Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade: , bcrypt, express, mongodb, passport, passport-jwt #27

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

ManuelDevWeb
Copy link
Owner

snyk-top-banner

Snyk has created this PR to upgrade multiple dependencies.

👯 The following dependencies are linked and will therefore be updated together.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.

Name Versions Released on

@hapi/boom
from 9.1.2 to 9.1.4 | 2 versions ahead of your current version | 3 years ago
on 2021-08-20
bcrypt
from 5.0.1 to 5.1.1 | 2 versions ahead of your current version | a year ago
on 2023-08-16
express
from 4.17.1 to 4.19.2 | 9 versions ahead of your current version | 6 months ago
on 2024-03-25
mongodb
from 3.6.9 to 3.7.4 | 8 versions ahead of your current version | a year ago
on 2023-06-21
passport
from 0.4.1 to 0.7.0 | 6 versions ahead of your current version | 10 months ago
on 2023-11-27
passport-jwt
from 4.0.0 to 4.0.1 | 1 version ahead of your current version | 2 years ago
on 2022-12-24

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Arbitrary File Overwrite
SNYK-JS-TAR-1536528
519 No Known Exploit
high severity Arbitrary File Overwrite
SNYK-JS-TAR-1536531
519 No Known Exploit
high severity Prototype Poisoning
SNYK-JS-QS-3153490
519 Proof of Concept
high severity Arbitrary File Write
SNYK-JS-TAR-1579147
519 No Known Exploit
high severity Arbitrary File Write
SNYK-JS-TAR-1579152
519 No Known Exploit
high severity Arbitrary File Write
SNYK-JS-TAR-1579155
519 No Known Exploit
medium severity Open Redirect
SNYK-JS-EXPRESS-6474509
519 No Known Exploit
medium severity Information Exposure
SNYK-JS-MONGODB-5871303
519 No Known Exploit
medium severity Information Exposure
SNYK-JS-NODEFETCH-2342118
519 No Known Exploit
medium severity Session Fixation
SNYK-JS-PASSPORT-2840631
519 No Known Exploit
medium severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JS-TAR-6476909
519 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TAR-1536758
519 No Known Exploit
Release notes
Package name: @hapi/boom from @hapi/boom GitHub release notes
Package name: bcrypt from bcrypt GitHub release notes
Package name: express from express GitHub release notes
Package name: mongodb
  • 3.7.4 - 2023-06-21

    The MongoDB Node.js team is pleased to announce version 3.7.4 of the mongodb package!

    Release Highlights

    This release fixes a bug that throws a type error when SCRAM-SHA-256 is used with saslprep in a webpacked environment.

    3.7.4 (2023-06-21)

    Bug Fixes

    Documentation

    We invite you to try the mongodb library immediately, and report any issues to the NODE project.

  • 3.7.3 - 2021-10-20
  • 3.7.2 - 2021-10-05
  • 3.7.1 - 2021-09-14
  • 3.7.0 - 2021-08-31
  • 3.6.12 - 2021-08-30
  • 3.6.11 - 2021-08-05
  • 3.6.10 - 2021-07-06
  • 3.6.9 - 2021-05-26
from mongodb GitHub release notes
Package name: passport from passport GitHub release notes
Package name: passport-jwt
  • 4.0.1 - 2022-12-24
    • Updates jsonwebtoken dependency to ^9.0.0 to address high severity
      vulnerability CVE-2022-3517
    • Updates a number of other dependencies
    • Fixes a number of typos

    [Developer facing]

    • Updates CI to use github actions
  • 4.0.0 - 2018-03-13

    Fixes #147 - Vulnerability due to dependency on jsonwebtoken 7.x.x

from passport-jwt GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"","from":"hapi/boom","to":"hapi/boom"},{"name":"bcrypt","from":"5.0.1","to":"5.1.1"},{"name":"express","from":"4.17.1","to":"4.19.2"},{"name":"mongodb","from":"3.6.9","to":"3.7.4"},{"name":"passport","from":"0.4.1","to":"0.7.0"},{"name":"passport-jwt","from":"4.0.0","to":"4.0.1"}],"env":"prod","hasFixes":true,"isBreakingChange":false,"isMajorUpgrade":false,"issuesToFix":[{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1536528","issue_id":"SNYK-JS-TAR-1536528","priority_score":624,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Overwrite"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1536531","issue_id":"SNYK-JS-TAR-1536531","priority_score":624,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Overwrite"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-QS-3153490","issue_id":"SNYK-JS-QS-3153490","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Poisoning"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579147","issue_id":"SNYK-JS-TAR-1579147","priority_score":639,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579152","issue_id":"SNYK-JS-TAR-1579152","priority_score":639,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579155","issue_id":"SNYK-JS-TAR-1579155","priority_score":639,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-EXPRESS-6474509","issue_id":"SNYK-JS-EXPRESS-6474509","priority_score":519,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.1","score":305},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Open Redirect"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MONGODB-5871303","issue_id":"SNYK-JS-MONGODB-5871303","priority_score":424,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"4.2","score":210},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-NODEFETCH-2342118","issue_id":"SNYK-JS-NODEFETCH-2342118","priority_score":539,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-PASSPORT-2840631","issue_id":"SNYK-JS-PASSPORT-2840631","priority_score":454,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"4.8","score":240},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Session Fixation"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-TAR-6476909","issue_id":"SNYK-JS-TAR-6476909","priority_score":432,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Uncontrolled Resource Consumption ('Resource Exhaustion')"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1536758","issue_id":"SNYK-JS-TAR-1536758","priority_score":410,"priority_score_factors":[{"type":"exploit","label":"Unproven","score":11},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Regular Expression Denial of Service (ReDoS)"}],"prId":"9206813a-2fad-4dc0-b025-89ed10aa9f41","prPublicId":"9206813a-2fad-4dc0-b025-89ed10aa9f41","packageManager":"npm","priorityScoreList":[624,624,696,639,639,639,519,424,539,454,432,410],"projectPublicId":"17851fb5-5693-40b0-8253-59f40cef43d2","projectUrl":"https://app.snyk.io/org/manuelowsky/project/17851fb5-5693-40b0-8253-59f40cef43d2?utm_source=github&utm_medium=referral&page=upgrade-pr","prType":"upgrade","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["priorityScore"],"type":"auto","upgrade":["SNYK-JS-TAR-1536528","SNYK-JS-TAR-1536531","SNYK-JS-QS-3153490","SNYK-JS-TAR-1579147","SNYK-JS-TAR-1579152","SNYK-JS-TAR-1579155","SNYK-JS-EXPRESS-6474509","SNYK-JS-MONGODB-5871303","SNYK-JS-NODEFETCH-2342118","SNYK-JS-PASSPORT-2840631","SNYK-JS-TAR-6476909","SNYK-JS-TAR-1536758"],"upgradeInfo":{"versionsDiff":2,"publishedDate":"2021-08-20T12:28:53.048Z"},"vulns":["SNYK-JS-TAR-1536528","SNYK-JS-TAR-1536531","SNYK-JS-QS-3153490","SNYK-JS-TAR-1579147","SNYK-JS-TAR-1579152","SNYK-JS-TAR-1579155","SNYK-JS-EXPRESS-6474509","SNYK-JS-MONGODB-5871303","SNYK-JS-NODEFETCH-2342118","SNYK-JS-PASSPORT-2840631","SNYK-JS-TAR-6476909","SNYK-JS-TAR-1536758"]}'

Snyk has created this PR to upgrade:
  - @hapi/boom from 9.1.2 to 9.1.4.
    See this package in npm: https://www.npmjs.com/package/@hapi/boom
  - bcrypt from 5.0.1 to 5.1.1.
    See this package in npm: https://www.npmjs.com/package/bcrypt
  - express from 4.17.1 to 4.19.2.
    See this package in npm: https://www.npmjs.com/package/express
  - mongodb from 3.6.9 to 3.7.4.
    See this package in npm: https://www.npmjs.com/package/mongodb
  - passport from 0.4.1 to 0.7.0.
    See this package in npm: https://www.npmjs.com/package/passport
  - passport-jwt from 4.0.0 to 4.0.1.
    See this package in npm: https://www.npmjs.com/package/passport-jwt

See this project in Snyk:
https://app.snyk.io/org/manuelowsky/project/17851fb5-5693-40b0-8253-59f40cef43d2?utm_source=github&utm_medium=referral&page=upgrade-pr
Copy link

vercel bot commented Sep 13, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
project-autentication-passwordjs ❌ Failed (Inspect) Sep 13, 2024 10:46am
projectautenticationpasswordjs ❌ Failed (Inspect) Sep 13, 2024 10:46am

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

nsp found vulnerability
2 participants