Update dependency fastify to v4.10.2 [SECURITY]#2
Merged
Street02krutoy merged 1 commit intomasterfrom Nov 22, 2022
Merged
Conversation
c64ed53 to
b65a4db
Compare
b65a4db to
00271da
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.7.0->4.10.2GitHub Vulnerability Alerts
CVE-2022-39288
Impact
An attacker can send an invalid
Content-Typeheader that can cause the application to crash, leading to a possible Denial of Service attack. Only the v4.x line is affected.(This was updated: upon a close inspection, v3.x is not affected after all).
Patches
Yes, update to
> v4.8.0.Workarounds
You can reject the malicious content types before the body parser enters in action.
References
See the HackerOne report #1715536
For more information
Fastify security policy
CVE-2022-41919
Impact
The attacker can use the incorrect
Content-Typeto bypass thePre-Flightchecking offetch.fetch()requests with Content-Type’s essence as "application/x-www-form-urlencoded", "multipart/form-data", or "text/plain", could potentially be used to invoke routes that only acceptsapplication/jsoncontent type, thus bypassing any CORS protection, and therefore they could lead to a Cross-Site Request Forgery attack.Patches
For
4.xusers, please update to at least4.10.2.For
3.xusers, please update to at least3.29.4.Workarounds
Implement Cross-Site Request Forgery protection using
@fastify/csrf.References
Check out the HackerOne report: https://hackerone.com/reports/1763832.
For more information
Fastify security policy
Release Notes
fastify/fastify
v4.10.2Compare Source
and CVE-2022-41919
Full Changelog: fastify/fastify@v4.10.1...v4.10.2
v4.10.1Compare Source
What's Changed
New Contributors
Full Changelog: fastify/fastify@v4.10.0...v4.10.1
v4.10.0Compare Source
What's Changed
nullorundefinedvalues passed as fn by @metcoder95 in https://github.com/fastify/fastify/pull/4367New Contributors
Full Changelog: fastify/fastify@v4.9.2...v4.10.0
v4.9.2Compare Source
What's Changed
Full Changelog: fastify/fastify@v4.9.1...v4.9.2
v4.9.1Compare Source
What's Changed
New Contributors
Full Changelog: fastify/fastify@v4.9.0...v4.9.1
v4.9.0Compare Source
What's Changed
New Contributors
Full Changelog: fastify/fastify@v4.8.1...v4.9.0
v4.8.1Compare Source
This release fixes GHSA-455w-c45v-86rg for the v4.x line.
This is a HIGH vulnerability that can lead to a crash, resulting in a total loss of availability.
The CVE for this vulnerability is CVE-2022-39288.
Full Changelog: fastify/fastify@v4.8.0...v4.8.1
v4.8.0Compare Source
What's Changed
New Contributors
Full Changelog: fastify/fastify@v4.7.0...v4.8.0
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.