fix(root): resolve high jws vulnerability#10294
Draft
cursor[bot] wants to merge 1 commit intonextfrom
Draft
Conversation
Advisory: GHSA-869p-cjfg-cm3x jws@4.0.0 is vulnerable to algorithm confusion attacks that could allow an attacker to forge JWS tokens. The vulnerability is patched in v4.0.1. Fix strategy: pnpm override to force jws@4.0.0 to resolve to ^4.0.1. The vulnerable package is a transitive dependency via: @google-cloud/storage > google-auth-library > jws @google-cloud/storage > google-auth-library > gtoken > jws Co-authored-by: Dima Grossman <dima@grossman.io>
✅ Deploy Preview for dashboard-v2-novu-staging canceled.
|
Contributor
|
Hey there and thank you for opening this pull request! 👋 We require pull request titles to follow specific formatting rules and it looks like your proposed title needs to be adjusted. Your PR title is: Requirements:
Expected format: Details: PR title must end with 'fixes TICKET-ID' (e.g., 'fixes NOV-123') or include ticket ID in branch name |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Resolves a high severity vulnerability in
jws@4.0.0(GHSA-869p-cjfg-cm3x).Advisory: GHSA-869p-cjfg-cm3x
jws@4.0.0is vulnerable to algorithm confusion attacks that could allow an attacker to forge JWS tokens. The vulnerability is patched inv4.0.1.Fix Strategy
pnpm override — The vulnerable package is a transitive dependency:
@google-cloud/storage>google-auth-library>jws@google-cloud/storage>google-auth-library>gtoken>jwsAdded
"jws@>=4.0.0 <4.0.1": "^4.0.1"topnpm.overridesin the rootpackage.jsonto force resolution to the patched version.Validation
pnpm auditconfirms advisory 1111243 is no longer presentpnpm build:v2passes successfully