-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Snyk] Fix for 81 vulnerabilities #75
base: master
Are you sure you want to change the base?
Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JS-LODASH-1018905 - https://snyk.io/vuln/SNYK-JS-LODASH-1040724 - https://snyk.io/vuln/SNYK-JS-LODASH-450202 - https://snyk.io/vuln/SNYK-JS-LODASH-567746 - https://snyk.io/vuln/SNYK-JS-LODASH-608086 - https://snyk.io/vuln/SNYK-JS-LODASH-73638 - https://snyk.io/vuln/SNYK-JS-LODASH-73639 - https://snyk.io/vuln/SNYK-JS-MARKED-2342073 - https://snyk.io/vuln/SNYK-JS-MARKED-2342082 - https://snyk.io/vuln/SNYK-JS-MARKED-451540 - https://snyk.io/vuln/SNYK-JS-MARKED-584281 - https://snyk.io/vuln/SNYK-JS-MINIMATCH-1019388 - https://snyk.io/vuln/SNYK-JS-MINIMATCH-3050818 - https://snyk.io/vuln/SNYK-JS-MINIMIST-2429795 - https://snyk.io/vuln/SNYK-JS-MINIMIST-559764 - https://snyk.io/vuln/SNYK-JS-NODESASS-1059081 - https://snyk.io/vuln/SNYK-JS-NODESASS-535499 - https://snyk.io/vuln/SNYK-JS-NODESASS-535501 - https://snyk.io/vuln/SNYK-JS-NODESASS-535503 - https://snyk.io/vuln/SNYK-JS-NODESASS-535504 - https://snyk.io/vuln/SNYK-JS-NODESASS-535505 - https://snyk.io/vuln/SNYK-JS-NODESASS-540960 - https://snyk.io/vuln/SNYK-JS-NODESASS-540962 - https://snyk.io/vuln/SNYK-JS-NODESASS-540966 - https://snyk.io/vuln/SNYK-JS-NODESASS-540968 - https://snyk.io/vuln/SNYK-JS-NODESASS-540970 - https://snyk.io/vuln/SNYK-JS-NODESASS-540972 - https://snyk.io/vuln/SNYK-JS-NODESASS-540974 - https://snyk.io/vuln/SNYK-JS-NODESASS-540982 - https://snyk.io/vuln/SNYK-JS-NODESASS-540984 - https://snyk.io/vuln/SNYK-JS-NODESASS-540986 - https://snyk.io/vuln/SNYK-JS-NODESASS-540988 - https://snyk.io/vuln/SNYK-JS-NODESASS-542662 - https://snyk.io/vuln/SNYK-JS-PASSPORT-2840631 - https://snyk.io/vuln/SNYK-JS-QS-3153490 - https://snyk.io/vuln/SNYK-JS-REDIS-1255645 - https://snyk.io/vuln/SNYK-JS-SAILS-2428337 - https://snyk.io/vuln/SNYK-JS-SAILSHOOKSOCKETS-589929 - https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884 - https://snyk.io/vuln/SNYK-JS-SEQUELIZE-2932027 - https://snyk.io/vuln/SNYK-JS-SEQUELIZE-2959225 - https://snyk.io/vuln/SNYK-JS-SEQUELIZE-3324088 - https://snyk.io/vuln/SNYK-JS-SEQUELIZE-3324089 - https://snyk.io/vuln/SNYK-JS-SEQUELIZE-3324090 - https://snyk.io/vuln/SNYK-JS-SHELLQUOTE-1766506 - https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859 - https://snyk.io/vuln/SNYK-JS-SOCKETIOPARSER-1056752 - https://snyk.io/vuln/SNYK-JS-SOCKETIOPARSER-3091012 - https://snyk.io/vuln/SNYK-JS-STRIPTAGS-1312310 - https://snyk.io/vuln/SNYK-JS-TAR-1536528 - https://snyk.io/vuln/SNYK-JS-TAR-1536531 - https://snyk.io/vuln/SNYK-JS-TAR-1536758 - https://snyk.io/vuln/SNYK-JS-TAR-1579147 - https://snyk.io/vuln/SNYK-JS-TAR-1579152 - https://snyk.io/vuln/SNYK-JS-TAR-1579155 - https://snyk.io/vuln/SNYK-JS-TRIMNEWLINES-1298042 - https://snyk.io/vuln/SNYK-JS-UGLIFYJS-1727251 - https://snyk.io/vuln/SNYK-JS-VALIDATOR-1090599 - https://snyk.io/vuln/SNYK-JS-VALIDATOR-1090600 - https://snyk.io/vuln/SNYK-JS-VALIDATOR-1090601 - https://snyk.io/vuln/SNYK-JS-VALIDATOR-1090602 - https://snyk.io/vuln/SNYK-JS-WS-1296835 - https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936 - https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1255647 - https://snyk.io/vuln/npm:clean-css:20180306 - https://snyk.io/vuln/npm:debug:20170905 - https://snyk.io/vuln/npm:deep-extend:20180409 - https://snyk.io/vuln/npm:foreman:20180429 - https://snyk.io/vuln/npm:fresh:20170908 - https://snyk.io/vuln/npm:lodash:20180130 - https://snyk.io/vuln/npm:method-override:20170927 - https://snyk.io/vuln/npm:mime:20170907 - https://snyk.io/vuln/npm:minimatch:20160620 - https://snyk.io/vuln/npm:ms:20170412 - https://snyk.io/vuln/npm:qs:20170213 - https://snyk.io/vuln/npm:shell-quote:20160621 - https://snyk.io/vuln/npm:underscore.string:20170908 - https://snyk.io/vuln/npm:validator:20160218 - https://snyk.io/vuln/npm:ws:20171108 The following vulnerabilities are fixed with a Snyk patch: - https://snyk.io/vuln/npm:debug:20170905 - https://snyk.io/vuln/npm:mime:20170907 - https://snyk.io/vuln/npm:ms:20170412 - https://snyk.io/vuln/npm:negotiator:20160616 - https://snyk.io/vuln/npm:qs:20140806-1
Code InjectionPlay Labs on this vulnerability with SecureFlag! Start Code Injection LabDescriptionCode Injection, also known as Remote Code Execution (RCE), is possible when unsafe user-supplied data is used to run server-side code. This is typically as a result of an application executing code without prior validation, thus allowing an attacker to execute arbitrary code within the context of the vulnerable application. Not to be confused with OS Command Injection, Code Injection attacks allow the attacker to add their own code to be executed by the application, whereas OS Command Injection extends the preset functionality of the application to execute system commands, usually within the context of a shell. Code Injection attacks are only limited by the functionality of the language the attacker has injected i.e. not very limited at all! If PHP code is the language chosen for the injection and is executed successfully, the attacker has every utility available in PHP at her/his disposal. The Code Injection attack category encompasses multiple types of injection attacks, all of which are very prevalent and capable of extremely high levels of compromise. Indeed, OWASP has listed injection attacks as one of the most dangerous web application security risk since 2013. Read moreImpactMalicious attackers can leverage Code Injection vulnerabilities to gain a foothold in the hosting infrastructure, pivot to connected systems throughout the organization, execute unauthorized commands, and fully compromise the confidentiality, integrity, and availability of the application. Depending on the injection, this can usually lead to the complete compromise of the underlying operating system. The list of devastating Code Injection attacks, both public and behind closed doors, is far too long to list. Hot off the press in 2020, this Code Injection discovery was shown to affect the default Mail application on stock iPhones and iPads, resulting in remote code execution. In this particular instance, the vulnerability was identified by a security company which notified the vendor, Apple, of the issue. However, it is important as a developer to internalize the glaring reality that poorly written, unsecure code opens the way for attackers to potentially wreak havoc, which is why learning secure codeing skills from the beginning can potentially prevent an employer-destroying headline down the track. PreventionCode Injection attacks leveraging any language can be avoided by simply following some basic, yet essential, security practices. Overarching these general practices is the rule that a developer should treat all data as untrusted. Developers must not dynamically generate code that can be interpreted or executed by the application using user-provided data. Evaluating code that contains user input should only be implemented if there is no other way of achieving the same result without code execution. TestingVerify that the application avoids the use of
|
Micro-Learning Topic: OS command injection (Detected by phrase)Matched on "Command Injection"In many situations, applications will rely on OS provided functions, scripts, macros and utilities instead of reimplementing them in code. While functions would typically be accessed through a native interface library, the remaining three OS provided features will normally be invoked via the command line or launched as a process. If unsafe inputs are used to construct commands or arguments, it may allow arbitrary OS operations to be performed that can compromise the server. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Regular expression denial of service (Detected by phrase)Matched on "Regular Expression Denial of Service"Denial of Service (DoS) attacks caused by Regular Expression which causes the system to hang or cause them to work very slowly when attacker sends a well-crafted input(exponentially related to input size).Denial of service attacks significantly degrade the service quality experienced by legitimate users. These attacks introduce large response delays, excessive losses, and service interruptions, resulting in direct impact on availability. Try a challenge in Secure Code WarriorMicro-Learning Topic: Weak input validation (Detected by phrase)Matched on "Improper Input Validation"Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Buffer overflow (Detected by phrase)Matched on "Buffer Overflow"A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer. Try a challenge in Secure Code WarriorMicro-Learning Topic: Code injection (Detected by phrase)Matched on "Code Injection"Code injection happens when an application insecurely accepts input that is subsequently used in a dynamic code evaluation call. If insufficient validation or sanitisation is performed on the input, specially crafted inputs may be able to alter the syntax of the evaluated code and thus alter execution. In a worst case scenario, an attacker could run arbitrary code in the server context and thus perform almost any action on the application server. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Cross-site scripting (Detected by phrase)Matched on "Cross-site Scripting"Cross-site scripting vulnerabilities occur when unescaped input is rendered into a page displayed to the user. When HTML or script is included in the input, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Denial of service (Detected by phrase)Matched on "Denial of Service"The Denial of Service (DoS) attack is focused on making a resource (site, application, server) unavailable for the purpose it was designed. There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical, or resources handling vulnerabilities, among others. Source: https://www.owasp.org/index.php/Denial_of_Service Try a challenge in Secure Code WarriorMicro-Learning Topic: Information disclosure (Detected by phrase)Matched on "Information Exposure"Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project Try a challenge in Secure Code WarriorMicro-Learning Topic: Prototype pollution (Detected by phrase)Matched on "Prototype Pollution"By adding or modifying attributes of an object prototype, it is possible to create attributes that exist on every object, or replace critical attributes with malicious ones. This can be problematic if the software depends on existence or non-existence of certain attributes, or uses pre-defined attributes of object prototype (such as hasOwnProperty, toString or valueOf). Try a challenge in Secure Code WarriorMicro-Learning Topic: Resource exhaustion (Detected by phrase)Matched on "Resource Exhaustion"Allocating objects or timers with user-controlled sizes or durations can cause resource exhaustion. Try a challenge in Secure Code WarriorMicro-Learning Topic: SQL injection (Detected by phrase)Matched on "SQL Injection"This is probably one of the two most exploited vulnerabilities in web applications and has led to a number of high profile company breaches. It occurs when an application fails to sanitize or validate input before using it to dynamically construct a statement. An attacker that exploits this vulnerability will be able to gain access to the underlying database and view or modify data without permission. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Type confusion (Detected by phrase)Matched on "Type Confusion"When attackers are able to manipulate the memory reserved for objects directly, they can then pass a reference to a crafted block of memory to be used in the place of a valid object type. This triggers the run time engine to execute arbitrary code which is under the control of the attacker due to the induced type confusion. Try a challenge in Secure Code Warrior |
Micro-Learning Topic: OS command injection (Detected by phrase)Matched on "OS Command Injection"In many situations, applications will rely on OS provided functions, scripts, macros and utilities instead of reimplementing them in code. While functions would typically be accessed through a native interface library, the remaining three OS provided features will normally be invoked via the command line or launched as a process. If unsafe inputs are used to construct commands or arguments, it may allow arbitrary OS operations to be performed that can compromise the server. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Code injection (Detected by phrase)Matched on "Code Injection"Code injection happens when an application insecurely accepts input that is subsequently used in a dynamic code evaluation call. If insufficient validation or sanitisation is performed on the input, specially crafted inputs may be able to alter the syntax of the evaluated code and thus alter execution. In a worst case scenario, an attacker could run arbitrary code in the server context and thus perform almost any action on the application server. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Injection attack (Detected by phrase)Matched on "Injection attack"Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project Try a challenge in Secure Code WarriorHelpful references
|
Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.
Changes included in this PR
Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
Adding or updating a Snyk policy (.snyk) file; this file is required in order to apply Snyk vulnerability patches.
Find out more.
Vulnerabilities that will be fixed
With an upgrade:
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-LODASH-1018905
Why? Proof of Concept exploit, Has a fix available, CVSS 7.2
SNYK-JS-LODASH-1040724
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
SNYK-JS-LODASH-450202
Why? Proof of Concept exploit, Has a fix available, CVSS 8.2
SNYK-JS-LODASH-567746
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
SNYK-JS-LODASH-608086
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
SNYK-JS-LODASH-73638
Why? Proof of Concept exploit, Has a fix available, CVSS 4.4
SNYK-JS-LODASH-73639
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-MARKED-2342073
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-MARKED-2342082
Why? Has a fix available, CVSS 5.3
SNYK-JS-MARKED-451540
Why? Has a fix available, CVSS 5.9
SNYK-JS-MARKED-584281
Why? Has a fix available, CVSS 7.5
SNYK-JS-MINIMATCH-1019388
Why? Has a fix available, CVSS 5.3
SNYK-JS-MINIMATCH-3050818
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
SNYK-JS-MINIMIST-2429795
Why? Proof of Concept exploit, Has a fix available, CVSS 5.6
SNYK-JS-MINIMIST-559764
Why? Has a fix available, CVSS 5.3
SNYK-JS-NODESASS-1059081
Why?
SNYK-JS-NODESASS-535499
Why?
SNYK-JS-NODESASS-535501
Why?
SNYK-JS-NODESASS-535503
Why?
SNYK-JS-NODESASS-535504
Why?
SNYK-JS-NODESASS-535505
Why?
SNYK-JS-NODESASS-540960
Why?
SNYK-JS-NODESASS-540962
Why?
SNYK-JS-NODESASS-540966
Why?
SNYK-JS-NODESASS-540968
Why?
SNYK-JS-NODESASS-540970
Why?
SNYK-JS-NODESASS-540972
Why?
SNYK-JS-NODESASS-540974
Why?
SNYK-JS-NODESASS-540982
Why?
SNYK-JS-NODESASS-540984
Why?
SNYK-JS-NODESASS-540986
Why?
SNYK-JS-NODESASS-540988
Why?
SNYK-JS-NODESASS-542662
Why? Has a fix available, CVSS 4.8
SNYK-JS-PASSPORT-2840631
Why? Proof of Concept exploit, CVSS 7.5
SNYK-JS-QS-3153490
Why? Has a fix available, CVSS 5.3
SNYK-JS-REDIS-1255645
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
SNYK-JS-SAILS-2428337
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
SNYK-JS-SAILSHOOKSOCKETS-589929
Why? Has a fix available, CVSS 5.3
SNYK-JS-SCSSTOKENIZER-2339884
Why? Proof of Concept exploit, Has a fix available, CVSS 9.4
SNYK-JS-SEQUELIZE-2932027
Why? Has a fix available, CVSS 7
SNYK-JS-SEQUELIZE-2959225
Why? Has a fix available, CVSS 8.3
SNYK-JS-SEQUELIZE-3324088
Why?
SNYK-JS-SEQUELIZE-3324089
Why?
SNYK-JS-SEQUELIZE-3324090
Why?
SNYK-JS-SHELLQUOTE-1766506
Why?
SNYK-JS-SOCKETIO-1024859
Why?
SNYK-JS-SOCKETIOPARSER-1056752
Why?
SNYK-JS-SOCKETIOPARSER-3091012
Why?
SNYK-JS-STRIPTAGS-1312310
Why?
SNYK-JS-TAR-1536528
Why?
SNYK-JS-TAR-1536531
Why? Has a fix available, CVSS 3.7
SNYK-JS-TAR-1536758
Why? Has a fix available, CVSS 8.5
SNYK-JS-TAR-1579147
Why? Has a fix available, CVSS 8.5
SNYK-JS-TAR-1579152
Why? Has a fix available, CVSS 8.5
SNYK-JS-TAR-1579155
Why? Has a fix available, CVSS 7.5
SNYK-JS-TRIMNEWLINES-1298042
Why?
SNYK-JS-UGLIFYJS-1727251
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-VALIDATOR-1090599
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-VALIDATOR-1090600
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-VALIDATOR-1090601
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
SNYK-JS-VALIDATOR-1090602
Why?
SNYK-JS-WS-1296835
Why?
SNYK-JS-XMLHTTPREQUESTSSL-1082936
Why?
SNYK-JS-XMLHTTPREQUESTSSL-1255647
Why?
npm:clean-css:20180306
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
npm:debug:20170905
Why?
npm:deep-extend:20180409
Why?
npm:foreman:20180429
Why?
npm:fresh:20170908
Why? Proof of Concept exploit, Has a fix available, CVSS 6.3
npm:lodash:20180130
Why?
npm:method-override:20170927
Why?
npm:mime:20170907
Why? Has a fix available, CVSS 7.5
npm:minimatch:20160620
Why?
npm:ms:20170412
Why? CVSS 7.5
npm:qs:20170213
Why?
npm:shell-quote:20160621
Why? Has a fix available, CVSS 7.5
npm:underscore.string:20170908
Why? Has a fix available, CVSS 5.3
npm:validator:20160218
Why?
npm:ws:20171108
(*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: connect-redis
The new version differs by 4 commits.See the full diff
Package name: dateformat
The new version differs by 9 commits.See the full diff
Package name: foreman
The new version differs by 63 commits.See the full diff
Package name: grunt-contrib-uglify
The new version differs by 142 commits.See the full diff
Package name: grunt-sass
The new version differs by 12 commits.See the full diff
Package name: grunt-sync
The new version differs by 17 commits.See the full diff
Package name: marked
The new version differs by 250 commits.See the full diff
Package name: node-sass
The new version differs by 250 commits.See the full diff
Package name: passport
The new version differs by 160 commits.See the full diff
Package name: rc
The new version differs by 56 commits.See the full diff
Package name: redis
The new version differs by 142 commits.See the full diff
Package name: sails
The new version differs by 250 commits.