Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix 9 npm dependencies #41

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open

Fix 9 npm dependencies #41

wants to merge 1 commit into from

Conversation

atomist[bot]
Copy link

@atomist atomist bot commented Mar 1, 2022

This pull request fixes 2 critical and 1 high security vulnerabilities open on 54d105f but 8 high and 4 moderate vulnerabilities remain open and need manual review.

npm audit fix updated the following npm dependencies:


Fixed vulnerabilities

Following security vulnerabilities are fixed:

minimist

Prototype Pollution in minimist Upgrade to version 1.2.6 or later
critical · <1.2.6 · CVE-2021-44906 · automatic fix available

minimist@1.2.5 · 4 vulnerable paths
  • portfinder > mkdirp > minimist
  • superstatic > update-notifier > latest-version > package-json > registry-auth-token > rc > minimist
  • unzipper > fstream > mkdirp > minimist
  • update-notifier > latest-version > package-json > registry-auth-token > rc > minimist

  • vm2

    Sandbox bypass in vm2 Upgrade to version 3.9.6 or later
    critical · <3.9.6 · CVE-2021-23555 · automatic fix available

    vm2@3.9.5 · 1 vulnerable path
  • proxy-agent > pac-proxy-agent > pac-resolver > degenerator > vm2

  • async

    Prototype Pollution in async Upgrade to version 3.2.2 or later
    high · >=3.0.0 <3.2.2 · CVE-2021-43138 · automatic fix available

    async@3.2.0 · 1 vulnerable path
  • archiver > async

  • node-fetch

    node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor Upgrade to version 2.6.7 or later
    high · <2.6.7 · CVE-2022-0235 · automatic fix available

    node-fetch@2.6.1 · 5 vulnerable paths
  • @google-cloud/pubsub > google-auth-library > gaxios > node-fetch
  • @google-cloud/pubsub > google-auth-library > gcp-metadata > gaxios > node-fetch
  • @google-cloud/pubsub > google-gax > google-auth-library > gcp-metadata > gaxios > node-fetch
  • google-auth-library > gaxios > node-fetch
  • node-fetch

  • node-forge

    Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
    high · <1.3.0 · CVE-2022-24772 · automatic fix available

    node-forge@1.2.1 · 3 vulnerable paths
  • @google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
  • @google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
  • google-auth-library > gtoken > google-p12-pem > node-forge
  • Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
    high · <1.3.0 · CVE-2022-24771 · automatic fix available

    node-forge@1.2.1 · 3 vulnerable paths
  • @google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
  • @google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
  • google-auth-library > gtoken > google-p12-pem > node-forge
  • Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
    moderate · <1.3.0 · CVE-2022-24773 · automatic fix available

    node-forge@1.2.1 · 3 vulnerable paths
  • @google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
  • @google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
  • google-auth-library > gtoken > google-p12-pem > node-forge

  • tar

    Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning Upgrade to version 6.1.2 or later
    high · >=6.0.0 <6.1.2 · CVE-2021-32803 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar
  • Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization Upgrade to version 6.1.1 or later
    high · >=6.0.0 <6.1.1 · CVE-2021-32804 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar
  • Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links Upgrade to version 6.1.7 or later
    high · >=6.0.0 <6.1.7 · CVE-2021-37701 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar
  • Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization Upgrade to version 6.1.9 or later
    high · >=6.0.0 <6.1.9 · CVE-2021-37713 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar
  • Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links Upgrade to version 6.1.9 or later
    high · >=6.0.0 <6.1.9 · CVE-2021-37712 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar

  • ansi-regex

    Inefficient Regular Expression Complexity in chalk/ansi-regex Upgrade to version 3.0.1 or later
    moderate · >=3.0.0 <3.0.1 · CVE-2021-3807 · automatic fix available

    ansi-regex@3.0.0 · 1 vulnerable path
  • superstatic > re2 > node-gyp > npmlog > gauge > wide-align > string-width > strip-ansi > ansi-regex
  • Inefficient Regular Expression Complexity in chalk/ansi-regex Upgrade to version 5.0.1 or later
    moderate · >=5.0.0 <5.0.1 · CVE-2021-3807 · automatic fix available

    ansi-regex@5.0.0 · 3 vulnerable paths
  • @google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > cliui > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 3 vulnerable paths
  • @google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > cliui > wrap-ansi > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > wrap-ansi > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > wrap-ansi > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 2 vulnerable paths
  • @google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > string-width > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 1 vulnerable path
  • superstatic > update-notifier > boxen > string-width > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 2 vulnerable paths
  • superstatic > update-notifier > boxen > widest-line > string-width > strip-ansi > ansi-regex
  • update-notifier > boxen > widest-line > string-width > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 2 vulnerable paths
  • update-notifier > boxen > string-width > strip-ansi > ansi-regex
  • update-notifier > boxen > wrap-ansi > string-width > strip-ansi > ansi-regex

  • ajv

    Prototype Pollution in Ajv Upgrade to version 6.12.3 or later
    moderate · <6.12.3 · CVE-2020-15366 · automatic fix available

    ajv@6.10.2 · 3 vulnerable paths
  • request > har-validator > ajv
  • superstatic > re2 > node-gyp > request > har-validator > ajv
  • universal-analytics > request > har-validator > ajv

  • Open vulnerabilities

    Following security vulnerabilities remain open and need manual review:

    async

    Prototype Pollution in async Upgrade to version 2.6.4 or later
    high · <2.6.4 · CVE-2021-43138 · automatic fix available

    async@2.6.3 · 1 vulnerable path
  • portfinder > async
  • async@1.5.2 · 1 vulnerable path
  • superstatic > nash > async

