yurikrupnik / mussia8

Mussia8 base project monorepo poc for api gateway
alfred-lake.vercel.app
MIT License
0 stars 0 forks source link

[Snyk] Security upgrade next from 11.1.0 to 13.5.4 #364

Open yurikrupnik opened 9 months ago

yurikrupnik commented 9 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - packages/ui/clients/alfred/package.json - packages/ui/clients/alfred/package-lock.json #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **551/1000**
**Why?** Recently disclosed, Has a fix available, CVSS 5.3 | Improper Input Validation
[SNYK-JS-POSTCSS-5926692](https://snyk.io/vuln/SNYK-JS-POSTCSS-5926692) | Yes | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: next The new version differs by 250 commits.
  • 1e8dca4 v13.5.4
  • 9e24d6f v13.5.4-canary.11
  • 281ae41 Fix build output logging order (#56335)
  • d7626ff Revert "misc: shortcut styled-jsx in external resolution (#56291)" (#56334)
  • db48052 v13.5.4-canary.10
  • 7df92b8 test: add flaky turbopack integration tests to manifest (#56309)
  • eeb9b33 fix: Invalid URL (404) provided on server actions error (#56323)
  • 3172cfe fix: support both decoded and encoded url requests of conventioned files (#56187)
  • a2f9ef5 fix(next/client): keep hash when navigating from app to pages router (#56223)
  • a970f28 Add code freeze GitHub actions for releasing (#56325)
  • 5fbc23e misc: fix instrumentation with bundled server (#56318)
  • 98432a4 Remove buildId test as it's no longer relevant (#56316)
  • 86274e6 fix(#53190): add missing crossOrigin to assetsPrefix resources (#56311)
  • e970e05 Reland static prefetches & fix prefetch bailout behavior (#56228)
  • be952fb fix: typo in `with-stripe-typescript` example (#56274)
  • 7f60cc8 Support serverRuntimeConfig and publicRuntimeConfig in Turbopack (#56310)
  • 8d18ad6 update webp crate (#56307)
  • ac95a20 Fix flaky test for size output (#56303)
  • dba978f misc: shortcut styled-jsx in external resolution (#56291)
  • 458dab8 misc: update code owners (#56290)
  • 5254aae Update image.mdx (#56266)
  • 0d4859b Update image.mdx (#56269)
  • 59bda2d More Turbopack fixes (#56299)
  • ecd94c1 misc: enable source maps for bundled runtime (#56289)
See the full diff
Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/yurikrupnik-plq/project/e660b6b4-487f-4f8f-a80b-9366e5d75a80?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/yurikrupnik-plq/project/e660b6b4-487f-4f8f-a80b-9366e5d75a80?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"3f30025c-662d-46ac-8d6c-30b50cf49eaf","prPublicId":"3f30025c-662d-46ac-8d6c-30b50cf49eaf","dependencies":[{"name":"next","from":"11.1.0","to":"13.5.4"}],"packageManager":"npm","projectPublicId":"e660b6b4-487f-4f8f-a80b-9366e5d75a80","projectUrl":"https://app.snyk.io/org/yurikrupnik-plq/project/e660b6b4-487f-4f8f-a80b-9366e5d75a80?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JS-POSTCSS-5926692"],"upgrade":["SNYK-JS-POSTCSS-5926692"],"isBreakingChange":true,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[551],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Improper Input Validation](https://learn.snyk.io/lesson/improper-input-validation/?loc=fix-pr)
secure-code-warrior-for-github[bot] commented 9 months ago

Micro-Learning Topic: Weak input validation (Detected by phrase)

Matched on "Improper Input Validation"

Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

Try a challenge in Secure Code Warrior

Helpful references