yurikrupnik / mussia5-next

mussia5-next.yurikrupnik.vercel.app
1 stars 2 forks source link

[Snyk] Security upgrade axios from 0.21.1 to 1.6.0 #281

Open yurikrupnik opened 1 year ago

yurikrupnik commented 1 year ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - package.json - package-lock.json #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **748/1000**
**Why?** Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 7.1 | Cross-site Request Forgery (CSRF)
[SNYK-JS-AXIOS-6032459](https://snyk.io/vuln/SNYK-JS-AXIOS-6032459) | Yes | Proof of Concept (*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: axios The new version differs by 250 commits.
  • f7adacd chore(release): v1.6.0 (#6031)
  • 9917e67 chore(ci): fix release-it arg; (#6032)
  • 96ee232 fix(CSRF): fixed CSRF vulnerability CVE-2023-45857 (#6028)
  • 7d45ab2 chore(tests): fixed tests to pass in node v19 and v20 with `keep-alive` enabled; (#6021)
  • 5aaff53 fix(dns): fixed lookup function decorator to work properly in node v20; (#6011)
  • a48a63a chore(docs): added AxiosHeaders docs; (#5932)
  • a1c8ad0 fix(types): fix AxiosHeaders types; (#5931)
  • 2ac731d chore(docs): update readme.md (#5889)
  • 88fb52b chore(release): v1.5.1 (#5920)
  • e410779 fix(adapters): improved adapters loading logic to have clear error messages; (#5919)
  • bc9af51 fix(formdata): fixed automatic addition of the `Content-Type` header for FormData in non-browser environments; (#5917)
  • 4c89f25 fix(headers): allow `content-encoding` header to handle case-insensitive values (#5890) (#5892)
  • ae00391 docs(paramsSerializer config within request config): update documentation for paramsSerializer
  • a989ccd Change isNaN to Number.isNaN
  • b5b7760 docs: fix CommonJS usage note
  • 9e62056 fix(types): removed duplicated code
  • 6365751 chore(release): v1.5.0 (#5838)
  • 1601f4a feat(export): export adapters without `unsafe` prefix (#5839)
  • dff74ae docs: linting documentation notes (#5791)
  • ca73eb8 feat: export getAdapter function (#5324)
  • 9a414bb fix(adapter): make adapter loading error more clear by using platform-specific adapters explicitly (#5837)
  • b3e327d fix(dns): fixed `cacheable-lookup` integration; (#5836)
  • 8fda276 fix(headers): fixed common Content-Type header merging; (#5832)
  • d8b4ca0 fix(headers): added support for setting header names that overlap with class methods; (#5831)
See the full diff
Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/yurikrupnik/project/ae10a455-7de4-4d41-a094-a456ab64f193?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/yurikrupnik/project/ae10a455-7de4-4d41-a094-a456ab64f193?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"a62f5010-9a5e-4e14-a745-a168b4c1f74b","prPublicId":"a62f5010-9a5e-4e14-a745-a168b4c1f74b","dependencies":[{"name":"axios","from":"0.21.1","to":"1.6.0"}],"packageManager":"npm","projectPublicId":"ae10a455-7de4-4d41-a094-a456ab64f193","projectUrl":"https://app.snyk.io/org/yurikrupnik/project/ae10a455-7de4-4d41-a094-a456ab64f193?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JS-AXIOS-6032459"],"upgrade":["SNYK-JS-AXIOS-6032459"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[748],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Cross-site Request Forgery (CSRF)](https://learn.snyk.io/lesson/csrf-attack/?loc=fix-pr)
secure-code-warrior-for-github[bot] commented 1 year ago

Micro-Learning Topic: Cross-site request forgery (Detected by phrase)

Matched on "Cross-site Request Forgery"

What is this? (2min video)

Session-related but not session-based, this attack is based on the ability of an attacker to force an action on a user’s browser (commonly in the form of a POST request) to perform an unauthorized action on behalf of the user. This can often occur without the user even noticing it… or only noticing when it is too late. The root cause is that browsers automatically send session cookies with all requests to a given domain, regardless of where the source of the request came from, and the application server cannot differentiate between a request that came from pages it served or a request that came from an unrelated page.

Try a challenge in Secure Code Warrior

Helpful references
sonarcloud[bot] commented 1 year ago

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication