minsk-hackerspace / hackerspace.by

Website of Minsk Hackerspace (Ruby on Rails)
https://hackerspace.by/
11 stars 20 forks source link

Bump rails-html-sanitizer from 1.4.3 to 1.4.4 #588

Closed dependabot[bot] closed 1 year ago

dependabot[bot] commented 1 year ago

Bumps rails-html-sanitizer from 1.4.3 to 1.4.4.

Release notes

Sourced from rails-html-sanitizer's releases.

1.4.4 / 2022-12-13

  • Address inefficient regular expression complexity with certain configurations of Rails::Html::Sanitizer.

    Fixes CVE-2022-23517. See GHSA-5x79-w82f-gw8w for more information.

    Mike Dalessio

  • Address improper sanitization of data URIs.

    Fixes CVE-2022-23518 and #135. See GHSA-mcvf-2q2m-x72m for more information.

    Mike Dalessio

  • Address possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.

    Fixes CVE-2022-23520. See GHSA-rrfc-7g8p-99q8 for more information.

    Mike Dalessio

  • Address possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.

    Fixes CVE-2022-23519. See GHSA-9h9g-93gc-623h for more information.

    Mike Dalessio

Changelog

Sourced from rails-html-sanitizer's changelog.

1.4.4 / 2022-12-13

  • Address inefficient regular expression complexity with certain configurations of Rails::Html::Sanitizer.

    Fixes CVE-2022-23517. See GHSA-5x79-w82f-gw8w for more information.

    Mike Dalessio

  • Address improper sanitization of data URIs.

    Fixes CVE-2022-23518 and #135. See GHSA-mcvf-2q2m-x72m for more information.

    Mike Dalessio

  • Address possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.

    Fixes CVE-2022-23520. See GHSA-rrfc-7g8p-99q8 for more information.

    Mike Dalessio

  • Address possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.

    Fixes CVE-2022-23519. See GHSA-9h9g-93gc-623h for more information.

    Mike Dalessio

Commits
  • fd63dea version bump to v1.4.4
  • 48ae90a dep: bump dependency on loofah
  • 0713caf fix: escape CDATA nodes using Loofah's escaping methods
  • e6d52d3 revert 45a5c10
  • d1223a2 fix: use Loofah's scrub_uri_attribute method
  • f0e3347 fix: replace slow regex attribute check with Loofah method
  • df03f2f ci: pin system lib test to 20.04
  • 3e2a0f3 Merge pull request #145 from rails/flavorjones-get-14x-green
  • 11752a6 tests: handle libxml 2.10.0 incorrectly-opened comment parsing
  • See full diff in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/minsk-hackerspace/hackerspace.by/network/alerts).
codecov[bot] commented 1 year ago

Codecov Report

Base: 57.94% // Head: 57.94% // No change to project coverage :thumbsup:

Coverage data is based on head (f7769ac) compared to base (d2df2d2). Patch has no changes to coverable lines.

Additional details and impacted files ```diff @@ Coverage Diff @@ ## master #588 +/- ## ======================================= Coverage 57.94% 57.94% ======================================= Files 65 65 Lines 1410 1410 ======================================= Hits 817 817 Misses 593 593 ``` Help us with your feedback. Take ten seconds to tell us [how you rate us](https://about.codecov.io/nps?utm_medium=referral&utm_source=github&utm_content=comment&utm_campaign=pr+comments&utm_term=minsk-hackerspace). Have a feature suggestion? [Share it here.](https://app.codecov.io/gh/feedback/?utm_medium=referral&utm_source=github&utm_content=comment&utm_campaign=pr+comments&utm_term=minsk-hackerspace)

:umbrella: View full report at Codecov.
:loudspeaker: Do you have feedback about the report comment? Let us know in this issue.