  • node-forge

    Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
    high · <1.3.0 · CVE-2022-24772 · automatic fix available

    node-forge@1.2.1 · 3 vulnerable paths
  • @google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
  • @google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
  • google-auth-library > gtoken > google-p12-pem > node-forge
  • Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
    high · <1.3.0 · CVE-2022-24771 · automatic fix available

    node-forge@1.2.1 · 3 vulnerable paths
  • @google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
  • @google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
  • google-auth-library > gtoken > google-p12-pem > node-forge
  • Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
    moderate · <1.3.0 · CVE-2022-24773 · automatic fix available

    node-forge@1.2.1 · 3 vulnerable paths
  • @google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
  • @google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
  • google-auth-library > gtoken > google-p12-pem > node-forge

  • tar

    Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning Upgrade to version 6.1.2 or later
    high · >=6.0.0 <6.1.2 · CVE-2021-32803 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar
  • Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization Upgrade to version 6.1.1 or later
    high · >=6.0.0 <6.1.1 · CVE-2021-32804 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar
  • Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links Upgrade to version 6.1.7 or later
    high · >=6.0.0 <6.1.7 · CVE-2021-37701 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar
  • Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization Upgrade to version 6.1.9 or later
    high · >=6.0.0 <6.1.9 · CVE-2021-37713 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar
  • Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links Upgrade to version 6.1.9 or later
    high · >=6.0.0 <6.1.9 · CVE-2021-37712 · automatic fix available

    tar@6.0.5 · 1 vulnerable path
  • superstatic > re2 > node-gyp > tar

  • ansi-regex

    Inefficient Regular Expression Complexity in chalk/ansi-regex Upgrade to version 3.0.1 or later
    moderate · >=3.0.0 <3.0.1 · CVE-2021-3807 · automatic fix available

    ansi-regex@3.0.0 · 1 vulnerable path
  • superstatic > re2 > node-gyp > npmlog > gauge > wide-align > string-width > strip-ansi > ansi-regex
  • Inefficient Regular Expression Complexity in chalk/ansi-regex Upgrade to version 5.0.1 or later
    moderate · >=5.0.0 <5.0.1 · CVE-2021-3807 · automatic fix available

    ansi-regex@5.0.0 · 3 vulnerable paths
  • @google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > cliui > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 3 vulnerable paths
  • @google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > cliui > wrap-ansi > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > wrap-ansi > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > wrap-ansi > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 2 vulnerable paths
  • @google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > string-width > strip-ansi > ansi-regex
  • @google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > string-width > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 1 vulnerable path
  • superstatic > update-notifier > boxen > string-width > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 2 vulnerable paths
  • superstatic > update-notifier > boxen > widest-line > string-width > strip-ansi > ansi-regex
  • update-notifier > boxen > widest-line > string-width > strip-ansi > ansi-regex
  • ansi-regex@5.0.0 · 2 vulnerable paths
  • update-notifier > boxen > string-width > strip-ansi > ansi-regex
  • update-notifier > boxen > wrap-ansi > string-width > strip-ansi > ansi-regex

  • ajv

    Prototype Pollution in Ajv Upgrade to version 6.12.3 or later
    moderate · <6.12.3 · CVE-2020-15366 · automatic fix available

    ajv@6.10.2 · 2 vulnerable paths
  • request > har-validator > ajv
  • superstatic > re2 > node-gyp > request > har-validator > ajv

  • Files changed:


    atomist/npm-vulnerability-scanner-skill · Configure

    @atomist atomist bot added auto-branch-delete:on-close Delete branch when pull request gets closed auto-merge-method:merge Auto-merge with merge commit auto-merge:on-bpr-success Auto-merge on passed branch protection rule labels Mar 1, 2022
    @atomist atomist bot changed the title Fix 11 npm dependencies Fix 17 npm dependencies Mar 1, 2022
    @atomist atomist bot force-pushed the atomist/npm-audit-main branch from 8d7770d to d2ab04a Compare March 1, 2022 09:09
    @atomist atomist bot changed the title Fix 17 npm dependencies Fix 11 npm dependencies Mar 1, 2022
    @atomist atomist bot force-pushed the atomist/npm-audit-main branch from d2ab04a to 8cf084b Compare March 1, 2022 09:09
    @atomist atomist bot changed the title Fix 11 npm dependencies Fix 6 npm dependencies Mar 1, 2022
    @atomist atomist bot force-pushed the atomist/npm-audit-main branch from 8cf084b to 11698ec Compare March 1, 2022 09:15
    @atomist atomist bot changed the title Fix 6 npm dependencies Fix 7 npm dependencies Mar 22, 2022
    @atomist atomist bot changed the title Fix 7 npm dependencies Fix 8 npm dependencies Mar 23, 2022
    npm audit fix updated the following npm dependencies:
    
     * ansi-regex > 5.0.1
     * async > 3.2.3
     * minimist > 1.2.6
     * node-fetch > 2.6.7
     * node-forge > 1.3.1
     * re2 > 1.17.4
     * tar > 6.1.11
     * universal-analytics > 0.5.3
     * vm2 > 3.9.9
    
    [atomist:generated]
    [atomist-skill:atomist/npm-vulnerability-scanner-skill]
    @atomist atomist bot changed the title Fix 8 npm dependencies Fix 9 npm dependencies Apr 13, 2022
    Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
    Labels
    auto-branch-delete:on-close Delete branch when pull request gets closed auto-merge:on-bpr-success Auto-merge on passed branch protection rule auto-merge-method:merge Auto-merge with merge commit
    Projects
    None yet
    Development

    Successfully merging this pull request may close these issues.

    None yet

    1 participant