Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade next from 10.2.3 to 13.5.4 #235

Merged
merged 1 commit into from
Oct 17, 2023

Conversation

Woodpile37
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • examples/blog-with-comment/package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
medium severity 49/1000
Why? Confidentiality impact: None, Integrity impact: None, Availability impact: Low, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: Low, Attack Vector: Network, EPSS: 0.00055, Social Trends: No, Days since published: 313, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: Medium, Package Popularity Score: 99, Impact: 2.35, Likelihood: 2.06, Score Version: V5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LOADERUTILS-3042992
Yes No Known Exploit
high severity 124/1000
Why? Confidentiality impact: None, Integrity impact: None, Availability impact: High, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: Low, Attack Vector: Network, EPSS: 0.00163, Social Trends: No, Days since published: 337, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: High, Package Popularity Score: 99, Impact: 5.99, Likelihood: 2.06, Score Version: V5
Prototype Pollution
SNYK-JS-LOADERUTILS-3043105
Yes No Known Exploit
medium severity 49/1000
Why? Confidentiality impact: None, Integrity impact: None, Availability impact: Low, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: Low, Attack Vector: Network, EPSS: 0.00084, Social Trends: No, Days since published: 334, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: Medium, Package Popularity Score: 99, Impact: 2.35, Likelihood: 2.06, Score Version: V5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-LOADERUTILS-3105943
Yes No Known Exploit
medium severity 75/1000
Why? Confidentiality impact: Low, Integrity impact: Low, Availability impact: None, Scope: Changed, Exploit Maturity: No data, User Interaction (UI): Required, Privileges Required (PR): None, Attack Complexity: High, Attack Vector: Network, EPSS: 0.00061, Social Trends: No, Days since published: 786, Reachable: No, Transitive dependency: No, Is Malicious: No, Business Criticality: High, Provider Urgency: Medium, Package Popularity Score: 99, Impact: 4.54, Likelihood: 1.64, Score Version: V5
Open Redirect
SNYK-JS-NEXT-1540422
Yes No Known Exploit
medium severity 81/1000
Why? Confidentiality impact: Low, Integrity impact: Low, Availability impact: None, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): Required, Privileges Required (PR): None, Attack Complexity: Low, Attack Vector: Network, EPSS: 0.00061, Social Trends: No, Days since published: 767, Reachable: No, Transitive dependency: No, Is Malicious: No, Business Criticality: High, Provider Urgency: Medium, Package Popularity Score: 99, Impact: 4.19, Likelihood: 1.93, Score Version: V5
Cross-site Scripting (XSS)
SNYK-JS-NEXT-1577139
Yes No Known Exploit
medium severity 134/1000
Why? Confidentiality impact: None, Integrity impact: High, Availability impact: None, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: High, Attack Vector: Network, EPSS: 0.00105, Social Trends: No, Days since published: 596, Reachable: No, Transitive dependency: No, Is Malicious: No, Business Criticality: High, Provider Urgency: Medium, Package Popularity Score: 99, Impact: 5.99, Likelihood: 2.23, Score Version: V5
User Interface (UI) Misrepresentation of Critical Information
SNYK-JS-NEXT-2405694
Yes No Known Exploit
medium severity 104/1000
Why? Confidentiality impact: High, Integrity impact: None, Availability impact: None, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): Low, Attack Complexity: Low, Attack Vector: Network, EPSS: 0.0011, Social Trends: No, Days since published: 628, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: Medium, Package Popularity Score: 99, Impact: 5.99, Likelihood: 1.73, Score Version: V5
Information Exposure
SNYK-JS-NODEFETCH-2342118
Yes No Known Exploit
medium severity 49/1000
Why? Confidentiality impact: None, Integrity impact: Low, Availability impact: None, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: Low, Attack Vector: Network, EPSS: 0.00045, Social Trends: No, Days since published: 6, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: Medium, Package Popularity Score: 99, Impact: 2.35, Likelihood: 2.06, Score Version: V5
Improper Input Validation
SNYK-JS-POSTCSS-5926692
Yes No Known Exploit
high severity 164/1000
Why? Confidentiality impact: High, Integrity impact: High, Availability impact: High, Scope: Unchanged, Exploit Maturity: No data, User Interaction (UI): None, Privileges Required (PR): None, Attack Complexity: High, Attack Vector: Network, EPSS: 0.0016, Social Trends: No, Days since published: 715, Reachable: No, Transitive dependency: Yes, Is Malicious: No, Business Criticality: High, Provider Urgency: High, Package Popularity Score: 99, Impact: 9.79, Likelihood: 1.67, Score Version: V5
Remote Code Execution (RCE)
SNYK-JS-SHELLQUOTE-1766506
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: next The new version differs by 250 commits.

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)
🦉 Prototype Pollution
🦉 Open Redirect
🦉 More lessons are available in Snyk Learn

@changeset-bot
Copy link

changeset-bot bot commented Oct 8, 2023

⚠️ No Changeset found

Latest commit: 72b82a7

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

@codeautopilot
Copy link

codeautopilot bot commented Oct 8, 2023

Pull Request Summary

This Pull Request is an automated security upgrade from Snyk to fix vulnerabilities in the next package. The vulnerable dependencies in the examples/blog-with-comment/package.json file are being upgraded from version 10.2.3 to version 13.5.4.

The vulnerabilities that will be fixed with this upgrade are:

  1. Regular Expression Denial of Service (ReDoS) - Medium severity

    • Impact: Confidentiality impact: None, Integrity impact: None, Availability impact: Low
    • Exploit Maturity: No known exploit
    • More information
  2. Prototype Pollution - High severity

    • Impact: Confidentiality impact: None, Integrity impact: None, Availability impact: High
    • Exploit Maturity: No known exploit
    • More information
  3. Regular Expression Denial of Service (ReDoS) - Medium severity

    • Impact: Confidentiality impact: None, Integrity impact: None, Availability impact: Low
    • Exploit Maturity: No known exploit
    • More information
  4. Open Redirect - Medium severity

    • Impact: Confidentiality impact: Low, Integrity impact: Low, Availability impact: None
    • Exploit Maturity: No known exploit
    • More information
  5. Cross-site Scripting (XSS) - Medium severity

    • Impact: Confidentiality impact: Low, Integrity impact: Low, Availability impact: None
    • Exploit Maturity: No known exploit
    • More information
  6. User Interface (UI) Misrepresentation of Critical Information - Medium severity

    • Impact: Confidentiality impact: None, Integrity impact: High, Availability impact: None
    • Exploit Maturity: No known exploit
    • More information
  7. Information Exposure - Medium severity

    • Impact: Confidentiality impact: High, Integrity impact: None, Availability impact: None
    • Exploit Maturity: No known exploit
    • More information
  8. Improper Input Validation - Medium severity

    • Impact: Confidentiality impact: None, Integrity impact: Low, Availability impact: None
    • Exploit Maturity: No known exploit
    • More information
  9. Remote Code Execution (RCE) - High severity

    • Impact: Confidentiality impact: High, Integrity impact: High, Availability impact: High
    • Exploit Maturity: No known exploit
    • More information

These vulnerabilities have different impacts and exploit maturity levels, but they are all considered high or medium severity. The upgrade to version 13.5.4 of the next package will fix these vulnerabilities and improve the security of the project.


Current plan usage: 19.36%


Have feedback or need help?

Discord
Documentation
[email protected]

Copy link

@bridgecrew bridgecrew bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bridgecrew has found errors in this PR ⬇️

examples/blog-with-comment/package.json Show resolved Hide resolved
examples/blog-with-comment/package.json Show resolved Hide resolved
@Woodpile37 Woodpile37 merged commit d7b4142 into canary Oct 17, 2023
20 of 26 checks passed
@Woodpile37 Woodpile37 deleted the snyk-fix-68f022c5c0b1fe7313db8236f535945e branch October 17, 2023 16:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants