Open renovate[bot] opened 2 months ago
All modified and coverable lines are covered by tests :white_check_mark:
Project coverage is 100.00%. Comparing base (
13a1192
) to head (966ea61
).
:umbrella: View full report in Codecov by Sentry.
:loudspeaker: Have feedback on the report? Share it here.
@alallier Maybe you may need to check this PR because this change may will resolves a security vulnerability (cf npm audit)
This PR contains the following updates:
~1.15.0
->~1.16.0
GitHub Vulnerability Alerts
CVE-2024-43800
Impact
passing untrusted user input - even after sanitizing it - to
redirect()
may execute untrusted codePatches
this issue is patched in serve-static 1.16.0
Workarounds
users are encouraged to upgrade to the patched version of express, but otherwise can workaround this issue by making sure any untrusted inputs are safe, ideally by validating them against an explicit allowlist
Details
successful exploitation of this vector requires the following:
Release Notes
expressjs/serve-static (serve-static)
### [`v1.16.0`](https://redirect.github.com/expressjs/serve-static/blob/HEAD/HISTORY.md#1160--2024-09-10) [Compare Source](https://redirect.github.com/expressjs/serve-static/compare/v1.15.0...1.16.0) \=================== - Remove link renderization in html while redirectingConfiguration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.