                            
                            Thomas BraunT Offline
                            Thomas BraunT Offline
                            Thomas Braun
                            Most Active
                            wrote on last edited by
                            #175

                            @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                            directory not empty, rename '/opt/iobroker/node_modules/abab' -> '/opt/iobroker/node_modules/.abab-bvmibCm3'

                            Dann mach das doch mal.

                            Linux-Werkzeugkasten:
                            https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                            NodeJS Fixer Skript:
                            https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                            iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                            F 1 Reply Last reply
                            0
                            • Thomas BraunT Thomas Braun

                              @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                              directory not empty, rename '/opt/iobroker/node_modules/abab' -> '/opt/iobroker/node_modules/.abab-bvmibCm3'

                              Dann mach das doch mal.

                              F Offline
                              F Offline
                              Feinfinger
                              wrote on last edited by
                              #176

                              @thomas-braun

                              Dann kommt der nächste Fehler...

                              root@ioBroker:/opt/iobroker# npm i iobroker.js-controller@4.0.19 --production
                              npm ERR! code ENOTEMPTY
                              npm ERR! syscall rename
                              npm ERR! path /opt/iobroker/node_modules/abbrev
                              npm ERR! dest /opt/iobroker/node_modules/.abbrev-5eNud0FY
                              npm ERR! errno -39
                              npm ERR! ENOTEMPTY: directory not empty, rename '/opt/iobroker/node_modules/abbrev' -> '/opt/iobroker/node_modules/.abbrev-5eNud0FY'
                              

                              Was mich wundert ist, das diese Ordner alle vorhanden sind...

                              iob als LXC im Proxmox
                              Node.js: v22.19.0
                              NPM: 10.9.3
                              js-controller 7.0.7

                              Thomas BraunT 1 Reply Last reply
                              0
                              • F Feinfinger

                                @thomas-braun

                                Dann kommt der nächste Fehler...

                                root@ioBroker:/opt/iobroker# npm i iobroker.js-controller@4.0.19 --production
                                npm ERR! code ENOTEMPTY
                                npm ERR! syscall rename
                                npm ERR! path /opt/iobroker/node_modules/abbrev
                                npm ERR! dest /opt/iobroker/node_modules/.abbrev-5eNud0FY
                                npm ERR! errno -39
                                npm ERR! ENOTEMPTY: directory not empty, rename '/opt/iobroker/node_modules/abbrev' -> '/opt/iobroker/node_modules/.abbrev-5eNud0FY'
                                

                                Was mich wundert ist, das diese Ordner alle vorhanden sind...

                                Thomas BraunT Offline
                                Thomas BraunT Offline
                                Thomas Braun
                                Most Active
                                wrote on last edited by
                                #177

                                @feinfinger
                                Dann mache es nochmal...
                                Und wie gesagt, hampel da nicht als root rum.

                                Linux-Werkzeugkasten:
                                https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                                NodeJS Fixer Skript:
                                https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                                iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                                Rene55R F 2 Replies Last reply
                                0
                                • Thomas BraunT Thomas Braun

                                  @feinfinger
                                  Dann mache es nochmal...
                                  Und wie gesagt, hampel da nicht als root rum.

                                  Rene55R Online
                                  Rene55R Online
                                  Rene55
                                  wrote on last edited by
                                  #178

                                  @thomas-braun Und hüpf da nicht als root rum.
                                  Ich habe eben meine Installation (Docker-Image von Buanet) meinen js-Controller auf 4.0.18 hochgezogen. In der Console hab ich dazu 'root@iobroker:/opt/iobroker# iob upgrade self' ausgeführt. Dieser root ist ja so vorgegeben! Ist das ein anderer root, so dass ich den benutzen darf ?

                                  Host: Fujitsu Intel(R) Pentium(R) CPU G4560T, 32 GB RAM, Proxmox 8.x + lxc Ubuntu 22.04
                                  ioBroker (8 GB RAM) Node.js: 20.19.1, NPM: 10.8.2, js-Controller: 7.0.6, Admin: 7.6.3
                                  Wetterstation: Froggit WH3000SE V1.6.6

                                  Thomas BraunT 1 Reply Last reply
                                  0
                                  • Rene55R Rene55

                                    @thomas-braun Und hüpf da nicht als root rum.
                                    Ich habe eben meine Installation (Docker-Image von Buanet) meinen js-Controller auf 4.0.18 hochgezogen. In der Console hab ich dazu 'root@iobroker:/opt/iobroker# iob upgrade self' ausgeführt. Dieser root ist ja so vorgegeben! Ist das ein anderer root, so dass ich den benutzen darf ?

                                    Thomas BraunT Offline
                                    Thomas BraunT Offline
                                    Thomas Braun
                                    Most Active
                                    wrote on last edited by
                                    #179

                                    @rene55 sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                                    Dieser root ist ja so vorgegeben!

                                    Auch im Docker kann man user anlegen, wenn es nicht gerade auf sowas wie einer Synology läuft. Da geht's wohl aus irgendwelchen Gründen nicht.

                                    Als standard user zu agieren ist absolut 'best practice' und so in modernen Linux-Distributionen vorgesehen.

                                    Linux-Werkzeugkasten:
                                    https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                                    NodeJS Fixer Skript:
                                    https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                                    iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                                    Rene55R 1 Reply Last reply
                                    0
                                    • Thomas BraunT Thomas Braun

                                      @rene55 sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                                      Dieser root ist ja so vorgegeben!

                                      Auch im Docker kann man user anlegen, wenn es nicht gerade auf sowas wie einer Synology läuft. Da geht's wohl aus irgendwelchen Gründen nicht.

                                      Als standard user zu agieren ist absolut 'best practice' und so in modernen Linux-Distributionen vorgesehen.

                                      Rene55R Online
                                      Rene55R Online
                                      Rene55
                                      wrote on last edited by
                                      #180

                                      @thomas-braun Wenn ich eine eigene Linux-Installation mache gibt's immer einen User - root benutz ich gar nicht. Ich werd den Teufel tun, und im Container von Buanet irgendeinen Benutzer anzulegen. Da Frage ich mich doch allen ernstes, warum der Container nicht direkt mit einem separaten Benutzer z.B. iobroker kommt. Hierdrauf brauchst du nicht zu antworten - das weiß nur @buanet.

                                      Host: Fujitsu Intel(R) Pentium(R) CPU G4560T, 32 GB RAM, Proxmox 8.x + lxc Ubuntu 22.04
                                      ioBroker (8 GB RAM) Node.js: 20.19.1, NPM: 10.8.2, js-Controller: 7.0.6, Admin: 7.6.3
                                      Wetterstation: Froggit WH3000SE V1.6.6

                                      Ben1983B 1 Reply Last reply
                                      1
                                      • Rene55R Rene55

                                        @thomas-braun Wenn ich eine eigene Linux-Installation mache gibt's immer einen User - root benutz ich gar nicht. Ich werd den Teufel tun, und im Container von Buanet irgendeinen Benutzer anzulegen. Da Frage ich mich doch allen ernstes, warum der Container nicht direkt mit einem separaten Benutzer z.B. iobroker kommt. Hierdrauf brauchst du nicht zu antworten - das weiß nur @buanet.

                                        Ben1983B Offline
                                        Ben1983B Offline
                                        Ben1983
                                        wrote on last edited by
                                        #181

                                        @rene55 ich habe heute im Docker auf der Synology auch das update auf die 4.0.18 gemacht.
                                        habe bis dato keine Probleme bemerkt, außer:
                                        Vorher zeigte der host im iobroker admin 4% CPU (und im Synology der Container auch ca. 4-5% CPU an).
                                        Nach dem Update zeigt der host im iobroker admin immer noch ca. 4% an, der container im synology allerdings ca. 10%.

                                        1 Reply Last reply
                                        0
                                        • apollon77A apollon77

                                          @pupsimupsi sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                                          Was bedeutet das?
                                          Kann oder muss ich da was tun?

                                          Steht oben in der FAQ ... Post #2 in diesem Thread 🙂

                                          Mr EnglishM Offline
                                          Mr EnglishM Offline
                                          Mr English
                                          wrote on last edited by
                                          #182

                                          @apollon77
                                          Hallo zusammen ich habe gerade meinen iobroker updatet und leider läuft er nicht mehr…

                                          Die console sagt bei jeden Command das (siehe Bild)image.jpg

                                          Was ist der Fehler ??

                                          Lg
                                          English

                                          Thomas BraunT 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          Support us

                                          ioBroker
                                          Community Adapters
                                          Donate
                                          FAQ Cloud / IOT
                                          HowTo: Node.js-Update
                                          HowTo: Backup/Restore
                                          Downloads
                                          BLOG

                                          75

                                          Online

                                          32.4k

                                          Users

                                          81.3k

                                          Topics

                                          1.3m

                                          Posts
                                          Community
                                          Impressum | Datenschutz-Bestimmungen | Nutzungsbedingungen
                                          ioBroker Community 2014-2025
                                          logo
                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Recent
                                          • Tags
                                          • Unread 0
                                          • Categories
                                          • Unreplied
                                          • Popular
                                          • GitHub
                                          • Docu
                                          • Hilfe