Skip to content

[Snyk] Upgrade auth0-extension-tools from 1.3.3 to 1.5.2#131

Open
crew-security wants to merge 1 commit intomasterfrom
snyk-upgrade-6bbda755f4f140843329b48f0932d4d9
Open

[Snyk] Upgrade auth0-extension-tools from 1.3.3 to 1.5.2#131
crew-security wants to merge 1 commit intomasterfrom
snyk-upgrade-6bbda755f4f140843329b48f0932d4d9

Conversation

@crew-security
Copy link

snyk-top-banner

Snyk has created this PR to upgrade auth0-extension-tools from 1.3.3 to 1.5.2.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 9 versions ahead of your current version.

  • The recommended version was released 4 years ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Prototype Override Protection Bypass
npm:qs:20170213
292 No Known Exploit
high severity Server-side Request Forgery (SSRF)
SNYK-JS-IP-6240864
292 Proof of Concept
high severity Uninitialized Memory Exposure
npm:https-proxy-agent:20180402
292 Mature
high severity Uninitialized Memory Exposure
npm:http-proxy-agent:20180406
292 Mature
high severity Server-side Request Forgery (SSRF)
SNYK-JS-NETMASK-1089716
292 Proof of Concept
high severity Server-side Request Forgery (SSRF)
SNYK-JS-NETMASK-6056519
292 Proof of Concept
high severity Remote Code Execution (RCE)
SNYK-JS-PACRESOLVER-1564857
292 Proof of Concept
high severity Remote Code Execution (RCE)
SNYK-JS-PUGCODEGEN-1082232
292 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
292 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
292 Proof of Concept
high severity Uninitialized Memory Exposure
npm:base64url:20180511
292 Mature
medium severity Server-Side Request Forgery (SSRF)
SNYK-JS-IP-7148531
292 Proof of Concept
medium severity Man-in-the-Middle (MitM)
SNYK-JS-HTTPSPROXYAGENT-469131
292 Proof of Concept
medium severity Information Exposure
npm:superagent:20181108
292 No Known Exploit
medium severity Information Exposure
npm:superagent:20181108
292 No Known Exploit
medium severity Information Exposure
npm:superagent:20181108
292 No Known Exploit
medium severity Information Exposure
SNYK-JS-AUTH0-596476
292 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-COOKIEJAR-3149984
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-COOKIEJAR-3149984
292 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
292 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
npm:mime:20170907
292 No Known Exploit
low severity Denial of Service (DoS)
npm:superagent:20170807
292 No Known Exploit
low severity Denial of Service (DoS)
npm:superagent:20170807
292 No Known Exploit
low severity Denial of Service (DoS)
npm:superagent:20170807
292 No Known Exploit
low severity Regular Expression Denial of Service (ReDoS)
npm:clean-css:20180306
292 Proof of Concept
Release notes
Package name: auth0-extension-tools from auth0-extension-tools GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

Snyk has created this PR to upgrade auth0-extension-tools from 1.3.3 to 1.5.2.

See this package in npm:
auth0-extension-tools

See this project in Snyk:
https://app.snyk.io/org/iam-KPWiZJYntQ5PW7Pgqw4LGq/project/ea1a59f5-e9e1-4da7-b004-58fa71b2c345?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants