Bulk vulnerability fix - Lockfile fix #1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Bulk vulnerability fix - Lockfile fix
This pull request will update your transitive dependencies within the allowed version intervals provided by your direct dependencies.
Fixed vulnerabilities:
CVE–2020–8203
Description
Allocation of Resources Without Limits or Throttling
NVD
CVSS details - 7.4
References
HackerOne
CVE-2020-8203 Lodash Vulnerability in NetApp Products | NetApp Product Security
CVE-2020-8203 is not modified in /.internal/baseSet.js · Issue #4874 · lodash/lodash · GitHub
Oracle Critical Patch Update Advisory - April 2021
CVE–2020–28500
Description
NVD
CVSS details - 5.3
References
CONFIRM
perf: improve performance of
toNumber
,trim
andtrimEnd
on large input strings by falsyvalues · Pull Request #5065 · lodash/lodash · GitHubFebruary 2021 Lodash Vulnerabilities in NetApp Products | NetApp Product Security
CVE–2021–23337
Description
Improper Neutralization of Special Elements used in a Command ('Command Injection')
NVD
GitHub
CVSS details - 7.2
References
MISC
February 2021 Lodash Vulnerabilities in NetApp Products | NetApp Product Security
lodash/lodash.js at ddfd9b11a0126db2302cb70ec9973b66baec0975 · lodash/lodash · GitHub
NVD - CVE-2021-23337
Prevent command injection through
_.template
'svariable
option · lodash/lodash@3469357 · GitHubCommand Injection in lodash · CVE-2021-23337 · GitHub Advisory Database · GitHub
CVE–2020–7598
Description
Improper Input Validation
NVD
GitHub
CVSS details - 5.6
References
[security-announce] openSUSE-SU-2020:0802-1: critical: Security update for nodejs8 - openSUSE Security Announce - openSUSE Mailing Lists
NVD - CVE-2020-7598
even more aggressive checks for protocol pollution · substack/minimist@38a4d1c · GitHub
Prototype Pollution in minimist · CVE-2020-7598 · GitHub Advisory Database · GitHub
don't assign onto proto · substack/minimist@63e7ed0 · GitHub
CVE–2020–28503
Description
NVD
CVSS details - 9.8
References
Fix: Avoids prototype pollution by sttk · Pull Request #7 · gulpjs/copy-props · GitHub
CVE–2021–23343
Description
NVD
CVSS details - 7.5
References
ReDoS in path-parse · Issue #8 · jbgutierrez/path-parse · GitHub
Pony Mail!
CVE–2021–23362
Description
NVD
GitHub
CVSS details - 5.3
References
Commits · npm/hosted-git-info · GitHub
fix: backport regex fix from #76 · npm/hosted-git-info@29adfe5 · GitHub
chore(release): 2.8.9 · npm/hosted-git-info@8d4b369 · GitHub
fix: simplify the regular expression for shortcut matching · npm/hosted-git-info@bede0dc · GitHub
NVD - CVE-2021-23362
Regular Expression Denial of Service in hosted-git-info · CVE-2021-23362 · GitHub Advisory Database · GitHub
CVE–2021–28918
Description
Improper Input Validation
GitHub
CVSS details - 9.1
References
netmask npm package vulnerable to octal input data · CVE-2021-29418 · GitHub Advisory Database · GitHub
GitHub - rs/node-netmask: Parse and lookup IP network blocks
security/SICK-2021-011.md at master · sickcodes/security · GitHub
Critical netmask networking bug impacts thousands of applications
netmask - npm
CVE-2021-28918 Node.js Vulnerability in NetApp Products | NetApp Product Security
CVE–2021–29418
Description
Improper Input Validation
NVD
CVSS details - 5.3
References
CVE-2021-29418 Node.js Vulnerability in NetApp Products | NetApp Product Security
Rewrite byte parsing in full JS without depending on parseInt · rs/node-netmask@3f19a05 · GitHub
Advisory #6 - RyotaK's Vuln DB
CVE–2021–23364
Description
NVD
GitHub
CVSS details - 5.3
References
Fix unsafe regexp · browserslist/browserslist@c091916 · GitHub
Fix ReDoS by yetingli · Pull Request #593 · browserslist/browserslist · GitHub
MISC
Regular Expression Denial of Service in browserslist · CVE-2021-23364 · GitHub Advisory Database · GitHub
browserslist/index.js at e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c · browserslist/browserslist · GitHub
NVD - CVE-2021-23364
CVE–2021–23368
Description
NVD
CVSS details - 5.3
References
Fix unsafe regexp · postcss/postcss@8682b1e · GitHub
Fix unsafe regexp in getAnnotationURL() too · postcss/postcss@b6f3e4d · GitHub
Pony Mail!
Pony Mail!
Pony Mail!
Pony Mail!
Pony Mail!
Pony Mail!
CVE–2020–8116
Description
Direct Request ('Forced Browsing')
NVD
GitHub
CVSS details - 7.3
References
HackerOne
Prototype Pollution in dot-prop · CVE-2020-8116 · GitHub Advisory Database · GitHub
GitHub - sindresorhus/dot-prop at v4
NVD - CVE-2020-8116
Please backport CVE-2020-8116 security fix to 4.x. · Issue #63 · sindresorhus/dot-prop · GitHub
Related information
📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more at Debricked