Conversation
Bumps [qs](https://github.com/ljharb/qs) from 6.14.0 to 6.14.1. - [Changelog](https://github.com/ljharb/qs/blob/main/CHANGELOG.md) - [Commits](ljharb/qs@v6.14.0...v6.14.1) --- updated-dependencies: - dependency-name: qs dependency-version: 6.14.1 dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
chore(deps): bump qs from 6.14.0 to 6.14.1
``` $ npm audit glob 10.2.0 - 10.4.5 Severity: high glob CLI: Command injection via -c/--cmd executes matches with shell:true - GHSA-5j98-mcp5-4vw2 fix available via `npm audit fix` node_modules/@jest/reporters/node_modules/glob node_modules/jest-config/node_modules/glob node_modules/jest-runtime/node_modules/glob nodemailer <=7.0.10 Severity: moderate Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict - GHSA-mm7p-fcc7-pg87 Nodemailer’s addressparser is vulnerable to DoS caused by recursive calls - GHSA-rcmh-qjqh-p98v Nodemailer is vulnerable to DoS through Uncontrolled Recursion - GHSA-46j5-6fg5-4gv3 fix available via `npm audit fix --force` Will install email-templates@13.0.1, which is a breaking change node_modules/email-templates/node_modules/nodemailer node_modules/mailparser/node_modules/nodemailer node_modules/preview-email/node_modules/nodemailer email-templates >=3.0.0 Depends on vulnerable versions of nodemailer Depends on vulnerable versions of preview-email node_modules/email-templates mailparser 2.3.1 - 3.9.0 Depends on vulnerable versions of nodemailer node_modules/mailparser preview-email * Depends on vulnerable versions of nodemailer node_modules/preview-email qs <6.14.1 Severity: high qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion - GHSA-6rw7-vpxm-498p No fix available node_modules/request/node_modules/qs request * Depends on vulnerable versions of qs Depends on vulnerable versions of tough-cookie node_modules/request recaptcha2 * Depends on vulnerable versions of request node_modules/recaptcha2 tmp <=0.2.3 tmp allows arbitrary temporary file / directory write via symbolic link `dir` parameter - GHSA-52f5-9888-hmc6 No fix available node_modules/tmp useragent * Depends on vulnerable versions of tmp node_modules/useragent @hapi/scooter * Depends on vulnerable versions of useragent node_modules/@hapi/scooter tough-cookie <4.1.3 Severity: moderate tough-cookie Prototype Pollution vulnerability - GHSA-72xf-g2v4-qvf3 No fix available node_modules/tough-cookie validator <=13.15.20 Severity: high Inefficient Regular Expression Complexity in validator.js - GHSA-qgmg-gppg-76g5 validator.js has a URL validation bypass vulnerability in its isURL function - GHSA-9965-vmph-33xx Validator is Vulnerable to Incomplete Filtering of One or More Instances of Special Elements - GHSA-vghf-hv5q-vc2g fix available via `npm audit fix --force` Will install mongoose-validator@1.3.1, which is a breaking change node_modules/mongoose-validator/node_modules/validator mongoose-validator <=1.2.6 || >=1.3.2 Depends on vulnerable versions of validator node_modules/mongoose-validator 14 vulnerabilities (4 low, 5 moderate, 5 high) $ npm audit fix ... 12 vulnerabilities (3 low, 5 moderate, 4 high) ``` Refs: HID-2444
…6-01 fix(security): Bump packages that can be bumped without breakage.
Bumps [nodemailer](https://github.com/nodemailer/nodemailer) from 7.0.11 to 7.0.12. - [Release notes](https://github.com/nodemailer/nodemailer/releases) - [Changelog](https://github.com/nodemailer/nodemailer/blob/master/CHANGELOG.md) - [Commits](nodemailer/nodemailer@v7.0.11...v7.0.12) --- updated-dependencies: - dependency-name: nodemailer dependency-version: 7.0.12 dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
…er-7.0.12 chore(deps): bump nodemailer from 7.0.11 to 7.0.12
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Additionally, the build now uses an Alpine 3.23 based nodejs image.
Refs: HID-2444 OPS-11940