Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 17 vulnerabilities #93

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

ekmixon
Copy link
Owner

@ekmixon ekmixon commented Nov 29, 2023

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • src/pybind/mgr/dashboard/frontend/package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-ANSIREGEX-1583908
Yes Proof of Concept
high severity 676/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.1
Cross-site Request Forgery (CSRF)
SNYK-JS-AXIOS-6032459
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-GLOBPARENT-1016905
Yes Proof of Concept
critical severity 669/1000
Why? Has a fix available, CVSS 9.1
Authentication Bypass
SNYK-JS-HTTPAUTH-471683
No No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-HTTPCACHESEMANTICS-3248783
Yes Proof of Concept
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Information Exposure
SNYK-JS-NODEFETCH-2342118
Yes No Known Exploit
medium severity 520/1000
Why? Has a fix available, CVSS 5.9
Denial of Service
SNYK-JS-NODEFETCH-674311
Yes No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Open Redirect
SNYK-JS-NODEFORGE-2330875
Yes Proof of Concept
medium severity 529/1000
Why? Has a fix available, CVSS 6.3
Prototype Pollution
SNYK-JS-NODEFORGE-2331908
Yes No Known Exploit
medium severity 494/1000
Why? Has a fix available, CVSS 5.6
Improper Verification of Cryptographic Signature
SNYK-JS-NODEFORGE-2430337
Yes No Known Exploit
high severity 579/1000
Why? Has a fix available, CVSS 7.3
Improper Verification of Cryptographic Signature
SNYK-JS-NODEFORGE-2430339
Yes No Known Exploit
medium severity 494/1000
Why? Has a fix available, CVSS 5.6
Improper Verification of Cryptographic Signature
SNYK-JS-NODEFORGE-2430341
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Input Validation
SNYK-JS-POSTCSS-5926692
Yes No Known Exploit
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Server-side Request Forgery (SSRF)
SNYK-JS-REQUEST-3361831
Yes Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
Yes Proof of Concept
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Prototype Pollution
SNYK-JS-TOUGHCOOKIE-5672873
Yes Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Prototype Pollution
SNYK-JS-UNSETVALUE-2400660
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: @compodoc/compodoc The new version differs by 215 commits.
  • ffe8abb 1.1.14
  • 3cd09ba 1.1.14
  • 9bb5772 1.1.14
  • c65504e fix(app): correct supports ArrayType and tuples
  • 0e02e05 fix(app): correct supports ArrayType
  • d6d9955 fix(app): tuple types
  • 162ea28 fix(app): union type and literaltypenode
  • 4a6ad03 fix(app): union type and literaltypenode
  • 47fe06d fix(app): rawDescription for JSDoc and visitEnumTypeAliasFunctionDeclarationDescription
  • a888f25 fix(app): rawDescription for JSDoc and visitEnumTypeAliasFunctionDeclarationDescription
  • 0bb000d fix(app): rawDescription for JSDoc and visitInputAndHostBinding
  • f698d96 feat(github): new ISSUE_TEMPLATE
  • 809432e feat(github): new ISSUE_TEMPLATE
  • 95073c3 Update issue templates
  • f4ac68c feat(github): new ISSUE_TEMPLATE
  • 9713982 feat(github): new ISSUE_TEMPLATE
  • c2a69c9 feat(github): new ISSUE_TEMPLATE
  • d8722c2 feat(github): new ISSUE_TEMPLATE
  • 125641b fix(app): rawDescription for JSDoc and variables
  • c1282d2 fix(app): support for Type Reference and template literal
  • 9c180f5 fix(app): drop usage of ts-simple-ast for ts-morph
  • 7bb9a40 fix(app): drop usage of ts-simple-ast for ts-morph
  • ee0d9c3 fix(app): support for Type Reference / WIP
  • 0c7a052 fix(theme): dark mode support

See the full diff

Package name: jest The new version differs by 250 commits.

See the full diff

Package name: jest-silent-reporter The new version differs by 1 commits.

See the full diff

Package name: stylelint-config-sass-guidelines The new version differs by 28 commits.

See the full diff

Package name: stylelint-declaration-use-variable The new version differs by 13 commits.

See the full diff

Package name: swagger-ui The new version differs by 200 commits.
  • 4b2c585 Merge pull request rgw: user quota may not adjust on bucket removal ceph/ceph#7586 from swagger-api/dependabot/npm_and_yarn/open-8.4.0
  • 34fd921 chore(deps-dev): bump open from 8.2.1 to 8.4.0
  • 32b3b97 chore(release): return release scripts back to original
  • e7e977c ci: enable dependabot after v4 effort
  • c0ef8d9 chore(deps): fix security vulnerabilities
  • ab6bb57 chore(deps): bump DOMPurify to latest version v2.3.3
  • 286ac5f chore(release): cut the v4.0.0-rc.4 release
  • ea66060 chore(deps-dev): update husky to 7.0.2 version
  • aa12144 chore(deps): fix all security vulnerabilities
  • be3b54c chore(nvm): use recommended version of Node.js@16.8.x
  • 93bd1c9 chore(deps): update swagger-client to 3.17.0 version
  • e364073 fix(root-inject): handle errors in functional components properly
  • 46b4e5c fix(highlight-code): handle mousewheel events properly
  • c31cb30 feat: allow using functional components with hooks
  • c6058f8 chore(release): cut the v4.0.0-rc.3 release
  • 5a5a27e fix(param-body): fix loosing focus in Try It when typing (librbd: reduce mem copies to user-buffer during read ceph/ceph#7548)
  • 8553943 refactor(highlight-code): add UNSAFE prefix for lifecycle methods
  • e2b33a8 chore(release): cut the v4.0.0-rc.2 release
  • efff3a6 build(webpack): remove duplicates from the build
  • b90c6b5 chore(deps): remove unused stream library
  • 346af3d chore(release): cut the v4.0.0-rc.1 release
  • 640aa3a chore(deps-dev): fix all fixable security issues in dev deps
  • ece5945 fix(security): fix security issue in prismjs dep
  • d6c2604 chore(deps): bump url-parse from 1.5.1 to 1.5.3

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)
🦉 Cross-site Request Forgery (CSRF)
🦉 Open Redirect
🦉 More lessons are available in Snyk Learn

Micro-Learning Topic: Regular expression denial of service (Detected by phrase)

Matched on "Regular Expression Denial of Service"

What is this? (2min video)

Denial of Service (DoS) attacks caused by Regular Expression which causes the system to hang or cause them to work very slowly when attacker sends a well-crafted input(exponentially related to input size).Denial of service attacks significantly degrade the service quality experienced by legitimate users. These attacks introduce large response delays, excessive losses, and service interruptions, resulting in direct impact on availability.

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Weak input validation (Detected by phrase)

Matched on "Improper Input Validation"

Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

Try a challenge in Secure Code Warrior

Helpful references

Micro-Learning Topic: Authentication bypass (Detected by phrase)

Matched on "Authentication Bypass"

What is this? (2min video)

Improper authentication happens when mechanisms intended to identify the user are flawed (easily tamperable or insufficient). This would allow an attacker to bypass access controls or to easily impersonate a user.

Try a challenge in Secure Code Warrior

Helpful references

Micro-Learning Topic: Cross-site request forgery (Detected by phrase)

Matched on "Cross-site Request Forgery"

What is this? (2min video)

Session-related but not session-based, this attack is based on the ability of an attacker to force an action on a user’s browser (commonly in the form of a POST request) to perform an unauthorized action on behalf of the user. This can often occur without the user even noticing it… or only noticing when it is too late. The root cause is that browsers automatically send session cookies with all requests to a given domain, regardless of where the source of the request came from, and the application server cannot differentiate between a request that came from pages it served or a request that came from an unrelated page.

Try a challenge in Secure Code Warrior

Helpful references

Micro-Learning Topic: Denial of service (Detected by phrase)

Matched on "Denial of Service"

The Denial of Service (DoS) attack is focused on making a resource (site, application, server) unavailable for the purpose it was designed. There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical, or resources handling vulnerabilities, among others. Source: https://www.owasp.org/index.php/Denial_of_Service

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Information disclosure (Detected by phrase)

Matched on "Information Exposure"

Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Open redirect (Detected by phrase)

Matched on "Open Redirect"

What is this? (2min video)

This vulnerability refers to the ability of an attacker to arbitrarily perform a redirection (external) or forward (internal) against the system. It arises due to insufficient validation or sanitisation of inputs used to perform a redirect or forward and may result in privilege escalation (in the case of a forward) or may be used to launch phishing attacks against users (in the case of redirects).

Try a challenge in Secure Code Warrior

Helpful references

Micro-Learning Topic: Prototype pollution (Detected by phrase)

Matched on "Prototype Pollution"

What is this? (2min video)

By adding or modifying attributes of an object prototype, it is possible to create attributes that exist on every object, or replace critical attributes with malicious ones. This can be problematic if the software depends on existence or non-existence of certain attributes, or uses pre-defined attributes of object prototype (such as hasOwnProperty, toString or valueOf).

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Server-side request forgery (Detected by phrase)

Matched on "Server-side Request Forgery"

What is this? (2min video)

Server-Side Request Forgery (SSRF) vulnerabilities are caused when an attacker can supply or modify a URL that reads or sends data to the server. The attacker can create a malicious request with a manipulated URL, when this request reaches the server, the server-side code executes the exploit URL causing the attacker to be able to read data from services that shouldn't be exposed.

Try a challenge in Secure Code Warrior

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants