CodeForBaltimore / Bmore-Responsive

An API-driven CRM (Civic Relationship Management) system.
Apache License 2.0
10 stars 21 forks source link

[Snyk] Security upgrade casbin from 4.7.2 to 5.6.2 #555

Open helro154 opened 9 months ago

helro154 commented 9 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - package.json - package-lock.json #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **823/1000**
**Why?** Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 8.6 | Server-side Request Forgery (SSRF)
[SNYK-JS-IP-6240864](https://snyk.io/vuln/SNYK-JS-IP-6240864) | Yes | Proof of Concept (*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: casbin The new version differs by 119 commits.
  • c80332b chore(release): 5.6.2 [skip ci]
  • 6be1b06 fix: transfer from micromatch to picomatch (#264)
  • 9232afa Merge pull request #265 from Zxilly/build
  • b3a96a2 build: transfer all package link to official
  • 3c0372d Merge pull request #263 from Zxilly/ip
  • 5d6ebab refactor: Remove the dependency on node-ip
  • 8f3c4b6 Merge pull request #262 from casbin/dependabot/npm_and_yarn/ssri-6.0.2
  • fd45c68 chore(deps): bump ssri from 6.0.1 to 6.0.2
  • 96c2de5 Merge pull request #253 from Zxilly/fix
  • eeee9b3 docs: change description of casbinJsGetPermissionForUser
  • b8d9c97 chore(release): 5.6.1 [skip ci]
  • 98c11f1 fix: fix CasbinJsGetPermissionForUser() (#251)
  • 92f8d05 chore(release): 5.6.0 [skip ci]
  • 763c18e feat: add priority_policy_explicit support (#250)
  • d5fe5ac chore(release): 5.5.0 [skip ci]
  • b40c3b4 Merge pull request #249 from Zxilly/named_matching_func
  • 2f8801c fix: remove unused import
  • dc9e5b5 fix: fix errror type
  • 87f8011 feat: add initRmMap
  • 3cd5b73 feat: add unittest
  • 70e4e12 feat: add sync mode
  • 523ce85 fix: add missing await
  • 65d3a26 feat: add named addMatchingFunc
  • 5953411 refactor: refactor rm to rmMap
See the full diff
Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/helro154/project/0e131e1e-322e-4d70-8504-c8878d5971f7?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/helro154/project/0e131e1e-322e-4d70-8504-c8878d5971f7?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"f9c2ef38-cb39-40ec-960f-d85bc712d8cb","prPublicId":"f9c2ef38-cb39-40ec-960f-d85bc712d8cb","dependencies":[{"name":"casbin","from":"4.7.2","to":"5.6.2"}],"packageManager":"npm","projectPublicId":"0e131e1e-322e-4d70-8504-c8878d5971f7","projectUrl":"https://app.snyk.io/org/helro154/project/0e131e1e-322e-4d70-8504-c8878d5971f7?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JS-IP-6240864"],"upgrade":["SNYK-JS-IP-6240864"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[823],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Server-side Request Forgery (SSRF)](https://learn.snyk.io/lesson/ssrf-server-side-request-forgery/?loc=fix-pr)