Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[next] Fix npm audit #6262

Open
wants to merge 1 commit into
base: next
Choose a base branch
from

Conversation

nextcloud-command
Copy link
Contributor

@nextcloud-command nextcloud-command commented Nov 24, 2024

Audit report

This audit fix resolves 37 of the total 40 vulnerabilities found in your project.

Updated dependencies

Fixed vulnerabilities

@nextcloud/l10n #

  • Caused by vulnerable dependency:
  • Affected versions: >=1.1.0
  • Package usage:
    • node_modules/@nextcloud/l10n

anymatch #

  • Caused by vulnerable dependency:
  • Affected versions: 1.2.0 - 2.0.0
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/anymatch

bonjour #

  • Caused by vulnerable dependency:
  • Affected versions: >=3.3.1
  • Package usage:
    • node_modules/bonjour

braces #

  • Uncontrolled resource consumption in braces
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-grv7-fg5c-xmjg
  • Affected versions: <3.0.3
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/braces

chokidar #

  • Caused by vulnerable dependency:
  • Affected versions: 1.3.0 - 2.1.8
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/chokidar

cross-spawn #

  • Regular Expression Denial of Service (ReDoS) in cross-spawn
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-3xgq-45jj-v275
  • Affected versions: <6.0.6 || >=7.0.0 <7.0.5
  • Package usage:
    • node_modules/cross-spawn
    • node_modules/internal-ip/node_modules/cross-spawn

css-loader #

dns-packet #

  • Caused by vulnerable dependency:
  • Affected versions: <=5.2.4
  • Package usage:
    • node_modules/bonjour/node_modules/dns-packet

express #

  • Caused by vulnerable dependency:
  • Affected versions: 4.0.0-rc1 - 4.21.1 || 5.0.0-alpha.1 - 5.0.0-beta.3
  • Package usage:
    • node_modules/express

http-proxy-middleware #

  • Denial of service in http-proxy-middleware
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-c7qv-q95q-8v27
  • Affected versions: <=2.0.7-beta.1
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/http-proxy-middleware

icss-utils #

  • Caused by vulnerable dependency:
  • Affected versions: <=4.1.1
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/icss-utils

ip #

  • ip SSRF improper categorization in isPublic
  • Severity: high (CVSS 8.1)
  • Reference: GHSA-2p57-rm9w-gvfp
  • Affected versions: *
  • Package usage:
    • node_modules/ip

markdown-to-jsx #

  • Cross site scripting in markdown-to-jsx
  • Severity: moderate (CVSS 6.1)
  • Reference: GHSA-4wx3-54gh-9fr9
  • Affected versions: <7.4.0
  • Package usage:
    • node_modules/markdown-to-jsx

micromatch #

  • Regular Expression Denial of Service (ReDoS) in micromatch
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-952p-6rrq-rcjv
  • Affected versions: <=4.0.7
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/micromatch

multicast-dns #

  • Caused by vulnerable dependency:
  • Affected versions: 6.0.0 - 7.2.2
  • Package usage:
    • node_modules/bonjour/node_modules/multicast-dns

nanoid #

  • Infinite loop in nanoid
  • Severity: low
  • Reference: GHSA-mwcw-c2x4-8c55
  • Affected versions: <3.3.8
  • Package usage:
    • node_modules/nanoid

node-forge #

  • Prototype Pollution in node-forge debug API.
  • Severity: low
  • Reference: GHSA-5rrq-pxf6-6jx5
  • Affected versions: <=1.2.1
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/node-forge

node-gettext #

  • node-gettext vulnerable to Prototype Pollution
  • Severity: high (CVSS 5.9)
  • Reference: GHSA-g974-hxvm-x689
  • Affected versions: *
  • Package usage:
    • node_modules/node-gettext

path-to-regexp #

  • Unpatched path-to-regexp ReDoS in 0.1.x
  • Severity: moderate
  • Reference: GHSA-rhx6-c78j-4q9w
  • Affected versions: <0.1.12
  • Package usage:
    • node_modules/path-to-regexp

postcss #

  • PostCSS line return parsing error
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-7fh5-64p2-3v2j
  • Affected versions: <8.4.31
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/postcss

postcss-modules-extract-imports #

  • Caused by vulnerable dependency:
  • Affected versions: <=2.0.0
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/postcss-modules-extract-imports

postcss-modules-local-by-default #

  • Caused by vulnerable dependency:
  • Affected versions: <=3.0.3
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/postcss-modules-local-by-default

postcss-modules-scope #

  • Caused by vulnerable dependency:
  • Affected versions: <=2.2.0
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/postcss-modules-scope

postcss-modules-values #

  • Caused by vulnerable dependency:
  • Affected versions: <=3.0.0
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/postcss-modules-values

react-styleguidist #

  • Caused by vulnerable dependency:
  • Affected versions: >=5.0.0-beta.9
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/react-styleguidist

readdirp #

  • Caused by vulnerable dependency:
  • Affected versions: 2.2.0 - 2.2.1
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/readdirp

selfsigned #

  • Caused by vulnerable dependency:
  • Affected versions: 1.1.1 - 1.10.14
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/selfsigned

vue-inbrowser-compiler #

  • Caused by vulnerable dependency:
  • Affected versions: >=4.50.0
  • Package usage:
    • node_modules/vue-inbrowser-compiler

vue-inbrowser-compiler-demi #

  • Caused by vulnerable dependency:
  • Affected versions: >=4.50.0
  • Package usage:
    • node_modules/vue-inbrowser-compiler-demi

vue-inbrowser-compiler-utils #

  • Caused by vulnerable dependency:
  • Affected versions: >=4.50.0
  • Package usage:
    • node_modules/vue-inbrowser-compiler-utils

vue-inbrowser-prismjs-highlighter #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/vue-inbrowser-prismjs-highlighter

vue-styleguidist #

vue-template-compiler #

  • vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)
  • Severity: moderate (CVSS 4.2)
  • Reference: GHSA-g3ch-rx76-35fx
  • Affected versions: >=2.0.0
  • Package usage:
    • node_modules/vue-template-compiler

vue-tsc #

  • Caused by vulnerable dependency:
  • Affected versions: 1.7.0-alpha.0 - 2.0.28
  • Package usage:
    • node_modules/vue-tsc

webpack #

  • Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads to XSS
  • Severity: moderate (CVSS 6.4)
  • Reference: GHSA-4vvj-4cpr-p986
  • Affected versions: 5.0.0-alpha.0 - 5.93.0
  • Package usage:
    • node_modules/webpack

webpack-dev-middleware #

  • Path traversal in webpack-dev-middleware
  • Severity: high (CVSS 7.4)
  • Reference: GHSA-wr3j-pwj9-hqq6
  • Affected versions: <=5.3.3
  • Package usage:
    • node_modules/vue-styleguidist/node_modules/webpack-dev-middleware

webpack-dev-server #

@nextcloud-command nextcloud-command added 3. to review Waiting for reviews dependencies Pull requests that update a dependency file labels Nov 24, 2024
@nextcloud-command nextcloud-command force-pushed the automated/noid/next-fix-npm-audit branch 2 times, most recently from 53983ac to f7d6caa Compare December 8, 2024 03:25
@nextcloud-command nextcloud-command force-pushed the automated/noid/next-fix-npm-audit branch from f7d6caa to 3616d26 Compare December 15, 2024 03:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3. to review Waiting for reviews dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant