Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk-dev] Fix for 31 vulnerabilities #44

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

gjvis
Copy link
Owner

@gjvis gjvis commented Sep 24, 2022

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:

    • package.json
    • package-lock.json
  • Adding or updating a Snyk policy (.snyk) file; this file is required in order to apply Snyk vulnerability patches.
    Find out more.

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Prototype Pollution
SNYK-JS-AJV-584908
No No Known Exploit
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ANSIREGEX-1583908
No Proof of Concept
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
Server-Side Request Forgery (SSRF)
SNYK-JS-AXIOS-1038255
No Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-AXIOS-1579269
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JS-AXIOS-174505
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-BROWSERSLIST-1090194
No Proof of Concept
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Information Exposure
SNYK-JS-EVENTSOURCE-2823375
No Proof of Concept
medium severity 484/1000
Why? Has a fix available, CVSS 5.4
Open Redirect
SNYK-JS-GOT-2932019
No No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ISSVG-1085627
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ISSVG-1243891
No Proof of Concept
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JS-JSYAML-173999
No No Known Exploit
high severity 619/1000
Why? Has a fix available, CVSS 8.1
Arbitrary Code Execution
SNYK-JS-JSYAML-174129
No No Known Exploit
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Information Exposure
SNYK-JS-NODEFETCH-2342118
No No Known Exploit
medium severity 520/1000
Why? Has a fix available, CVSS 5.9
Denial of Service
SNYK-JS-NODEFETCH-674311
No No Known Exploit
medium severity 494/1000
Why? Has a fix available, CVSS 5.6
Command Injection
SNYK-JS-NODENOTIFIER-1035794
No No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-POSTCSS-1255640
No Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SSRI-1246392
No Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JS-VUEAPOLLO-474013
No No Known Exploit
medium severity 529/1000
Why? Has a fix available, CVSS 6.3
Cross-site Scripting (XSS)
SNYK-JS-WEBPACKBUNDLEANALYZER-174190
No No Known Exploit
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Information Exposure
SNYK-JS-WEBPACKDEVSERVER-72405
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-WS-1296835
No Proof of Concept
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:braces:20180219
No Proof of Concept
high severity 686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Prototype Pollution
npm:deep-extend:20180409
Yes Proof of Concept
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Cross-site Scripting (XSS)
npm:react-dom:20180802
No Proof of Concept
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Cross-site Scripting (XSS)
npm:vue:20180802
No Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: axios The new version differs by 250 commits.
  • e367be5 [Releasing] 0.21.3
  • 83ae383 Correctly add response interceptors to interceptor chain (#4013)
  • c0c8761 [Updating] changelog to include links to issues and contributors
  • 619bb46 [Releasing] v0.21.2
  • 82c9455 Create SECURITY.md (#3981)
  • 5b45711 Security fix for ReDoS (#3980)
  • 5bc9ea2 Update ECOSYSTEM.md (#3817)
  • e72813a Fixing README.md (#3818)
  • e10a027 Fix README typo under Request Config (#3825)
  • e091491 Update README.md (#3936)
  • b42fbad Removed un-needed bracket
  • 520c8dc Updating CI status badge (#3953)
  • 4fbeecb Adding CI on Github Actions. (#3938)
  • e9965bf Fixing the sauce labs tests (#3813)
  • dbc634c Remove charset in tests (#3807)
  • 3958e9f Add explanation of cancel token (#3803)
  • 69949a6 Adding custom return type support to interceptor (#3783)
  • 49509f6 Create FUNDING.yml (#3796)
  • 199c8aa Adding parseInt to config.timeout (#3781)
  • 94fc4ea Adding isAxiosError typeguard documentation (#3767)
  • 0ece97c Fixing quadratic runtime when setting a maxContentLength (#3738)
  • a18a0ec Updating `lib/core/README.md` about Dispatching requests (#3772)
  • 59fa614 [Updated] follow-redirects to the latest version (#3771)
  • 7821ed2 Feat/json improvements (#3763)

See the full diff

Package name: offline-plugin The new version differs by 53 commits.
  • df08535 [skip ci] 5.0.4
  • 363a89e [ci skip] Release 5.0.5
  • 56553d4 [ci skip] Release 5.0.4
  • ddec2aa Fix tests
  • ec987f4 Fix appShell returning the shell file when navigating to sw file's location
  • 2cf8af2 Update fixtures to new webpack 4's bundle output format
  • 5b9f60a Fix 'only-if-cached' in fetch event error
  • 765abb0 Merge pull request #384 from julienw/patch-1
  • 9b8e5de Add a link to appShell doc from the doc for cacheMaps
  • 1f99abe [skip ci] Readme improvment
  • a9daba4 Readme improvment
  • eb9c16b Merge pull request #381 from etchteam/master
  • fd22075 fix: Update deep-extend
  • 1454262 [ci skip] Release 5.0.3
  • a2eee00 Make `ServiceWorker.minify` option auto-detect usage of optimization.minimize (webpack 4+)
  • 0f73617 [ci skip] Release 5.0.2
  • 7b29577 Use never version of loader injection into "after-resolve" NMF
  • 65edf58 [ci skip] Release 5.0.1
  • bf055a8 Fix plugin usage without options
  • c8a6344 [skip ci] Comment demo from readme for now
  • 9018bd7 [ci skip] Release 5.0.0
  • 5fc00d8 Remove loaders information from build scripts and tests
  • b8b961f Fix addAllNormalized wrong behavior with activate and remove undocumented loaders
  • 75557ad Fix `isNotRedirectedResponse` function is used without an argument

See the full diff

Package name: prop-types The new version differs by 15 commits.

See the full diff

Package name: quasar-cli The new version differs by 250 commits.

See the full diff

Package name: vue-apollo The new version differs by 250 commits.
  • 8a55533 docs(readme): docs link
  • 428b5cb docs(readme): move link
  • a35f50d docs(readme): contributing guide
  • 5420630 chore: add test:ssr to test script
  • 4d15268 Create CONTRIBUTING.md
  • dc138f2 chore: Create CODE_OF_CONDUCT.md (#839)
  • 87785af chore: Update issue templates
  • b95388f fix: security issue
  • 198b383 test(e2e): manual add smart query: loadingKey
  • 14ea90a fix(ci): generate schema files
  • 4f9bba4 test(ci): fix yarn cache id
  • 73e970a test(ci): fix install
  • 6afceec test(e2e): SSR
  • af0b69d Merge branch 'dev' of github.com:Akryum/vue-apollo into dev
  • c3b840c fix(ssr): memory leak, closes https://github.com/Memory leak with Smart Query nuxt-modules/apollo#231
  • 94bbb52 chore(deps-dev): bump vue-cli-plugin-apollo in /tests/demo
  • b7e214b chore(deps-dev): bump rollup from 1.24.0 to 1.25.1
  • 7733edc test(e2e): rename test.js to chat.js
  • 8da4777 test(e2e): errorPolicy support
  • ae4713e fix(smart query): handling errorPolicy, closes #526
  • ef9c7a0 docs(smart query): new `error` args
  • 932c5b9 feat(errorHandler): added options arg
  • aea6c93 feat(errorHandler): added vm, key, type arguments
  • b7642cd fix(ts): DataDef not defined error?!?

See the full diff

With a Snyk patch:
Severity Priority Score (*) Issue Exploit Maturity
high severity 731/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.2
Prototype Pollution
SNYK-JS-LODASH-567746
Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
No Known Exploit
high severity 579/1000
Why? Has a fix available, CVSS 7.3
Prototype Pollution
npm:extend:20180424
No Known Exploit
medium severity 636/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
Prototype Pollution
npm:hoek:20180212
Proof of Concept
medium severity 646/1000
Why? Mature exploit, Has a fix available, CVSS 5.2
Uninitialized Memory Exposure
npm:stringstream:20180511
Mature
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Regular Expression Denial of Service (ReDoS)
npm:tough-cookie:20170905
No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)
🦉 Open Redirect
🦉 Regular Expression Denial of Service (ReDoS)
🦉 More lessons are available in Snyk Learn

The following vulnerabilities are fixed with an upgrade:
- https://dev.snyk.io/vuln/SNYK-JS-AJV-584908
- https://dev.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
- https://dev.snyk.io/vuln/SNYK-JS-AXIOS-1038255
- https://dev.snyk.io/vuln/SNYK-JS-AXIOS-1579269
- https://dev.snyk.io/vuln/SNYK-JS-AXIOS-174505
- https://dev.snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194
- https://dev.snyk.io/vuln/SNYK-JS-EVENTSOURCE-2823375
- https://dev.snyk.io/vuln/SNYK-JS-GOT-2932019
- https://dev.snyk.io/vuln/SNYK-JS-ISSVG-1085627
- https://dev.snyk.io/vuln/SNYK-JS-ISSVG-1243891
- https://dev.snyk.io/vuln/SNYK-JS-JSYAML-173999
- https://dev.snyk.io/vuln/SNYK-JS-JSYAML-174129
- https://dev.snyk.io/vuln/SNYK-JS-NODEFETCH-2342118
- https://dev.snyk.io/vuln/SNYK-JS-NODEFETCH-674311
- https://dev.snyk.io/vuln/SNYK-JS-NODENOTIFIER-1035794
- https://dev.snyk.io/vuln/SNYK-JS-POSTCSS-1255640
- https://dev.snyk.io/vuln/SNYK-JS-SSRI-1246392
- https://dev.snyk.io/vuln/SNYK-JS-VUEAPOLLO-474013
- https://dev.snyk.io/vuln/SNYK-JS-WEBPACKBUNDLEANALYZER-174190
- https://dev.snyk.io/vuln/SNYK-JS-WEBPACKDEVSERVER-72405
- https://dev.snyk.io/vuln/SNYK-JS-WS-1296835
- https://dev.snyk.io/vuln/npm:braces:20180219
- https://dev.snyk.io/vuln/npm:deep-extend:20180409
- https://dev.snyk.io/vuln/npm:react-dom:20180802
- https://dev.snyk.io/vuln/npm:vue:20180802


The following vulnerabilities are fixed with a Snyk patch:
- https://dev.snyk.io/vuln/SNYK-JS-LODASH-567746
- https://dev.snyk.io/vuln/npm:debug:20170905
- https://dev.snyk.io/vuln/npm:extend:20180424
- https://dev.snyk.io/vuln/npm:hoek:20180212
- https://dev.snyk.io/vuln/npm:stringstream:20180511
- https://dev.snyk.io/vuln/npm:tough-cookie:20170905
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants