yurikrupnik / mussia8

Mussia8 base project monorepo poc for api gateway
alfred-lake.vercel.app
MIT License
0 stars 0 forks source link

[Snyk] Security upgrade next from 11.1.0 to 12.0.9 #304

Open yurikrupnik opened 1 year ago

yurikrupnik commented 1 year ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - packages/ui/clients/alfred/package.json - packages/ui/clients/alfred/package-lock.json #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **551/1000**
**Why?** Recently disclosed, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS)
[SNYK-JS-LOADERUTILS-3105943](https://snyk.io/vuln/SNYK-JS-LOADERUTILS-3105943) | Yes | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: next The new version differs by 250 commits.
  • 07431d3 v12.0.9
  • c938e20 v12.0.9-canary.12
  • c385d1b REMOVE: duplicate key in docs/testing.md (#33681)
  • 9b98c5a chore(docs): update security headers specification (#33673)
  • 865a079 v12.0.9-canary.11
  • b5d4564 Revert "Relay Support in Rust Compiler" (#33699)
  • 5c6c385 Use relative path for example (#33565)
  • 65c63c9 v12.0.9-canary.10
  • b20eb99 Relay Support in Rust Compiler (#33240)
  • 99d4d6c Implement web server as the request handler for edge SSR (#33635)
  • f0e31ee feat(next-swc): Update swc (#33675)
  • d055fee Updated docs for getServerSideProps and getStaticProps return values (#33577)
  • 8d1c585 v12.0.9-canary.9
  • 72658c9 fix(errors/no-cache): `netlify-plugin-cache-nextjs` has been deprecated (#33629)
  • 7452c0b Add `lazyRoot` optional property to `next/image` component (#33290)
  • 9dd0399 feat(next-swc): Update swc (#33628)
  • eba64c2 Clarify `headers` config option description (#33484)
  • f60a480 v12.0.9-canary.8
  • c13d9a0 Update other instances of node-fetch (#33617)
  • e8c15e5 Ensure fetch polyfill is loaded in next-server (#33616)
  • 9a2d97c [examples] Add new Tailwind CSS Prettier plugin to example (#33614)
  • 562439d Update to latest version of turbo (#33613)
  • 3329ac6 v12.0.9-canary.7
  • c71465d Clarify `next/image` usage with `next export` based on feedback. (#33555)
See the full diff
Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: šŸ§ [View latest project report](https://app.snyk.io/org/yurikrupnik-plq/project/e660b6b4-487f-4f8f-a80b-9366e5d75a80?utm_source=github&utm_medium=referral&page=fix-pr) šŸ›  [Adjust project settings](https://app.snyk.io/org/yurikrupnik-plq/project/e660b6b4-487f-4f8f-a80b-9366e5d75a80?utm_source=github&utm_medium=referral&page=fix-pr/settings) šŸ“š [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"ab7c17ce-8f19-4261-a89a-1928b1efcf9c","prPublicId":"ab7c17ce-8f19-4261-a89a-1928b1efcf9c","dependencies":[{"name":"next","from":"11.1.0","to":"12.0.9"}],"packageManager":"npm","projectPublicId":"e660b6b4-487f-4f8f-a80b-9366e5d75a80","projectUrl":"https://app.snyk.io/org/yurikrupnik-plq/project/e660b6b4-487f-4f8f-a80b-9366e5d75a80?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JS-LOADERUTILS-3105943"],"upgrade":["SNYK-JS-LOADERUTILS-3105943"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[551]}) --- **Learn how to fix vulnerabilities with free interactive lessons:** šŸ¦‰ [Regular Expression Denial of Service (ReDoS)](https://learn.snyk.io/lessons/redos/javascript/?loc=fix-pr)
secure-code-warrior-for-github[bot] commented 1 year ago

Micro-Learning Topic: Regular expression denial of service (Detected by phrase)

Matched on "Regular Expression Denial of Service"

What is this? (2min video)

Denial of Service (DoS) attacks caused by Regular Expression which causes the system to hang or cause them to work very slowly when attacker sends a well-crafted input(exponentially related to input size).Denial of service attacks significantly degrade the service quality experienced by legitimate users. These attacks introduce large response delays, excessive losses, and service interruptions, resulting in direct impact on availability.

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Denial of service (Detected by phrase)

Matched on "Denial of Service"

The Denial of Service (DoS) attack is focused on making a resource (site, application, server) unavailable for the purpose it was designed. There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical, or resources handling vulnerabilities, among others. Source: https://www.owasp.org/index.php/Denial_of_Service

Try a challenge in Secure Code Warrior