Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update dependency convict to v6.2.4 [security] #263

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Apr 25, 2022

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
convict 6.0.0 -> 6.2.4 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2022-21190

This affects the package convict before 6.2.3. This is a bypass of CVE-2022-22143. The fix introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with proto or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.proto or foo.this.constructor.prototype.

CVE-2022-22143

Impact

  • An attacker can inject attributes that are used in other components
  • An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash.

The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files.

Patches

The problem is patched in convict@6.2.3. Users should upgrade to convict@6.2.3.

Workarounds

No way for users to fix or remediate the vulnerability without upgrading

References

For more information

If you have any questions or comments about this advisory:
add your question as a comment in #​384

CVE-2023-0163

Impact

  • An attacker can inject attributes that are used in other components
  • An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash.

The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files.

Patches

The problem is patched in convict@6.2.4. Users should upgrade to convict@6.2.4.

Workarounds

No way for users to fix or remediate the vulnerability without upgrading

References

https://github.com/mozilla/node-convict/issues/410


Release Notes

mozilla/node-convict (convict)

v6.2.4

Compare Source

Bug Fixes
  • Fix imperfect prototype pollution fix (#​410) (#​411). Thanks to Captain-K-101

v6.2.3

Compare Source

Fixed
  • More more complete fix for prototype pollution vulnerability first addressed
    in #​384 (Marc-Aurèle Darche @​madarche, Snyk Security team)

v6.2.2

Compare Source

Fixed
  • More complete fix for prototype pollution vulnerability first addressed in
    #​384 (Marc-Aurèle Darche @​madarche)

v6.2.1

Compare Source

Fixed

v6.2.0

Compare Source

Changed
  • Update dependency: validator ^11.1.0^13.6.0 (#​390)
  • Update dependency: parser ^18.1.3^20.2.7 (#​390)
  • Update dependency: moment ^2.24.0^2.29.1 (#​390)

v6.1.0

Compare Source

Added
  • Add new "nullable" option to allow "null" additionally to any format #​386 (maxwrlr)

v6.0.1

Compare Source

Fixed
  • Fix prototype pollution vulnerability #​384 (arjunshibu, Jamie Slome)

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot added the security Pull requests that address a security vulnerability label Apr 25, 2022
@renovate renovate bot force-pushed the renovate/npm-convict-vulnerability branch from 9b19592 to 7066e4e Compare June 18, 2022 17:05
@renovate renovate bot changed the title fix(deps): update dependency convict to v6.2.2 [security] fix(deps): update dependency convict to v6.2.3 [security] Jun 18, 2022
@renovate renovate bot changed the title fix(deps): update dependency convict to v6.2.3 [security] fix(deps): update dependency convict to v6.2.4 [security] Mar 16, 2023
@renovate renovate bot force-pushed the renovate/npm-convict-vulnerability branch from 7066e4e to 505e5ad Compare March 16, 2023 18:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Pull requests that address a security vulnerability
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

0 participants