-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency n8n to v1.55.3 #6698
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Auto-approved because label type/renovate is present.
🔍 Vulnerabilities of
|
digest | sha256:28d614465b6deca7c3deb21e12171003acb90820e2f3798cc1f32edbbacaad55 |
vulnerabilities | |
platform | linux/amd64 |
size | 142 MB |
packages | 1344 |
axios
|
Affected range | >=1.3.2 |
Fixed version | 1.7.4 |
Description
axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.
semver 5.3.0
(npm)
pkg:npm/[email protected]
Inefficient Regular Expression Complexity
Affected range | <5.7.2 |
Fixed version | 5.7.2 |
CVSS Score | 7.5 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Description
Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
pdfjs-dist 2.16.105
(npm)
pkg:npm/[email protected]
Affected range | <=4.1.392 |
Fixed version | 4.2.67 |
Description
Impact
If pdf.js is used to load a malicious PDF, and PDF.js is configured with
isEvalSupported
set totrue
(which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.Patches
The patch removes the use of
eval
:
mozilla/pdf.js#18015Workarounds
Set the option
isEvalSupported
tofalse
.References
fast-xml-parser 4.2.5
(npm)
pkg:npm/[email protected]
Uncontrolled Resource Consumption
Affected range | <4.4.1 |
Fixed version | 4.4.1 |
CVSS Score | 7.5 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Description
Summary
A ReDOS exists on currency.js was discovered by Gauss Security Labs R&D team.
Details
https://github.com/NaturalIntelligence/fast-xml-parser/blob/master/src/v5/valueParsers/currency.js#L10
contains a vulnerable regexPoC
pass the following string '\t'.repeat(13337) + '.'
Impact
Denial of service during currency parsing in experimental version 5 of fast-xml-parser-library
axios 1.6.5
(npm)
pkg:npm/[email protected]
Server-Side Request Forgery (SSRF)
Affected range | >=1.3.2 |
Fixed version | 1.7.4 |
Description
axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.
axios 1.7.3
(npm)
pkg:npm/[email protected]
Server-Side Request Forgery (SSRF)
Affected range | >=1.3.2 |
Fixed version | 1.7.4 |
Description
axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.
micromatch 4.0.7
(npm)
pkg:npm/[email protected]
Inefficient Regular Expression Complexity
Affected range | <=4.0.7 |
Fixed version | Not Fixed |
Description
The NPM package
micromatch
is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs inmicromatch.braces()
inindex.js
because the pattern.*
will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching.
identity 3.4.2
(npm)
pkg:npm/%40azure/[email protected]
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Affected range | <4.2.1 |
Fixed version | 4.2.1 |
CVSS Score | 5.5 |
CVSS Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Description
Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability.
Attempting automerge. See https://github.com/uniget-org/tools/actions/runs/10504684912. |
PR is clean and can be merged. See https://github.com/uniget-org/tools/actions/runs/10504684912. |
This PR contains the following updates:
1.54.4
->1.55.3
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
n8n-io/n8n (n8n)
v1.55.3
Compare Source
Bug Fixes
v1.55.2
Compare Source
Bug Fixes
v1.55.1
Compare Source
Bug Fixes
workflow-post-execute
event (#10413) (94423be)v1.55.0
Compare Source
Bug Fixes
GET /workflows
in Public API (#10379) (5ac65b3)SIGINT
for main (#10346) (5255793)Features
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.