dotkom / onlineweb-frontend

Next generation frontend for onlineweb
https://online.ntnu.no
23 stars 9 forks source link

[Snyk] Fix for 8 vulnerabilities #707

Closed henrikskog closed 6 months ago

henrikskog commented 9 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - package.json
⚠️ Warning ``` Failed to update the package-lock.json, please update manually before merging. ```
#### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **526/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 4.1 | Arbitrary Code Injection
[SNYK-JS-EJS-1049328](https://snyk.io/vuln/SNYK-JS-EJS-1049328) | Yes | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **726/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 8.1 | Remote Code Execution (RCE)
[SNYK-JS-EJS-2803307](https://snyk.io/vuln/SNYK-JS-EJS-2803307) | Yes | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-GLOBPARENT-1016905](https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-POSTCSS-1090595](https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **586/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-POSTCSS-1255640](https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640) | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **479/1000**
**Why?** Has a fix available, CVSS 5.3 | Improper Input Validation
[SNYK-JS-POSTCSS-5926692](https://snyk.io/vuln/SNYK-JS-POSTCSS-5926692) | No | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **479/1000**
**Why?** Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-TERSER-2806366](https://snyk.io/vuln/SNYK-JS-TERSER-2806366) | No | No Known Exploit ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **589/1000**
**Why?** Has a fix available, CVSS 7.5 | Prototype Pollution
[SNYK-JS-UNSETVALUE-2400660](https://snyk.io/vuln/SNYK-JS-UNSETVALUE-2400660) | Yes | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: next The new version differs by 250 commits.
  • 6b97bce v10.2.0
  • 0abbb75 v10.1.4-canary.18
  • b26077b Upgrade postcss (#24546)
  • 53c19ff Test fixes for Babel mode (#24312)
  • f3d5183 Remove experimental note for has routes (#24529)
  • 5de5e49 feat: bump styled-components lib version examples (#24482)
  • 0f2bd4f v10.1.4-canary.17
  • efa58ef Ensure stalled CSS triggers fallback navigation (#24488)
  • fff183c Font optimization bug fix (#24162)
  • fc53879 Fix: Object Destructuring Error (#24397)
  • cac9ccf Ensure proxy rewrite does not hang on error (#24394)
  • cf4ba8d Upgrade eslint to the latest version (#24377)
  • 08ee60d [next] update initial config message (#23165)
  • a6ba432 Now -> Vercel in api-routes-rest (#24431)
  • 29402f3 Replace experimental `reactMode` with `reactRoot` (#24280)
  • 2743a74 v10.1.4-canary.16
  • a9d2f2f Update 3.feature_request.yml
  • f904615 Update 2.example_bug_report.yml
  • 4aa0ba7 Update 1.bug_report.yml
  • 40216be Workaround for discrete passive effects change (#24369)
  • 079c629 experimental: remove legacy plugin system (#20759)
  • cce82cd Fix side effects in router-is-ready tests (#24360)
  • 1e9f459 v10.1.4-canary.15
  • 6cd1c87 Fix not exposing server errors in hot reloader (#24331)
See the full diff
Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/dotkom-thi/project/9c46f68f-58f9-47c6-a05a-79bcba91bef6?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/dotkom-thi/project/9c46f68f-58f9-47c6-a05a-79bcba91bef6?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"5c8eaf56-5c51-498b-bb25-0cf6a316d02b","prPublicId":"5c8eaf56-5c51-498b-bb25-0cf6a316d02b","dependencies":[{"name":"@next/bundle-analyzer","from":"9.5.5","to":"10.0.4"},{"name":"babel-jest","from":"24.9.0","to":"27.0.0"},{"name":"next","from":"10.0.0","to":"10.2.0"}],"packageManager":"npm","projectPublicId":"9c46f68f-58f9-47c6-a05a-79bcba91bef6","projectUrl":"https://app.snyk.io/org/dotkom-thi/project/9c46f68f-58f9-47c6-a05a-79bcba91bef6?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JS-EJS-1049328","SNYK-JS-EJS-2803307","SNYK-JS-GLOBPARENT-1016905","SNYK-JS-POSTCSS-5926692","SNYK-JS-POSTCSS-1090595","SNYK-JS-POSTCSS-1255640","SNYK-JS-TERSER-2806366","SNYK-JS-UNSETVALUE-2400660"],"upgrade":["SNYK-JS-EJS-1049328","SNYK-JS-EJS-2803307","SNYK-JS-GLOBPARENT-1016905","SNYK-JS-POSTCSS-1090595","SNYK-JS-POSTCSS-1255640","SNYK-JS-POSTCSS-5926692","SNYK-JS-TERSER-2806366","SNYK-JS-UNSETVALUE-2400660"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["pr-warning-shown","priorityScore"],"priorityScoreList":[526,726,586,479,586,586,479,589],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Arbitrary Code Injection](https://learn.snyk.io/lesson/malicious-code-injection/?loc=fix-pr) 🦉 [Regular Expression Denial of Service (ReDoS)](https://learn.snyk.io/lesson/redos/?loc=fix-pr) 🦉 [Improper Input Validation](https://learn.snyk.io/lesson/improper-input-validation/?loc=fix-pr) 🦉 [More lessons are available in Snyk Learn](https://learn.snyk.io/?loc=fix-pr)
vercel[bot] commented 9 months ago

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
onlineweb-frontend ❌ Failed (Inspect) Nov 28, 2023 3:10pm
sonarcloud[bot] commented 9 months ago

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication