Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update GitHub Vulnerability Alerts [SECURITY] - autoclosed #120

Closed
wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented May 25, 2021

WhiteSource Renovate

This PR contains the following updates:

Package Change
browserslist 4.16.1 -> 4.16.5
dns-packet 1.3.1 -> 1.3.2
glob-parent 5.1.1 -> 5.1.2
hosted-git-info 2.7.1 -> 2.8.9
immer 1.10.0 -> 8.0.1
is-svg 3.0.0 -> 4.2.2
node-notifier 5.4.3 -> 8.0.1
path-parse 1.0.6 -> 1.0.7
postcss 7.0.35 -> 7.0.36
react-dev-utils 10.2.1 -> 11.0.4
ssri 7.1.0 -> 7.1.1
url-parse 1.4.7 -> 1.5.0

GitHub Vulnerability Alerts

CVE-2021-23364

The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.

CVE-2021-23386

This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.

CVE-2020-28469

This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.

CVE-2021-23362

The npm package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity

CVE-2020-28477

Overview

Affected versions of immer are vulnerable to Prototype Pollution.

Proof of exploit

const {applyPatches, enablePatches} = require("immer");
enablePatches();
let obj = {};
console.log("Before : " + obj.polluted);
applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]);
// applyPatches({}, [ { op: 'replace', path: [ "__proto__", "polluted" ], value: "yes" } ]);
console.log("After : " + obj.polluted);

Remediation

Version 8.0.1 contains a fix for this vulnerability, updating is recommended.

CVE-2021-28092

The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.

CVE-2020-7789

This affects the package node-notifier before 8.0.1. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

CVE-2021-23343

Affected versions of npm package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.

CVE-2021-23368

The npm package postcss from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.

CVE-2021-24033

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

CVE-2021-27290

npm ssri 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.

CVE-2021-27515

url-parse before 1.5.0 mishandles certain uses of backslash such as http:/ and interprets the URI as a relative path.


Configuration

📅 Schedule: "" in timezone Europe/Stockholm.

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box.

This PR has been generated by WhiteSource Renovate. View repository job log here.

@renovate renovate bot added the security label May 25, 2021
@renovate
Copy link
Contributor Author

renovate bot commented May 25, 2021

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻️ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you check the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: package-lock.json
npm WARN @pmmmwh/[email protected] requires a peer of webpack@>=4.43.0 <6.0.0 but none is installed. You must install peer dependencies yourself.
npm WARN [email protected] requires a peer of eslint@^7.0.0 but none is installed. You must install peer dependencies yourself.

npm ERR! code EBADPLATFORM
npm ERR! notsup Unsupported platform for [email protected]: wanted {"os":"darwin","arch":"any"} (current: {"os":"linux","arch":"x64"})
npm ERR! notsup Valid OS:    darwin
npm ERR! notsup Valid Arch:  any
npm ERR! notsup Actual OS:   linux
npm ERR! notsup Actual Arch: x64

npm ERR! A complete log of this run can be found in:
npm ERR!     /tmp/renovate-cache/others/npm/_logs/2021-05-30T22_52_09_916Z-debug.log

@renovate renovate bot force-pushed the renovate/github-vulnerability-alerts branch 2 times, most recently from 23a521b to 628265b Compare May 30, 2021 22:52
@renovate renovate bot force-pushed the renovate/github-vulnerability-alerts branch from 628265b to 122e73a Compare June 8, 2021 04:47
@renovate
Copy link
Contributor Author

renovate bot commented Jun 8, 2021

⚠ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you check the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: package-lock.json
npm WARN @pmmmwh/[email protected] requires a peer of webpack@>=4.43.0 <6.0.0 but none is installed. You must install peer dependencies yourself.
npm WARN [email protected] requires a peer of eslint@^7.0.0 but none is installed. You must install peer dependencies yourself.

npm ERR! code EBADPLATFORM
npm ERR! notsup Unsupported platform for [email protected]: wanted {"os":"darwin","arch":"any"} (current: {"os":"linux","arch":"x64"})
npm ERR! notsup Valid OS:    darwin
npm ERR! notsup Valid Arch:  any
npm ERR! notsup Actual OS:   linux
npm ERR! notsup Actual Arch: x64

npm ERR! A complete log of this run can be found in:
npm ERR!     /tmp/renovate-cache/others/npm/_logs/2021-08-10T17_47_42_002Z-debug.log

@renovate renovate bot changed the title Update GitHub Vulnerability Alerts [SECURITY] Update GitHub Vulnerability Alerts [SECURITY] - autoclosed Jun 15, 2021
@renovate renovate bot closed this Jun 15, 2021
@renovate renovate bot deleted the renovate/github-vulnerability-alerts branch June 15, 2021 07:00
@renovate renovate bot changed the title Update GitHub Vulnerability Alerts [SECURITY] - autoclosed Update GitHub Vulnerability Alerts [SECURITY] Jun 15, 2021
@renovate renovate bot reopened this Jun 15, 2021
@renovate renovate bot restored the renovate/github-vulnerability-alerts branch June 15, 2021 07:25
@renovate renovate bot force-pushed the renovate/github-vulnerability-alerts branch 2 times, most recently from 1c43ac0 to 5b7b558 Compare June 15, 2021 16:23
@renovate renovate bot force-pushed the renovate/github-vulnerability-alerts branch from 5b7b558 to bad9a90 Compare August 10, 2021 17:47
@renovate renovate bot changed the title Update GitHub Vulnerability Alerts [SECURITY] Update GitHub Vulnerability Alerts [SECURITY] - autoclosed Aug 13, 2021
@renovate renovate bot closed this Aug 13, 2021
@renovate renovate bot deleted the renovate/github-vulnerability-alerts branch August 13, 2021 20:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant