-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Do not merge] Minimal hapi upgrade experiment #374
base: master
Are you sure you want to change the base?
Conversation
Semgrep found 1
Risk: Affected version of handlebars is vulnerable to Improper Neutralization Of Special Elements In Output Used By A Downstream Component ('Injection') / Improperly Controlled Modification Of Object Prototype Attributes ('Prototype Pollution'). The vulnerability allows for Prototype Pollution, potentially leading to Remote Code Execution, as templates can modify an object's Fix: Upgrade this library to at least version 4.3.0 at auth0-authorization-extension/package-lock.json:22913. Reference(s): GHSA-w457-6q6x-cgp9, CVE-2019-19919 Ignore this finding from ssc-45c7ee79-f517-41e2-b61a-45743d9df9c6.Semgrep found 1
Risk: npm 6.x before 6.13.4 is vulnerable to improper limitation of a pathname to a restricted directory ('path traversal'). Affected versions will overwrite globally-installed package binaries without user interaction, as well as ignoring the explicit Fix: Upgrade this library to at least version 6.13.4 at auth0-authorization-extension/package-lock.json:19375. Reference(s): GHSA-4328-8hgf-7wjr, CVE-2019-16777 Ignore this finding from ssc-65a2e86a-8a34-49df-84cd-7cabdd12116b.Semgrep found 1
Risk: npm 6.x before 6.13.3 is vulnerable to improper link resolution before file access ('link following'). A malicious package may use the Fix: Upgrade this library to at least version 6.13.3 at auth0-authorization-extension/package-lock.json:19375. Reference(s): GHSA-m6cx-g6qm-p2cx, CVE-2019-16775 Ignore this finding from ssc-20e23dff-ba75-4719-8048-9a1ded0967b5.Semgrep found 1
Risk: npm 6.x before 6.13.3 is vulnerable to improper limitation of a pathname to a restricted directory ('path traversal'). Affected versions of NPM do not prevent package authors from generating symlinks outside of the node_modules folder, allowing a malicious package author to symlink to arbitrary files on package install. Upgrade to npm 6.13.3. Fix: Upgrade this library to at least version 6.13.3 at auth0-authorization-extension/package-lock.json:19375. Reference(s): GHSA-x8qc-rrcw-4r46, CVE-2019-16776 Ignore this finding from ssc-b4a210b5-93e0-4df0-8a99-fea9553da8f2.Semgrep found 1
Risk: Affected version of deep-extend is vulnerable to Prototype Pollution. Malicious input passed to deep-extend allows an attacker to overwrite the prototype of Fix: Upgrade this library to at least version 0.5.1 at auth0-authorization-extension/package-lock.json:21994. Reference(s): GHSA-hr2v-3952-633q, CVE-2018-3750 Ignore this finding from ssc-1606921e-eb4c-4a25-bcec-3cbfbc985ee1. |
✏️ Changes
📷 Screenshots
If there were visual changes to the application with this change, please include before and after screenshots here. If it has animation, please use screen capture software like to make a gif.
🔗 References
🎯 Testing
✅🚫 This change has been tested in a Webtask
✅🚫 This change has unit test coverage
✅🚫 This change has integration test coverage
✅🚫 This change has been tested for performance
🚀 Deployment
✅🚫 This can be deployed any time
🎡 Rollout
In order to verify that the deployment was successful we will …
🔥 Rollback
We will rollback if …
📄 Procedure
🖥 Appliance
Note to reviewers: ensure that this change is compatible with the Appliance.