voltrue2 / in-app-purchase

A Node.js module for in-App-Purchase for iOS, Android, Amazon and Windows.
http://iap.gracenode.org
Other
1.05k stars 289 forks source link

Bump xml-crypto from 0.10.1 to 2.0.0 #329

Open dependabot[bot] opened 3 years ago

dependabot[bot] commented 3 years ago

Bumps xml-crypto from 0.10.1 to 2.0.0.

Release notes

Sourced from xml-crypto's releases.

Disable HMAC by default

Due to the potential of a key confusion vulnerability in support of HMAC-SHA1, the HMAC-SHA1 "signing" algorithm has been disabled by default.

Previously, in certain situations it was possible to bypass signing checks by maliciously changing the algorithm to HMAC-SHA1 and using the public key as the HMAC secret.

If you need to validate an HMAC signature, you now must first call SignedXml.enableHMAC().

All users are encouraged to upgrade.

v1.5.3

Round out having callbacks for more methods (#209)

v1.5.2

Lock ejs to 2.6.1 without npm-shrinkwrap (638ab6c)

v1.5.1

Prevent global leak, pass xml object to callback (#207)

v1.5.0

Allow signature signing/verification to take place via callback (#206)

v1.4.1

validation instruction typo (#192) update js-yaml (#205) correct whitespace normalization (#196)

v1.4.0

Bring calculation of canonicalized signatures more in-line with verification (#183)

v1.3.0

Xml enc c14# inclusivenamespace fixes and refactor (#179)

v1.2.0

Accept pre-existing xml prefixes to avoid adding to signature (#171)

v1.1.4

Fix enveloped signatures properly (#174)

v1.1.3

Fix #72 using #172

v1.1.2

Revert #163 in an attempt to troubleshoot #167

v1.1.1

Bugfix - ensure require('xpath.js').xpath retains API compatibility

... (truncated)

Commits
Maintainer changes

This version was pushed to npm by bawolff, a new releaser for xml-crypto since your current version.


Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/voltrue2/in-app-purchase/network/alerts).
> **Note** > Automatic rebases have been disabled on this pull request as it has been open for over 30 days.
thatshailesh commented 5 months ago

@voltrue2 if you're still alive, please merge all the vulnerabilities PRs with fixes.