Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[stable29] Fix npm audit #798

Merged
merged 1 commit into from
Dec 17, 2024
Merged

Conversation

nextcloud-command
Copy link
Contributor

@nextcloud-command nextcloud-command commented Oct 13, 2024

Audit report

This audit fix resolves 20 of the total 28 vulnerabilities found in your project.

Updated dependencies

Fixed vulnerabilities

@nextcloud/dialogs #

@nextcloud/files #

  • Caused by vulnerable dependency:
  • Affected versions: >=1.1.0
  • Package usage:
    • node_modules/@nextcloud/files

@vue/component-compiler-utils #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/@vue/component-compiler-utils

@vue/test-utils #

  • Caused by vulnerable dependency:
  • Affected versions: <=1.3.6
  • Package usage:
    • node_modules/@vue/test-utils

babel-plugin-transform-es2015-modules-commonjs #

  • Caused by vulnerable dependency:
  • Affected versions: <=7.0.0-beta.0
  • Package usage:
    • node_modules/babel-plugin-transform-es2015-modules-commonjs

babel-template #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/babel-template

babel-traverse #

  • Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code
  • Severity: critical 🚨 (CVSS 9.4)
  • Reference: GHSA-67hx-6x53-jw92
  • Affected versions: *
  • Package usage:
    • node_modules/babel-traverse

cookie #

  • cookie accepts cookie name, path, and domain with out of bounds characters
  • Severity: low
  • Reference: GHSA-pxg6-pf52-xh8x
  • Affected versions: <0.7.0
  • Package usage:
    • node_modules/cookie

cross-spawn #

  • Regular Expression Denial of Service (ReDoS) in cross-spawn
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-3xgq-45jj-v275
  • Affected versions: 7.0.0 - 7.0.4
  • Package usage:
    • node_modules/cross-spawn

elliptic #

  • Valid ECDSA signatures erroneously rejected in Elliptic
  • Severity: low (CVSS 4.8)
  • Reference: GHSA-fc9h-whq2-v747
  • Affected versions: <6.6.0
  • Package usage:
    • node_modules/elliptic

express #

  • Caused by vulnerable dependency:
  • Affected versions: 3.0.0-alpha1 - 4.21.1 || 5.0.0-alpha.1 - 5.0.0
  • Package usage:
    • node_modules/express

http-proxy-middleware #

  • Denial of service in http-proxy-middleware
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-c7qv-q95q-8v27
  • Affected versions: <2.0.7
  • Package usage:
    • node_modules/http-proxy-middleware

nanoid #

  • Infinite loop in nanoid
  • Severity: low
  • Reference: GHSA-mwcw-c2x4-8c55
  • Affected versions: <3.3.8
  • Package usage:
    • node_modules/nanoid

path-to-regexp #

  • Unpatched path-to-regexp ReDoS in 0.1.x
  • Severity: moderate
  • Reference: GHSA-rhx6-c78j-4q9w
  • Affected versions: <0.1.12
  • Package usage:
    • node_modules/path-to-regexp

postcss #

  • PostCSS line return parsing error
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-7fh5-64p2-3v2j
  • Affected versions: <8.4.31
  • Package usage:
    • node_modules/@vue/component-compiler-utils/node_modules/postcss

vue #

  • ReDoS vulnerability in vue package that is exploitable through inefficient regex evaluation in the parseHTML function
  • Severity: low (CVSS 3.7)
  • Reference: GHSA-5j4c-8p2g-v4jx
  • Affected versions: 2.0.0-alpha.1 - 2.7.16
  • Package usage:
    • node_modules/vue

vue-jest #

vue-loader #

  • Caused by vulnerable dependency:
  • Affected versions: 15.0.0-beta.1 - 15.11.1
  • Package usage:
    • node_modules/vue-loader

vue-resize #

  • Caused by vulnerable dependency:
  • Affected versions: 0.4.0 - 1.0.1
  • Package usage:
    • node_modules/vue-resize

vue-template-compiler #

  • vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)
  • Severity: moderate (CVSS 4.2)
  • Reference: GHSA-g3ch-rx76-35fx
  • Affected versions: >=2.0.0
  • Package usage:
    • node_modules/vue-template-compiler

@nextcloud-command nextcloud-command force-pushed the automated/noid/stable29-fix-npm-audit branch from 6f9c45b to 3029cbe Compare October 20, 2024 03:23
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable29-fix-npm-audit branch 2 times, most recently from 7a2302c to 6e9b63f Compare November 3, 2024 03:26
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable29-fix-npm-audit branch from 6e9b63f to 9a79534 Compare November 10, 2024 03:09
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable29-fix-npm-audit branch from 9a79534 to a990cde Compare November 17, 2024 03:22
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable29-fix-npm-audit branch from a990cde to 18264c2 Compare November 24, 2024 03:25
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable29-fix-npm-audit branch from 18264c2 to 3dc9839 Compare December 8, 2024 03:36
Signed-off-by: GitHub <noreply@github.com>
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable29-fix-npm-audit branch from 3dc9839 to a20dc7a Compare December 15, 2024 03:34
@artonge artonge merged commit b078b3b into stable29 Dec 17, 2024
40 checks passed
@artonge artonge deleted the automated/noid/stable29-fix-npm-audit branch December 17, 2024 09:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3. to review Waiting for reviews dependencies
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants