yurikrupnik / mussia5-next

mussia5-next.yurikrupnik.vercel.app
1 stars 2 forks source link

[Snyk] Security upgrade next from 10.2.0 to 12.0.9 #249

Open snyk-bot opened 2 years ago

snyk-bot commented 2 years ago

Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 768/1000
Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-NODEFETCH-2964180
Yes Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: next The new version differs by 250 commits.
  • 07431d3 v12.0.9
  • c938e20 v12.0.9-canary.12
  • c385d1b REMOVE: duplicate key in docs/testing.md (#33681)
  • 9b98c5a chore(docs): update security headers specification (#33673)
  • 865a079 v12.0.9-canary.11
  • b5d4564 Revert "Relay Support in Rust Compiler" (#33699)
  • 5c6c385 Use relative path for example (#33565)
  • 65c63c9 v12.0.9-canary.10
  • b20eb99 Relay Support in Rust Compiler (#33240)
  • 99d4d6c Implement web server as the request handler for edge SSR (#33635)
  • f0e31ee feat(next-swc): Update swc (#33675)
  • d055fee Updated docs for getServerSideProps and getStaticProps return values (#33577)
  • 8d1c585 v12.0.9-canary.9
  • 72658c9 fix(errors/no-cache): `netlify-plugin-cache-nextjs` has been deprecated (#33629)
  • 7452c0b Add `lazyRoot` optional property to `next/image` component (#33290)
  • 9dd0399 feat(next-swc): Update swc (#33628)
  • eba64c2 Clarify `headers` config option description (#33484)
  • f60a480 v12.0.9-canary.8
  • c13d9a0 Update other instances of node-fetch (#33617)
  • e8c15e5 Ensure fetch polyfill is loaded in next-server (#33616)
  • 9a2d97c [examples] Add new Tailwind CSS Prettier plugin to example (#33614)
  • 562439d Update to latest version of turbo (#33613)
  • 3329ac6 v12.0.9-canary.7
  • c71465d Clarify `next/image` usage with `next export` based on feedback. (#33555)
See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: šŸ§ View latest project report

šŸ›  Adjust project settings

šŸ“š Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

šŸ¦‰ Learn about vulnerability in an interactive lesson of Snyk Learn.

secure-code-warrior-for-github[bot] commented 2 years ago

Micro-Learning Topic: Regular expression denial of service (Detected by phrase)

Matched on "Regular Expression Denial of Service"

What is this? (2min video)

Denial of Service (DoS) attacks caused by Regular Expression which causes the system to hang or cause them to work very slowly when attacker sends a well-crafted input(exponentially related to input size).Denial of service attacks significantly degrade the service quality experienced by legitimate users. These attacks introduce large response delays, excessive losses, and service interruptions, resulting in direct impact on availability.

Try this challenge in Secure Code Warrior

Micro-Learning Topic: Denial of service (Detected by phrase)

Matched on "Denial of Service"

The Denial of Service (DoS) attack is focused on making a resource (site, application, server) unavailable for the purpose it was designed. There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical, or resources handling vulnerabilities, among others. Source: https://www.owasp.org/index.php/Denial_of_Service

Try this challenge in Secure Code Warrior

sonarcloud[bot] commented 2 years ago

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication