Update HIGH vulnerable dependencies [SECURITY] #13
+11,922
−11,922
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.9.0
->1.11.4
4.17.20
->4.17.21
GitHub Vulnerability Alerts
CVE-2023-36414
Azure Identity SDK is vulnerable to remote code execution.
Azure Identity Library for .NET Information Disclosure Vulnerability
CVE-2024-29992 / GHSA-wvxc-855f-jvrv
More information
Details
Azure Identity Library for .NET Information Disclosure Vulnerability
Severity
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Azure Identity SDK Remote Code Execution Vulnerability
CVE-2023-36414 / GHSA-5mfx-4wcx-rv27
More information
Details
Azure Identity SDK is vulnerable to remote code execution.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability
CVE-2024-35255 / GHSA-m5vv-6r4h-3vj9 / GO-2024-2918
More information
Details
Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability.
Severity
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
CVE-2020-28500
All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the
toNumber
,trim
andtrimEnd
functions.Steps to reproduce (provided by reporter Liyuan Chen):
CVE-2021-23337
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.Regular Expression Denial of Service (ReDoS) in lodash
CVE-2020-28500 / GHSA-29mw-wpgm-hmr9 / SNYK-JAVA-ORGFUJIONWEBJARS-1074896 / SNYK-JAVA-ORGWEBJARS-1074894 / SNYK-JAVA-ORGWEBJARSBOWER-1074892 / SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895 / SNYK-JAVA-ORGWEBJARSNPM-1074893 / SNYK-JS-LODASH-1018905
More information
Details
All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the
toNumber
,trim
andtrimEnd
functions.Steps to reproduce (provided by reporter Liyuan Chen):
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Command Injection in lodash
CVE-2021-23337 / GHSA-35jh-r3h4-6jhm / SNYK-JAVA-ORGFUJIONWEBJARS-1074932 / SNYK-JAVA-ORGWEBJARS-1074930 / SNYK-JAVA-ORGWEBJARSBOWER-1074928 / SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931 / SNYK-JAVA-ORGWEBJARSNPM-1074929 / SNYK-JS-LODASH-1040724
More information
Details
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.Severity
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
Azure/azure-sdk-for-net (Azure.Identity)
v1.11.4
Compare Source
1.11.4 (2024-06-10)
Bugs Fixed
v1.11.3
Compare Source
1.11.3 (2024-05-07)
Bugs Fixed
DefaultAzureCredential
probe request behavior for IMDS managed identity environments. #43796v1.11.2
Compare Source
1.11.2 (2024-04-19)
Bugs Fixed
DeviceCodeCredential
#43468v1.11.1
Compare Source
1.11.1 (2024-05-07)
Other Changes
v1.11.0
Compare Source
1.11.0 (2024-04-09)
Bugs Fixed
AzurePowerShellCredential
now handles the case where it falls back to legacy PowerShell without relying on the error message string.Breaking Changes
DefaultAzureCredential
now sends a probe request with no retries for IMDS managed identity environments to avoid excessive retry delays when the IMDS endpoint is not available. This should improve credential chain resolution for local development scenarios. See BREAKING_CHANGES.md.v1.10.4
Compare Source
1.10.4 (2023-11-13)
Other Changes
ActivitySource
is stable and no longer requires the Experimental feature-flag.v1.10.3
Compare Source
1.10.3 (2023-10-18)
Bugs Fixed
ManagedIdentityCredential
will now correctly retry when the instance metadata endpoint returns a 410 response. #28568Other Changes
v1.10.2
Compare Source
1.10.2 (2023-10-10)
Bugs Fixed
v1.10.1
Compare Source
1.10.1 (2023-09-12)
Bugs Fixed
ManagedIdentityCredential
will fall through to the next credential in the chain in the case that Docker Desktop returns a 403 response when attempting to access the IMDS endpoint. #38218v1.10.0
Compare Source
1.10.0 (2023-08-14)
Features Added
BrowserCustomization
property toInteractiveBrowserCredential
to enable web view customization for interactive authentication.Bugs Fixed
lodash/lodash (lodash)
v4.17.21
Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.