Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 18 vulnerabilities #7

Merged
merged 1 commit into from
Sep 7, 2024

Conversation

Bbjj88h
Copy link
Owner

@Bbjj88h Bbjj88h commented Sep 5, 2024

snyk-top-banner

Snyk has created this PR to fix 18 vulnerabilities in the npm dependencies of this project.

Snyk changed the following file(s):

  • benchmark/suite/package.json
  • benchmark/suite/package-lock.json

Vulnerabilities that will be fixed with an upgrade:

Issue Score
critical severity Remote Code Execution (RCE)
SNYK-JS-VM2-5772825
  876  
critical severity Sandbox Bypass
SNYK-JS-VM2-3018201
  816  
critical severity Sandbox Escape
SNYK-JS-VM2-5415299
  816  
critical severity Sandbox Escape
SNYK-JS-VM2-5422057
  811  
critical severity Sandbox Bypass
SNYK-JS-VM2-5537100
  811  
critical severity Remote Code Execution (RCE)
SNYK-JS-VM2-5772823
  811  
high severity Server-side Request Forgery (SSRF)
SNYK-JS-IP-6240864
  751  
critical severity Improper Handling of Exceptional Conditions
SNYK-JS-VM2-5426093
  704  
high severity Improper Control of Generation of Code ('Code Injection')
SNYK-JS-PUGCODEGEN-7086056
  696  
high severity Prototype Poisoning
SNYK-JS-QS-3153490
  696  
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
  696  
high severity Improper Input Validation
SNYK-JS-FOLLOWREDIRECTS-6141137
  686  
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-6444610
  646  
medium severity Server-Side Request Forgery (SSRF)
SNYK-JS-IP-7148531
  646  
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-COOKIEJAR-3149984
  586  
medium severity Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
SNYK-JS-VM2-5537079
  586  
low severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-WORDWRAP-3149973
  506  
medium severity Improper Control of Dynamically-Managed Code Resources
SNYK-JS-EJS-6689533
  479  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)
🦉 Improper Control of Dynamically-Managed Code Resources
🦉 Improper Input Validation
🦉 More lessons are available in Snyk Learn

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"@nestjs-modules/mailer","from":"1.6.1","to":"1.10.3"},{"name":"@nestjs/common","from":"8.4.7","to":"9.0.0"},{"name":"@nestjs/jwt","from":"8.0.1","to":"10.2.0"}],"env":"prod","issuesToFix":[{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-COOKIEJAR-3149984","priority_score":586,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JS-EJS-6689533","priority_score":479,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Control of Dynamically-Managed Code Resources"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-FOLLOWREDIRECTS-6141137","priority_score":686,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Input Validation"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-FOLLOWREDIRECTS-6444610","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-IP-6240864","priority_score":751,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-IP-7148531","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Server-Side Request Forgery (SSRF)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-IP-6240864","priority_score":751,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-IP-7148531","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Server-Side Request Forgery (SSRF)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-IP-6240864","priority_score":751,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-IP-7148531","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Server-Side Request Forgery (SSRF)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-PUGCODEGEN-7086056","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Control of Generation of Code ('Code Injection')"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-QS-3153490","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Poisoning"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-SEMVER-3247795","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-SEMVER-3247795","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-VM2-3018201","priority_score":816,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.9","score":495},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Sandbox Bypass"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-VM2-5415299","priority_score":816,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.9","score":495},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Sandbox Escape"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-VM2-5422057","priority_score":811,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Sandbox Escape"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JS-VM2-5426093","priority_score":704,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Improper Handling of Exceptional Conditions"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-VM2-5537079","priority_score":586,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-VM2-5537100","priority_score":811,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Sandbox Bypass"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-VM2-5772823","priority_score":811,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"Mature","id":"SNYK-JS-VM2-5772825","priority_score":876,"priority_score_factors":[{"type":"exploit","label":"Functional","score":171},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-WORDWRAP-3149973","priority_score":506,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Regular Expression Denial of Service (ReDoS)"}],"prId":"2e2865ac-f5c0-499d-a4ed-d2acdae9d7be","prPublicId":"2e2865ac-f5c0-499d-a4ed-d2acdae9d7be","packageManager":"npm","priorityScoreList":[586,479,686,646,751,646,696,696,696,816,816,811,704,586,811,811,876,506],"projectPublicId":"f69f0f10-31e0-42fd-b0b7-49bd5a38c65c","projectUrl":"https://app.snyk.io/org/bjacentah/project/f69f0f10-31e0-42fd-b0b7-49bd5a38c65c?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["priorityScore"],"type":"auto","upgrade":["SNYK-JS-COOKIEJAR-3149984","SNYK-JS-EJS-6689533","SNYK-JS-FOLLOWREDIRECTS-6141137","SNYK-JS-FOLLOWREDIRECTS-6444610","SNYK-JS-IP-6240864","SNYK-JS-IP-7148531","SNYK-JS-PUGCODEGEN-7086056","SNYK-JS-QS-3153490","SNYK-JS-SEMVER-3247795","SNYK-JS-VM2-3018201","SNYK-JS-VM2-5415299","SNYK-JS-VM2-5422057","SNYK-JS-VM2-5426093","SNYK-JS-VM2-5537079","SNYK-JS-VM2-5537100","SNYK-JS-VM2-5772823","SNYK-JS-VM2-5772825","SNYK-JS-WORDWRAP-3149973"],"vulns":["SNYK-JS-COOKIEJAR-3149984","SNYK-JS-EJS-6689533","SNYK-JS-FOLLOWREDIRECTS-6141137","SNYK-JS-FOLLOWREDIRECTS-6444610","SNYK-JS-IP-6240864","SNYK-JS-IP-7148531","SNYK-JS-PUGCODEGEN-7086056","SNYK-JS-QS-3153490","SNYK-JS-SEMVER-3247795","SNYK-JS-VM2-3018201","SNYK-JS-VM2-5415299","SNYK-JS-VM2-5422057","SNYK-JS-VM2-5426093","SNYK-JS-VM2-5537079","SNYK-JS-VM2-5537100","SNYK-JS-VM2-5772823","SNYK-JS-VM2-5772825","SNYK-JS-WORDWRAP-3149973"],"patch":[],"isBreakingChange":true,"remediationStrategy":"vuln"}'

@Bbjj88h Bbjj88h merged commit 15d96af into master Sep 7, 2024
0 of 4 checks passed
@Bbjj88h Bbjj88h deleted the snyk-fix-bc9ca99dbe3900e79f1d98af5dff19ae branch September 7, 2024 17:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants