-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency axios to v0.21.1 [SECURITY] - abandoned #15
base: master
Are you sure you want to change the base?
Conversation
Codecov Report
@@ Coverage Diff @@
## master #15 +/- ##
=======================================
Coverage 97.72% 97.72%
=======================================
Files 3 3
Lines 44 44
=======================================
Hits 43 43
Misses 1 1 Continue to review full report at Codecov.
|
Codecov Report
@@ Coverage Diff @@
## master #15 +/- ##
======================================
Coverage ? 0
======================================
Files ? 0
Lines ? 0
Branches ? 0
======================================
Hits ? 0
Misses ? 0
Partials ? 0 Continue to review full report at Codecov.
|
f3d875f
to
aff4bfc
Compare
aff4bfc
to
84fe60a
Compare
84fe60a
to
b0094b8
Compare
b0094b8
to
8d85d57
Compare
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
Autoclosing SkippedThis PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error. |
This PR contains the following updates:
0.18.0
->0.21.1
GitHub Vulnerability Alerts
CVE-2019-10742
Versions of
axios
prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds themaxContentLength
property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service.Recommendation
Upgrade to 0.18.1 or later.
CVE-2020-28168
Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.
Release Notes
axios/axios
v0.21.1
Compare Source
Fixes and Functionality:
AxiosError
(#2949)Internal and Tests:
socket
http test (#3364)Huge thanks to everyone who contributed to this release via code (authors listed below) or via reviews and triaging on GitHub:
v0.21.0
Compare Source
Fixes and Functionality:
Internal and Tests:
Documentation:
Huge thanks to everyone who contributed to this release via code (authors listed below) or via reviews and triaging on GitHub:
v0.20.0
Compare Source
Release of 0.20.0-pre as a full release with no other changes.
v0.19.2
Compare Source
v0.19.1
Compare Source
Fixes and Functionality:
config.method
after mergeConfig for Axios.prototype.request (#2383)Internal:
Documentation:
v0.19.0
Compare Source
Fixes and Functionality:
#
, because client cut everything after#
getUri
signature to TypeScript definition. (#1736) - Alexander TrauzziDocumentation:
.then
to.finally
in example code (#2090) - Omar CairesponseType: 'blob'
doesn't actually work in Node (when I tried using it, response.data was a string, not a Blob, since Node doesn't have Blobs), so this clarifies that this option should only be used in the browserv0.18.1
Compare Source
Security Fix:
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.