Skip to content

Conversation

@nextcloud-command
Copy link
Contributor

@nextcloud-command nextcloud-command commented Aug 25, 2024

Audit report

This audit fix resolves 19 of the total 26 vulnerabilities found in your project.

Updated dependencies

Fixed vulnerabilities

@nextcloud/axios #

  • Caused by vulnerable dependency:
  • Affected versions: <=2.3.0
  • Package usage:
    • node_modules/@nextcloud/vue/node_modules/@nextcloud/axios

@nextcloud/dialogs #

  • Caused by vulnerable dependency:
  • Affected versions: >=2.0.0
  • Package usage:
    • node_modules/@nextcloud/dialogs

@nextcloud/files #

  • Caused by vulnerable dependency:
  • Affected versions: >=1.1.0
  • Package usage:
    • node_modules/@nextcloud/files

@nextcloud/l10n #

  • Caused by vulnerable dependency:
  • Affected versions: >=1.1.0
  • Package usage:
    • node_modules/@nextcloud/files/node_modules/@nextcloud/l10n
    • node_modules/@nextcloud/l10n

@nextcloud/vue #

@vue/component-compiler-utils #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/@vue/component-compiler-utils

axios #

  • Axios Cross-Site Request Forgery Vulnerability
  • Severity: moderate (CVSS 6.5)
  • Reference: GHSA-wf5p-g6vw-rhxx
  • Affected versions: 0.8.1 - 0.27.2
  • Package usage:
    • node_modules/axios

body-parser #

  • body-parser vulnerable to denial of service when url encoding is enabled
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-qwcr-r2fm-qrc7
  • Affected versions: <1.20.3
  • Package usage:
    • node_modules/body-parser

cookie #

  • cookie accepts cookie name, path, and domain with out of bounds characters
  • Severity: low
  • Reference: GHSA-pxg6-pf52-xh8x
  • Affected versions: <0.7.0
  • Package usage:
    • node_modules/cookie

dompurify #

  • DOMPurify allows tampering by prototype pollution
  • Severity: high (CVSS 7)
  • Reference: GHSA-mmhx-hmjr-r674
  • Affected versions: 3.0.0 - 3.1.2
  • Package usage:
    • node_modules/dompurify

express #

  • express vulnerable to XSS via response.redirect()
  • Severity: moderate (CVSS 5)
  • Reference: GHSA-qw6h-vgh9-j6wx
  • Affected versions: <=4.21.0 || 5.0.0-alpha.1 - 5.0.0
  • Package usage:
    • node_modules/express

micromatch #

  • Regular Expression Denial of Service (ReDoS) in micromatch
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-952p-6rrq-rcjv
  • Affected versions: <4.0.8
  • Package usage:
    • node_modules/micromatch

node-gettext #

  • node-gettext vulnerable to Prototype Pollution
  • Severity: moderate (CVSS 5.9)
  • Reference: GHSA-g974-hxvm-x689
  • Affected versions: *
  • Package usage:
    • node_modules/node-gettext

path-to-regexp #

  • path-to-regexp outputs backtracking regular expressions
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-9wv6-86v2-598j
  • Affected versions: <0.1.10
  • Package usage:
    • node_modules/path-to-regexp

postcss #

  • PostCSS line return parsing error
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-7fh5-64p2-3v2j
  • Affected versions: <8.4.31
  • Package usage:
    • node_modules/@vue/component-compiler-utils/node_modules/postcss

send #

  • send vulnerable to template injection that can lead to XSS
  • Severity: moderate (CVSS 5)
  • Reference: GHSA-m6fv-jmcg-4jfg
  • Affected versions: <0.19.0
  • Package usage:
    • node_modules/send

serve-static #

  • serve-static vulnerable to template injection that can lead to XSS
  • Severity: moderate (CVSS 5)
  • Reference: GHSA-cm22-4g7w-348p
  • Affected versions: <=1.16.0
  • Package usage:
    • node_modules/serve-static

vue-loader #

  • Caused by vulnerable dependency:
  • Affected versions: 15.0.0-beta.1 - 15.11.1
  • Package usage:
    • node_modules/vue-loader

webpack #

  • Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads to XSS
  • Severity: moderate (CVSS 6.4)
  • Reference: GHSA-4vvj-4cpr-p986
  • Affected versions: 5.0.0-alpha.0 - 5.93.0
  • Package usage:
    • node_modules/webpack

@nextcloud-command nextcloud-command added 3. to review dependencies Pull requests that update a dependency file labels Aug 25, 2024
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable28-fix-npm-audit branch from 4cee28e to d0dddaa Compare September 1, 2024 03:33
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable28-fix-npm-audit branch 2 times, most recently from 20dc078 to 70912ef Compare September 15, 2024 03:27
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable28-fix-npm-audit branch from 70912ef to 15f1b56 Compare September 22, 2024 03:31
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable28-fix-npm-audit branch from 15f1b56 to 14cc8a1 Compare September 29, 2024 03:38
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable28-fix-npm-audit branch 2 times, most recently from c7652a5 to e651489 Compare October 13, 2024 03:32
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable28-fix-npm-audit branch from e651489 to 2d82a50 Compare October 20, 2024 03:25
@Pytal Pytal merged commit 853922b into stable28 Oct 21, 2024
@Pytal Pytal deleted the automated/noid/stable28-fix-npm-audit branch October 21, 2024 18:17
@Altahrim Altahrim mentioned this pull request Oct 30, 2024
2 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

3. to review dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants