Summer-16 / CSGO-VMPanel

A Fully automated VIP Management panel for CSGO Community servers
GNU General Public License v3.0
86 stars 19 forks source link

[Snyk] Fix for 6 vulnerabilities #62

Closed Summer-16 closed 6 days ago

Summer-16 commented 2 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - Panel_Server/package.json #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **534/1000**
**Why?** Has a fix available, CVSS 6.4 | Improper Authentication
[SNYK-JS-JSONWEBTOKEN-3180022](https://snyk.io/vuln/SNYK-JS-JSONWEBTOKEN-3180022) | Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **539/1000**
**Why?** Has a fix available, CVSS 6.5 | Improper Restriction of Security Token Assignment
[SNYK-JS-JSONWEBTOKEN-3180024](https://snyk.io/vuln/SNYK-JS-JSONWEBTOKEN-3180024) | Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **554/1000**
**Why?** Has a fix available, CVSS 6.8 | Use of a Broken or Risky Cryptographic Algorithm
[SNYK-JS-JSONWEBTOKEN-3180026](https://snyk.io/vuln/SNYK-JS-JSONWEBTOKEN-3180026) | Yes | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **718/1000**
**Why?** Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 6.5 | Prototype Poisoning
[SNYK-JS-MYSQL2-6591084](https://snyk.io/vuln/SNYK-JS-MYSQL2-6591084) | Yes | Proof of Concept ![critical severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png "critical severity") | **883/1000**
**Why?** Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 9.8 | Remote Code Execution (RCE)
[SNYK-JS-MYSQL2-6591085](https://snyk.io/vuln/SNYK-JS-MYSQL2-6591085) | Yes | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **718/1000**
**Why?** Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 6.5 | Improper Input Validation
[SNYK-JS-MYSQL2-6591300](https://snyk.io/vuln/SNYK-JS-MYSQL2-6591300) | Yes | Proof of Concept (*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: jsonwebtoken The new version differs by 17 commits.
  • e1fa9dc Merge pull request from GHSA-8cf7-32gw-wr33
  • 5eaedbf chore(ci): remove github test actions job (#861)
  • cd4163e chore(ci): configure Github Actions jobs for Tests & Security Scanning (#856)
  • ecdf6cc fix!: Prevent accidental use of insecure key sizes & misconfiguration of secrets (#852)
  • 8345030 fix(sign&verify)!: Remove default `none` support from `sign` and `verify` methods, and require it to be explicitly configured (#851)
  • 7e6a86b Upload OpsLevel YAML (#849)
  • 74d5719 docs: update references vercel/ms references (#770)
  • d71e383 docs: document "invalid token" error
  • 3765003 docs: fix spelling in README.md: Peak -> Peek (#754)
  • a46097e docs: make decode impossible to discover before verify
  • 15a1bc4 refactor: make decode non-enumerable
  • 5f10bf9 docs: add jwtid to options of jwt.verify (#704)
  • 88cb9df Replace tilde-indexOf with includes (#647)
  • a6235fa Adds not to README on decoded payload validation (#646)
  • 5ed1f06 docs: fix tiny style change in readme (#622)
  • 9fb90ca style: add missing semicolon (#641)
  • a9e38b8 ci: use circleci (#589)
See the full diff
Package name: mysql2 The new version differs by 250 commits.
  • cf3fa60 chore(master): release 3.9.4 (#2566)
  • 4a964a3 fix(security): improve results object creation (#2574)
  • 71115d8 ci: improve parser tests (#2573)
  • 74abf9e fix(security): improve supportBigNumbers and bigNumberStrings sanitization (#2572)
  • 8a818ce fix(docs): improve the contribution guidelines (#2552)
  • 0f08c7c build(deps-dev): bump @ docusaurus/tsconfig in /website (#2563)
  • 165c4d6 build(deps-dev): bump @ docusaurus/eslint-plugin in /website (#2564)
  • 9b5ed7b build(deps): bump @ docusaurus/preset-classic in /website (#2562)
  • 096db64 build(deps-dev): bump typescript from 5.4.3 to 5.4.4 (#2561)
  • b91fd16 build(deps-dev): bump tsx from 4.7.1 to 4.7.2 in /website (#2557)
  • 8e68d02 build(deps-dev): bump @ types/node from 20.12.3 to 20.12.4 (#2558)
  • 0f2b89f build(deps): bump sass from 1.72.0 to 1.74.1 in /website (#2556)
  • caa8598 build(deps-dev): bump @ types/node from 20.12.2 to 20.12.3 (#2555)
  • 63f7789 chore(website): update dependencies manually (#2553)
  • 63f1055 Separated each certificate into single array element (#2542)
  • 19d378e build(deps-dev): bump @ types/node from 20.11.30 to 20.12.2 (#2544)
  • a9c6c3e build(deps-dev): bump @ typescript-eslint/eslint-plugin in /website (#2535)
  • e315b9e build(deps-dev): bump @ typescript-eslint/parser in /website (#2534)
  • 1609b53 docs: remove RDS related issues (#2533)
  • e82592e docs: fix change logs from v3.9.3 (#2532)
  • f813a65 chore(master): release 3.9.3 (#2529)
  • b603cae ci: drop Node.js 14 and 16 from matrix (#2531)
  • bd30872 ci: fix test file name (#2530)
  • 0d54b0c fix(cache): improve cache key serialization (#2424)
See the full diff
Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/summer-16/project/b97c7adb-c32c-416b-a4af-5a0b8893c987?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/summer-16/project/b97c7adb-c32c-416b-a4af-5a0b8893c987?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"457e850e-a6aa-4afd-9c47-e3b037d423eb","prPublicId":"457e850e-a6aa-4afd-9c47-e3b037d423eb","dependencies":[{"name":"jsonwebtoken","from":"8.5.1","to":"9.0.0"},{"name":"mysql2","from":"2.3.3","to":"3.9.4"}],"packageManager":"npm","projectPublicId":"b97c7adb-c32c-416b-a4af-5a0b8893c987","projectUrl":"https://app.snyk.io/org/summer-16/project/b97c7adb-c32c-416b-a4af-5a0b8893c987?utm_source=github&utm_medium=referral&page=fix-pr","type":"user-initiated","patch":[],"vulns":["SNYK-JS-JSONWEBTOKEN-3180022","SNYK-JS-JSONWEBTOKEN-3180024","SNYK-JS-JSONWEBTOKEN-3180026","SNYK-JS-MYSQL2-6591084","SNYK-JS-MYSQL2-6591085","SNYK-JS-MYSQL2-6591300"],"upgrade":["SNYK-JS-JSONWEBTOKEN-3180022","SNYK-JS-JSONWEBTOKEN-3180024","SNYK-JS-JSONWEBTOKEN-3180026","SNYK-JS-MYSQL2-6591084","SNYK-JS-MYSQL2-6591085","SNYK-JS-MYSQL2-6591300"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["priorityScore"],"priorityScoreList":[534,539,554,718,883,718],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Improper Authentication](https://learn.snyk.io/lesson/broken-access-control/?loc=fix-pr) 🦉 [Use of a Broken or Risky Cryptographic Algorithm](https://learn.snyk.io/lesson/insecure-hash/?loc=fix-pr) 🦉 [Prototype Poisoning](https://learn.snyk.io/lesson/prototype-pollution/?loc=fix-pr) 🦉 [More lessons are available in Snyk Learn](https://learn.snyk.io/?loc=fix-pr)