MrPutzi / design-ai-toolkit

Design + AI Toolkit
https://design-plus-ai-toolkit.vercel.app/
1 stars 0 forks source link

[Snyk] Security upgrade nsfwjs from 2.4.2 to 3.0.0 #31

Closed MrPutzi closed 2 months ago

MrPutzi commented 2 months ago

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123) ### Snyk has created this PR to fix 4 vulnerabilities in the npm dependencies of this project. #### Snyk changed the following file(s): - `package.json`
⚠️ Warning ``` Failed to update the package-lock.json, please update manually before merging. ```
#### Vulnerabilities that will be fixed with an upgrade: | | Issue | Score | :-------------------------:|:-------------------------|:------------------------- ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png 'high severity') | Denial of Service (DoS)
[SNYK-JS-JPEGJS-2859218](https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218) |   **696**   ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png 'medium severity') | Server-side Request Forgery (SSRF)
[SNYK-JS-REQUEST-3361831](https://snyk.io/vuln/SNYK-JS-REQUEST-3361831) |   **646**   ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png 'medium severity') | Prototype Pollution
[SNYK-JS-TOUGHCOOKIE-5672873](https://snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873) |   **646**   ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png 'medium severity') | Denial of Service (DoS)
[SNYK-JS-JPEGJS-570039](https://snyk.io/vuln/SNYK-JS-JPEGJS-570039) |   **509**   --- > [!IMPORTANT] > > - Check the changes in this PR to ensure they won't cause issues with your project. > - Max score is 1000. Note that the real score may have changed since the PR was raised. > - This PR was automatically created by Snyk using the credentials of a real user. --- **Note:** _You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs._ For more information: 🧐 [View latest project report](https://app.snyk.io/org/mrputzi/project/eadd465a-3383-42a9-95df-1f9c9478430c?utm_source=github&utm_medium=referral&page=fix-pr) 📜 [Customise PR templates](https://docs.snyk.io/scan-using-snyk/pull-requests/snyk-fix-pull-or-merge-requests/customize-pr-templates) 🛠 [Adjust project settings](https://app.snyk.io/org/mrputzi/project/eadd465a-3383-42a9-95df-1f9c9478430c?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read about Snyk's upgrade logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Denial of Service (DoS)](https://learn.snyk.io/lesson/redos/?loc=fix-pr) 🦉 [Server-side Request Forgery (SSRF)](https://learn.snyk.io/lesson/ssrf-server-side-request-forgery/?loc=fix-pr) 🦉 [Prototype Pollution](https://learn.snyk.io/lesson/prototype-pollution/?loc=fix-pr) [//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"nsfwjs","from":"2.4.2","to":"3.0.0"}],"env":"prod","issuesToFix":[{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-JPEGJS-2859218","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JS-JPEGJS-570039","priority_score":509,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.9","score":295},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-REQUEST-3361831","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-TOUGHCOOKIE-5672873","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Prototype Pollution"}],"prId":"9fd28bce-db1f-4649-97f5-855f520c63da","prPublicId":"9fd28bce-db1f-4649-97f5-855f520c63da","packageManager":"npm","priorityScoreList":[696,509,646,646],"projectPublicId":"eadd465a-3383-42a9-95df-1f9c9478430c","projectUrl":"https://app.snyk.io/org/mrputzi/project/eadd465a-3383-42a9-95df-1f9c9478430c?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["updated-fix-title","pr-warning-shown","priorityScore"],"type":"user-initiated","upgrade":["SNYK-JS-JPEGJS-2859218","SNYK-JS-JPEGJS-570039","SNYK-JS-REQUEST-3361831","SNYK-JS-TOUGHCOOKIE-5672873"],"vulns":["SNYK-JS-JPEGJS-2859218","SNYK-JS-JPEGJS-570039","SNYK-JS-REQUEST-3361831","SNYK-JS-TOUGHCOOKIE-5672873"],"patch":[],"isBreakingChange":true,"remediationStrategy":"vuln"}'
vercel[bot] commented 2 months ago

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
design-ai-toolkit ❌ Failed (Inspect) May 30, 2024 5:08am
codeautopilot[bot] commented 2 months ago

PR summary

This Pull Request upgrades the nsfwjs package from version 2.4.2 to 3.0.0 to address four security vulnerabilities. The vulnerabilities include Denial of Service (DoS), Server-side Request Forgery (SSRF), and Prototype Pollution. The upgrade aims to enhance the security of the project by mitigating these identified risks.

Suggestion

Ensure that the package-lock.json file is updated to reflect the changes in package.json before merging. This will help maintain consistency and prevent potential dependency issues.