Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[stable1.0] Fix npm audit #338

Merged
merged 1 commit into from
Nov 18, 2024
Merged

Conversation

nextcloud-command
Copy link
Contributor

Audit report

This audit fix resolves 18 of the total 27 vulnerabilities found in your project.

Updated dependencies

Fixed vulnerabilities

@babel/traverse #

  • Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code
  • Severity: critical 🚨 (CVSS 9.4)
  • Reference: GHSA-67hx-6x53-jw92
  • Affected versions: <7.23.2
  • Package usage:
    • node_modules/@babel/traverse

@nextcloud/axios #

  • Caused by vulnerable dependency:
  • Affected versions: <=2.3.0
  • Package usage:
    • node_modules/@nextcloud/axios

axios #

  • Axios Cross-Site Request Forgery Vulnerability
  • Severity: moderate (CVSS 6.5)
  • Reference: GHSA-wf5p-g6vw-rhxx
  • Affected versions: 0.8.1 - 0.27.2
  • Package usage:
    • node_modules/axios

braces #

  • Uncontrolled resource consumption in braces
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-grv7-fg5c-xmjg
  • Affected versions: <3.0.3
  • Package usage:
    • node_modules/braces

browserify-sign #

  • browserify-sign upper bound check issue in dsaVerify leads to a signature forgery attack
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-x9w5-v3q2-3rhw
  • Affected versions: 2.6.0 - 4.2.1
  • Package usage:
    • node_modules/browserify-sign

dompurify #

  • DOMPurify allows tampering by prototype pollution
  • Severity: high (CVSS 7)
  • Reference: GHSA-mmhx-hmjr-r674
  • Affected versions: <=2.5.3
  • Package usage:
    • node_modules/dompurify

elliptic #

  • Elliptic's EDDSA missing signature length check
  • Severity: low (CVSS 5.3)
  • Reference: GHSA-f7q4-pwc6-w24p
  • Affected versions: <=6.5.7
  • Package usage:
    • node_modules/elliptic

fast-xml-parser #

  • fast-xml-parser regex vulnerability patch could be improved from a safety perspective
  • Severity: low
  • Reference: GHSA-gpv5-7x3g-ghjv
  • Affected versions: 4.2.4
  • Package usage:
    • node_modules/fast-xml-parser

follow-redirects #

  • Follow Redirects improperly handles URLs in the url.parse() function
  • Severity: moderate (CVSS 6.1)
  • Reference: GHSA-jchw-25xp-jwwc
  • Affected versions: <=1.15.5
  • Package usage:
    • node_modules/follow-redirects

micromatch #

  • Regular Expression Denial of Service (ReDoS) in micromatch
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-952p-6rrq-rcjv
  • Affected versions: <4.0.8
  • Package usage:
    • node_modules/micromatch

postcss #

  • PostCSS line return parsing error
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-7fh5-64p2-3v2j
  • Affected versions: <8.4.31
  • Package usage:
    • node_modules/postcss

rollup #

  • DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS
  • Severity: high (CVSS 6.4)
  • Reference: GHSA-gcx4-mw62-g8wm
  • Affected versions: 3.0.0 - 3.29.4
  • Package usage:
    • node_modules/rollup

semver #

  • semver vulnerable to Regular Expression Denial of Service
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-c2qf-rxjj-qqgw
  • Affected versions: <=5.7.1 || 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
  • Package usage:
    • node_modules/@nextcloud/event-bus/node_modules/semver
    • node_modules/@typescript-eslint/eslint-plugin/node_modules/semver
    • node_modules/@typescript-eslint/typescript-estree/node_modules/semver
    • node_modules/@typescript-eslint/utils/node_modules/semver
    • node_modules/builtins/node_modules/semver
    • node_modules/eslint-plugin-jsdoc/node_modules/semver
    • node_modules/eslint-plugin-n/node_modules/semver
    • node_modules/eslint-plugin-vue/node_modules/semver
    • node_modules/make-dir/node_modules/semver
    • node_modules/semver
    • node_modules/vue-eslint-parser/node_modules/semver

vite #

  • Vite dev server option server.fs.deny can be bypassed when hosted on case-insensitive filesystem
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-c24v-8rfc-w8vw
  • Affected versions: 4.0.0 - 4.5.3
  • Package usage:
    • node_modules/vite

vue-resize #

  • Caused by vulnerable dependency:
  • Affected versions: 0.4.0 - 1.0.1
  • Package usage:
    • node_modules/vue-resize

vue-template-compiler #

  • vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)
  • Severity: moderate (CVSS 4.2)
  • Reference: GHSA-g3ch-rx76-35fx
  • Affected versions: >=2.0.0
  • Package usage:
    • node_modules/vue-template-compiler

webpack #

  • Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads to XSS
  • Severity: moderate (CVSS 6.4)
  • Reference: GHSA-4vvj-4cpr-p986
  • Affected versions: 5.0.0-alpha.0 - 5.93.0
  • Package usage:
    • node_modules/webpack

word-wrap #

  • word-wrap vulnerable to Regular Expression Denial of Service
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-j8xg-fqg3-53r7
  • Affected versions: <1.2.4
  • Package usage:
    • node_modules/word-wrap

Copy link
Member

@st3iny st3iny left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tested and works on server stable27.

@st3iny st3iny merged commit ed3bd93 into stable1.0 Nov 18, 2024
5 checks passed
@st3iny st3iny deleted the automated/noid/stable1.0-fix-npm-audit branch November 18, 2024 12:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants