Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[stable30] Fix npm audit #2641

Merged
merged 8 commits into from
Dec 30, 2024
Merged

Conversation

nextcloud-command
Copy link
Contributor

@nextcloud-command nextcloud-command commented Sep 8, 2024

Audit report

This audit fix resolves 25 of the total 37 vulnerabilities found in your project.

Updated dependencies

Fixed vulnerabilities

@nextcloud/dialogs #

@nextcloud/files #

  • Caused by vulnerable dependency:
  • Affected versions: >=1.1.0
  • Package usage:
    • node_modules/@nextcloud/files

@nextcloud/moment #

  • Caused by vulnerable dependency:
  • Affected versions: >=1.1.1
  • Package usage:
    • node_modules/@nextcloud/moment

@nextcloud/upload #

@nextcloud/webpack-vue-config #

@vue/component-compiler-utils #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/@vue/component-compiler-utils

@vue/test-utils #

  • Caused by vulnerable dependency:
  • Affected versions: <=1.3.6
  • Package usage:
    • node_modules/@vue/test-utils

axios #

  • Axios Cross-Site Request Forgery Vulnerability
  • Severity: moderate (CVSS 6.5)
  • Reference: GHSA-wf5p-g6vw-rhxx
  • Affected versions: 0.8.1 - 0.27.2
  • Package usage:
    • node_modules/axios

body-parser #

  • body-parser vulnerable to denial of service when url encoding is enabled
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-qwcr-r2fm-qrc7
  • Affected versions: <1.20.3
  • Package usage:
    • node_modules/body-parser

cookie #

  • cookie accepts cookie name, path, and domain with out of bounds characters
  • Severity: low
  • Reference: GHSA-pxg6-pf52-xh8x
  • Affected versions: <0.7.0
  • Package usage:
    • node_modules/cookie

cross-spawn #

  • Regular Expression Denial of Service (ReDoS) in cross-spawn
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-3xgq-45jj-v275
  • Affected versions: 7.0.0 - 7.0.4
  • Package usage:
    • node_modules/cross-spawn

elliptic #

  • Valid ECDSA signatures erroneously rejected in Elliptic
  • Severity: low (CVSS 4.8)
  • Reference: GHSA-fc9h-whq2-v747
  • Affected versions: <6.6.0
  • Package usage:
    • node_modules/elliptic

express #

  • express vulnerable to XSS via response.redirect()
  • Severity: low (CVSS 5)
  • Reference: GHSA-qw6h-vgh9-j6wx
  • Affected versions: <=4.21.1 || 5.0.0-alpha.1 - 5.0.0
  • Package usage:
    • node_modules/express

http-proxy-middleware #

  • Denial of service in http-proxy-middleware
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-c7qv-q95q-8v27
  • Affected versions: <2.0.7
  • Package usage:
    • node_modules/http-proxy-middleware

nanoid #

  • Predictable results in nanoid generation when given non-integer values
  • Severity: moderate (CVSS 4.3)
  • Reference: GHSA-mwcw-c2x4-8c55
  • Affected versions: <3.3.8
  • Package usage:
    • node_modules/nanoid

path-to-regexp #

  • path-to-regexp outputs backtracking regular expressions
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-9wv6-86v2-598j
  • Affected versions: <=0.1.11
  • Package usage:
    • node_modules/path-to-regexp

postcss #

  • PostCSS line return parsing error
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-7fh5-64p2-3v2j
  • Affected versions: <8.4.31
  • Package usage:
    • node_modules/@vue/component-compiler-utils/node_modules/postcss

rollup #

  • DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS
  • Severity: high (CVSS 6.4)
  • Reference: GHSA-gcx4-mw62-g8wm
  • Affected versions: <2.79.2
  • Package usage:
    • node_modules/rollup

send #

  • send vulnerable to template injection that can lead to XSS
  • Severity: low (CVSS 5)
  • Reference: GHSA-m6fv-jmcg-4jfg
  • Affected versions: <0.19.0
  • Package usage:
    • node_modules/send

serve-static #

  • serve-static vulnerable to template injection that can lead to XSS
  • Severity: low (CVSS 5)
  • Reference: GHSA-cm22-4g7w-348p
  • Affected versions: <=1.16.0
  • Package usage:
    • node_modules/serve-static

vue-loader #

  • Caused by vulnerable dependency:
  • Affected versions: 15.0.0-beta.1 - 15.11.1
  • Package usage:
    • node_modules/vue-loader

vue-resize #

  • Caused by vulnerable dependency:
  • Affected versions: 0.4.0 - 1.0.1
  • Package usage:
    • node_modules/vue-resize

vue-template-compiler #

  • vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)
  • Severity: moderate (CVSS 4.2)
  • Reference: GHSA-g3ch-rx76-35fx
  • Affected versions: >=2.0.0
  • Package usage:
    • node_modules/vue-template-compiler

vuex #

  • Caused by vulnerable dependency:
  • Affected versions: 3.1.3 - 3.6.2
  • Package usage:
    • node_modules/vuex

webdav #

  • Caused by vulnerable dependency:
  • Affected versions: 2.0.0-rc1 - 4.11.4
  • Package usage:
    • node_modules/webdav

@nextcloud-command nextcloud-command added 3. to review Waiting for reviews dependencies Pull requests that update a dependency file labels Sep 8, 2024
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch from 322a99c to 82ad1ad Compare September 15, 2024 03:32
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch from 82ad1ad to c2ed267 Compare September 22, 2024 03:37
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch from c2ed267 to ac360f5 Compare September 29, 2024 03:44
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch 2 times, most recently from a936a75 to 1bc19ba Compare October 13, 2024 03:38
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch from 1bc19ba to c894fa4 Compare October 20, 2024 03:27
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch 2 times, most recently from 7f93514 to 48dd59b Compare November 3, 2024 03:33
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch from 48dd59b to 65d08cc Compare November 10, 2024 03:15
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch 2 times, most recently from 1c91583 to b96a56f Compare November 24, 2024 03:31
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch 2 times, most recently from f7b7964 to 020c19a Compare December 8, 2024 03:45
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch 2 times, most recently from d9ce7a0 to a66e5db Compare December 22, 2024 03:25
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable30-fix-npm-audit branch from a66e5db to c61d748 Compare December 29, 2024 03:18
@skjnldsv skjnldsv force-pushed the automated/noid/stable30-fix-npm-audit branch 3 times, most recently from ed8d555 to 9ba91e2 Compare December 30, 2024 13:24
@skjnldsv skjnldsv force-pushed the automated/noid/stable30-fix-npm-audit branch from 9ba91e2 to 72946ff Compare December 30, 2024 13:40
@skjnldsv skjnldsv force-pushed the automated/noid/stable30-fix-npm-audit branch from 2feee82 to 90b0266 Compare December 30, 2024 14:32
@skjnldsv skjnldsv merged commit da7f5f4 into stable30 Dec 30, 2024
48 checks passed
@skjnldsv skjnldsv deleted the automated/noid/stable30-fix-npm-audit branch December 30, 2024 14:42
@skjnldsv
Copy link
Member

Pushed a lot of fixes alongside this PR to have it clean once and for all

@skjnldsv
Copy link
Member

Similar commits added to #2740

@blizzz blizzz mentioned this pull request Jan 8, 2025
17 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3. to review Waiting for reviews dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants