fix(deps): update dependency sanitize-html to v2.12.1 [security] #3850
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.5.3
->2.12.1
GitHub Vulnerability Alerts
CVE-2024-21501
Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
Release Notes
apostrophecms/sanitize-html (sanitize-html)
v2.12.1
Compare Source
post-css
. This fixes a vulnerability in which information about the existence or non-existence of files on a server could be disclosed via properly crafted HTML input when thestyle
attribute is allowed by the configuration. Thanks to the Snyk Security team for the disclosure and to Dylan Armstrong for the fix.v2.12.0
Compare Source
Introduced the
allowedEmptyAttributes
option, enabling explicit specification of empty string values for select attributes, with the default attribute set toalt
. Thanks to Na for the contribution.Clarified the use of SVGs with a new test and changes to documentation. Thanks to Gauav Kumar for the contribution.
Do not process source maps when processing style tags with PostCSS.
v2.11.0
Compare Source
false
inallowedClasses
attributes. Thanks to Kevin Jiang for this fix!.idea
temp files to.gitignore
v2.10.0
Compare Source
disallowedTagMode
is set to any variant ofescape
-- just escape the disallowed tags that are present. This fixes issue #464. Thanks to Daniel LiebnertagAllowed()
helper function which takes a tag name and checks it againstoptions.allowedTags
and returnstrue
if the tag is allowed andfalse
if it is not.v2.9.0
Compare Source
v2.8.1
Compare Source
v2.8.0
Compare Source
htmlparser2
to new major version^8.0.0
. Thanks to Kedar Chandrayan for this contribution.v2.7.3
Compare Source
false
, then do not assume that all tags are allowed. Rather, allow no tags in this case, to be on the safe side. This matches the existing documentation and fixes issue #176. Thanks to Kedar Chandrayan for the fix.v2.7.2
Compare Source
Kedar Chandrayan for the report and the fix.
v2.7.1
Compare Source
v2.7.0
Compare Source
<img />
tags. Thanks to Zade Viggers.v2.6.1
Compare Source
!important
when used.transformTags
options that was reported on issue #506. Thanks to Alex Rantos.v2.6.0
Compare Source
allowedClasses
option. Thanks to Alex Rantos.Configuration
📅 Schedule: Branch creation - "" in timezone America/Toronto, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Never, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.