Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 17 vulnerabilities #33

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

1Blackdiamondsc
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
medium severity 554/1000
Why? Has a fix available, CVSS 6.8
Cryptographic Issues
SNYK-JS-ELLIPTIC-1064899
Yes No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Timing Attack
SNYK-JS-ELLIPTIC-511941
Yes No Known Exploit
high severity 706/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.7
Cryptographic Issues
SNYK-JS-ELLIPTIC-571484
Yes Proof of Concept
medium severity 641/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.4
Prototype Pollution
SNYK-JS-JSON5-3182856
Yes Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LOADERUTILS-3042992
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Prototype Pollution
SNYK-JS-LOADERUTILS-3043105
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LOADERUTILS-3105943
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MINIMATCH-1019388
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-MINIMATCH-3050818
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SCHEMAINSPECTOR-1088010
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JS-TRIMNEWLINES-1298042
Yes No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090599
Yes Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090600
Yes Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090601
Yes Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-VALIDATOR-1090602
Yes Proof of Concept
high severity 741/1000
Why? Mature exploit, Has a fix available, CVSS 7.1
Uninitialized Memory Exposure
npm:base64url:20180511
Yes Mature
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Buffer Overflow
npm:validator:20160218
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: extract-text-webpack-plugin The new version differs by 177 commits.
  • cc3ba94 chore(release): 3.0.2
  • d5a1de2 fix: refer to the `entrypoint` instead of the first `module` (`module.identifier`) (#601)
  • 5286ab2 build(defaults): update to v1.6.0 (#652)
  • 4cfde50 chore(release): 3.0.1
  • 8de6558 fix: get real path from `__filename` instead of `__dirname` (`NS`)
  • 510704f fix(index): stricter check for `shouldExtract !== wasExtracted` (#605)
  • 6a660f3 docs(README): update install instructions (#570)
  • 083a6c8 docs(README): add custom `[contenthash]` formats (#566)
  • d7a75fc chore(release): 3.0.0
  • 7ae32d9 refactor: Apply webpack-defaults & webpack 3.x support (#540)
  • dd43832 fix: add missing `options.ignoreOrder` details in Error message (#539)
  • e81b883 chore(release): 2.1.2
  • 8766821 fix(index): resolve schemas relative to `__dirname` (#536)
  • 0271b39 chore(release): 2.1.1
  • e595417 fix: don't extract from common async chunks (#508)
  • a8ae003 chore(package): fix broken links && update devDependencies (#531)
  • c3cb091 fix(loader): rm unnecessary `this.cacheable` (caching) (#530)
  • eaa5236 docs: rm `RELEASE.md` (#532)
  • 671e35e chore(package): update `webpack-sources` v0.1.0...1.0.1 (#526)
  • dfeb347 fix: validation schema (`schema-utils`) (#527)
  • d0e88d0 docs(README): add lead-in description (#517)
  • 58dd5d3 fix: add a not null check for the content property before throwing error (#404)
  • 6c50d8e Update README.md (#469)
  • c63dc04 docs(README): clarify to set allChunks option when using CommonsChunkPlugin (#476)

See the full diff

Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Cryptographic Issues
🦉 Prototype Pollution
🦉 Regular Expression Denial of Service (ReDoS)

Copy link

@sourcery-ai sourcery-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PR Type: Enhancement

PR Summary: This PR aims to address vulnerabilities by updating dependencies in the package.json file. It is an automated PR generated by Snyk to upgrade certain packages to a more secure version.

Decision: Comment

📝 Type: 'Enhancement' - not supported yet.
  • Sourcery currently only approves 'Typo fix' PRs.
✅ Issue addressed: this change correctly addresses the issue or implements the desired feature.
No details provided.
✅ Small diff: the diff is small enough to approve with confidence.
No details provided.

General suggestions:

  • Ensure that the updates do not introduce any breaking changes or compatibility issues with the current codebase.
  • Consider replacing deprecated packages with their recommended alternatives to avoid future security risks and maintain compatibility with modern development practices.
  • Review the major version upgrades carefully, as they may include non-backward compatible changes that could affect the application's functionality.

Thanks for using Sourcery. We offer it for free for open source projects and would be very grateful if you could help us grow. If you like it, would you consider sharing Sourcery on your favourite social media? ✨

Share Sourcery

Help me be more useful! Please click 👍 or 👎 on each comment to tell me if it was helpful.

@@ -14,7 +14,7 @@
"copy-webpack-plugin": "^2.0.0",
"css-loader": "^5.0.0",
"ether-pudding": "^2.0.0",
"extract-text-webpack-plugin": "^1.0.1",
"extract-text-webpack-plugin": "^3.0.2",
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

suggestion (llm): The extract-text-webpack-plugin is deprecated for webpack 4 and later. Consider using mini-css-extract-plugin instead, which is recommended for CSS extraction.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants