Open renovate[bot] opened 3 years ago
π Deployed on https://6225ca3e5b9c351dccded654--emberclear.netlify.app
Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.
You can manually request rebase by checking the rebase/retry box above.
β οΈ Warning: custom changes will be lost.
This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.
This PR contains the following updates:
1.5.1
->1.5.9
GitHub Vulnerability Alerts
CVE-2022-0512
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
CVE-2022-0639
A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular,
Will return:
If the 'hostname' or 'origin' attributes of the output from url-parse are used in security decisions and the final 'href' attribute of the output is then used to make a request, the decision may be incorrect.
CVE-2022-0686
url-parse prior to version 1.5.8 is vulnerable to Authorization Bypass Through User-Controlled Key.
CVE-2022-0691
Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL.
If url-parse is used in security decisions involving the hostname / protocol, and the input URL is used in a client which uses the WHATWG URL parser, the decision may be incorrect.
This can also lead to a cross-site scripting (XSS) vulnerability if url-parse is used to check for the javascript: protocol in URLs. See following example:
CVE-2021-3664
Overview
Affected versions of npm
url-parse
are vulnerable to URL Redirection to Untrusted Site.Impact
Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
Release Notes
unshiftio/url-parse
### [`v1.5.9`](https://togithub.com/unshiftio/url-parse/compare/1.5.8...1.5.9) [Compare Source](https://togithub.com/unshiftio/url-parse/compare/1.5.8...1.5.9) ### [`v1.5.8`](https://togithub.com/unshiftio/url-parse/compare/1.5.7...1.5.8) [Compare Source](https://togithub.com/unshiftio/url-parse/compare/1.5.7...1.5.8) ### [`v1.5.7`](https://togithub.com/unshiftio/url-parse/compare/1.5.6...1.5.7) [Compare Source](https://togithub.com/unshiftio/url-parse/compare/1.5.6...1.5.7) ### [`v1.5.6`](https://togithub.com/unshiftio/url-parse/compare/1.5.5...1.5.6) [Compare Source](https://togithub.com/unshiftio/url-parse/compare/1.5.5...1.5.6) ### [`v1.5.5`](https://togithub.com/unshiftio/url-parse/compare/1.5.4...1.5.5) [Compare Source](https://togithub.com/unshiftio/url-parse/compare/1.5.4...1.5.5) ### [`v1.5.4`](https://togithub.com/unshiftio/url-parse/compare/1.5.3...1.5.4) [Compare Source](https://togithub.com/unshiftio/url-parse/compare/1.5.3...1.5.4) ### [`v1.5.3`](https://togithub.com/unshiftio/url-parse/compare/1.5.2...1.5.3) [Compare Source](https://togithub.com/unshiftio/url-parse/compare/1.5.2...1.5.3) ### [`v1.5.2`](https://togithub.com/unshiftio/url-parse/compare/1.5.1...1.5.2) [Compare Source](https://togithub.com/unshiftio/url-parse/compare/1.5.1...1.5.2)Configuration
π Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
π¦ Automerge: Disabled by config. Please merge this manually once you are satisfied.
β» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
π Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.