Skip to content

Conversation

@nextcloud-command
Copy link
Contributor

Audit report

This audit fix resolves 29 of the total 37 vulnerabilities found in your project.

Updated dependencies

Fixed vulnerabilities

@nextcloud/capabilities #

@nextcloud/dialogs #

@nextcloud/files #

  • Caused by vulnerable dependency:
  • Affected versions: >=1.1.0
  • Package usage:
    • node_modules/@nextcloud/files

@nextcloud/typings #

  • Caused by vulnerable dependency:
  • Affected versions: 1.7.0 - 1.8.0
  • Package usage:
    • node_modules/@nextcloud/typings

@nextcloud/vite-config #

@vitejs/plugin-vue2 #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/@vitejs/plugin-vue2

@vue/language-core #

  • Caused by vulnerable dependency:
  • Affected versions: <=2.0.28
  • Package usage:
    • node_modules/@vue/language-core

@vue/test-utils #

  • Caused by vulnerable dependency:
  • Affected versions: <=1.3.6
  • Package usage:
    • node_modules/@vue/test-utils

@vue/typescript #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/@vue/typescript

axios #

  • Server-Side Request Forgery in axios
  • Severity: high
  • Reference: GHSA-8hc4-vh64-cxmj
  • Affected versions: 1.3.2 - 1.7.3
  • Package usage:
    • node_modules/axios

babel-helper-function-name #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/babel-helper-function-name

babel-plugin-transform-class-properties #

babel-template #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/babel-template

babel-traverse #

  • Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code
  • Severity: critical 🚨 (CVSS 9.4)
  • Reference: GHSA-67hx-6x53-jw92
  • Affected versions: *
  • Package usage:
    • node_modules/babel-traverse

braces #

  • Uncontrolled resource consumption in braces
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-grv7-fg5c-xmjg
  • Affected versions: <3.0.3
  • Package usage:
    • node_modules/braces

cross-spawn #

  • Regular Expression Denial of Service (ReDoS) in cross-spawn
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-3xgq-45jj-v275
  • Affected versions: 7.0.0 - 7.0.4
  • Package usage:
    • node_modules/cross-spawn

dompurify #

  • DOMPurify allows tampering by prototype pollution
  • Severity: high (CVSS 7)
  • Reference: GHSA-mmhx-hmjr-r674
  • Affected versions: 3.0.0 - 3.1.2
  • Package usage:
    • node_modules/dompurify

elliptic #

  • Elliptic's EDDSA missing signature length check
  • Severity: low (CVSS 5.3)
  • Reference: GHSA-f7q4-pwc6-w24p
  • Affected versions: <=6.5.7
  • Package usage:
    • node_modules/elliptic

follow-redirects #

  • follow-redirects' Proxy-Authorization header kept across hosts
  • Severity: moderate (CVSS 6.5)
  • Reference: GHSA-cxjh-pqwp-8mfp
  • Affected versions: <=1.15.5
  • Package usage:
    • node_modules/follow-redirects

happy-dom #

  • happy-dom allows for server side code to be executed by a <script> tag
  • Severity: critical 🚨
  • Reference: GHSA-96g7-g7g9-jxw8
  • Affected versions: <15.10.2
  • Package usage:
    • node_modules/happy-dom

micromatch #

  • Regular Expression Denial of Service (ReDoS) in micromatch
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-952p-6rrq-rcjv
  • Affected versions: <4.0.8
  • Package usage:
    • node_modules/micromatch

nanoid #

  • Predictable results in nanoid generation when given non-integer values
  • Severity: moderate (CVSS 4.3)
  • Reference: GHSA-mwcw-c2x4-8c55
  • Affected versions: <3.3.8
  • Package usage:
    • node_modules/nanoid

rollup #

  • DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS
  • Severity: high (CVSS 6.4)
  • Reference: GHSA-gcx4-mw62-g8wm
  • Affected versions: 3.0.0 - 3.29.4
  • Package usage:
    • node_modules/rollup

vite #

  • Vite's server.fs.deny did not deny requests for patterns with directories.
  • Severity: moderate (CVSS 5.9)
  • Reference: GHSA-8jhw-289h-jh2g
  • Affected versions: 4.0.0 - 4.5.3
  • Package usage:
    • node_modules/vite

vite-plugin-dts #

  • Caused by vulnerable dependency:
  • Affected versions: 3.0.0-beta.1 - 4.0.0-beta.2
  • Package usage:
    • node_modules/vite-plugin-dts

vue-resize #

  • Caused by vulnerable dependency:
  • Affected versions: 0.4.0 - 1.0.1
  • Package usage:
    • node_modules/vue-resize

vue-template-compiler #

  • vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)
  • Severity: moderate (CVSS 4.2)
  • Reference: GHSA-g3ch-rx76-35fx
  • Affected versions: >=2.0.0
  • Package usage:
    • node_modules/vue-template-compiler

vue-tsc #

webpack #

  • Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads to XSS
  • Severity: moderate (CVSS 6.4)
  • Reference: GHSA-4vvj-4cpr-p986
  • Affected versions: 5.0.0-alpha.0 - 5.93.0
  • Package usage:
    • node_modules/webpack

@nextcloud-command nextcloud-command added 3. to review dependencies Pull requests that update a dependency file labels Jan 12, 2025
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable28-fix-npm-audit branch from d7af366 to 1a259ae Compare January 19, 2025 03:16
@Antreesy Antreesy force-pushed the automated/noid/stable28-fix-npm-audit branch from 1a259ae to 7ac90c6 Compare January 29, 2025 11:39
@Antreesy Antreesy force-pushed the automated/noid/stable28-fix-npm-audit branch from 7ac90c6 to 1f4fd58 Compare January 29, 2025 11:53
@Antreesy
Copy link
Collaborator

/compile

Signed-off-by: nextcloud-command <[email protected]>
Copy link
Collaborator

@Antreesy Antreesy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tested

@Antreesy Antreesy merged commit df4a9ec into stable28 Jan 29, 2025
29 of 30 checks passed
@Antreesy Antreesy deleted the automated/noid/stable28-fix-npm-audit branch January 29, 2025 12:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

3. to review dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants