-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency @sveltejs/kit to v1.15.2 [security] - autoclosed #948
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
|
2ab9d71
to
b57f191
Compare
b57f191
to
e57383f
Compare
e57383f
to
118fad0
Compare
118fad0
to
1375464
Compare
1375464
to
15d851d
Compare
15d851d
to
a57cf46
Compare
a57cf46
to
d9df3c0
Compare
d9df3c0
to
ded92ae
Compare
ded92ae
to
18ecd53
Compare
18ecd53
to
dba8b39
Compare
170f2f8
to
571bbe8
Compare
571bbe8
to
3977bd4
Compare
3977bd4
to
81ab9a2
Compare
81ab9a2
to
1098fc7
Compare
1098fc7
to
1474de9
Compare
1474de9
to
57bfed0
Compare
57bfed0
to
d5b231c
Compare
d5b231c
to
9e5c176
Compare
Pull request was closed
This PR contains the following updates:
^1.0.1
->^1.15.2
1.0.1
->1.15.2
GitHub Vulnerability Alerts
CVE-2023-29003
Summary
The SvelteKit framework offers developers an option to create simple REST APIs. This is done by defining a
+server.js
file, containing endpoint handlers for different HTTP methods.SvelteKit provides out-of-the-box cross-site request forgery (CSRF) protection to it’s users. The protection is implemented at
kit/src/runtime/server/respond.js#L52
. While the implementation does a sufficient job in mitigating common CSRF attacks, the protection can be bypassed by simply specifying a differentContent-Type
header value.Details
The CSRF protection is implemented using the code shown below.
If the incoming request specifies a POST method (1), the protection will compare the server’s origin with the value of the HTTP
Origin
header (2). A mismatch between these values signals that a potential attack has been detected. The final check is performed on the request’sContent-Type
header (3) whether the value is eitherapplication/x-www-form-urlencoded
ormultipart/form-data
(kit/src/utils/http.js#L71
). If all the previous checks pass, the request will be rejected with an 403 error response (4).The
is_form_content_type
validation is not sufficient to mitigate all possible variations of this type of attack. If a CSRF attack is performed with theContent-Type
header set totext/plain
, the protection will be circumvented and the request will be processed by the endpoint handler.Impact
If abused, this issue will allow malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts.
Remediation
SvelteKit 1.15.1 updates the
is_form_content_type
function call in the CSRF protection logic to includetext/plain
.As additional hardening of the CSRF protection mechanism against potential method overrides, SvelteKit 1.15.1 is now performing validation on PUT, PATCH and DELETE methods as well. This latter hardening is only needed to protect users who have put in some sort of
?_method=
override feature themselves in theirhandle
hook, so that the request thatresolve
sees could bePUT
/PATCH
/DELETE
when the browser issues aPOST
request.CVE-2023-29008
Summary
The SvelteKit framework offers developers an option to create simple REST APIs. This is done by defining a
+server.js
file, containing endpoint handlers for different HTTP methods.SvelteKit provides out-of-the-box cross-site request forgery (CSRF) protection to its users. The protection is implemented at
kit/src/runtime/server/respond.js
. While the implementation does a sufficient job of mitigating common CSRF attacks, the protection can be bypassed by simply specifying an upper-casedContent-Type
header value. The browser will not send uppercase characters on form submission, but this check does not block all expected cross-site requests: https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requestsDetails
The CSRF protection is implemented using the code shown below.
If the incoming request specifies a POST/PUT/PATCH/DELETE method, the protection will compare the server’s origin with the value of the HTTP Origin header. A mismatch between these values signals that a potential attack has been detected. The final check is performed on the request’s
Content-Type
header whether the value is eitherapplication/x-www-form-urlencoded
,multipart/form-data
ortext/plain
. If all the previous checks pass, the request will be rejected with an 403 error response.However,
is_form_content_type
, which is responsible for checking the value of theContent-Type
header, is not sufficient to mitigate all possible variations of this type of attack. Since this function is checkingContent-Type
with lower-cased values, and the browser accepts upper-casedContent-Type
header to be sent, a CSRF attack performed with theContent-Type
header that contains an upper-cased character (e.g.,text/plaiN
) can circumvent the protection and the request will be processed by the endpoint handler.Impact
If abused, this issue will allow malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts. This may lead to all POST operations requiring authentication being allowed in the following cases:
SameSite=None
on its auth cookie and the user visits a malicious site in a Chromium-based browserSameSite
attribute explicitly and the user visits a malicious site with Firefox/Safari with tracking protections turned off.Remediations
It is preferred to update to SvelteKit 1.15.2. It is also recommended to explicitly set
SameSite
to a value other thanNone
on authentication cookies especially if the upgrade cannot be done in a timely manner.Release Notes
sveltejs/kit (@sveltejs/kit)
v1.15.2
Compare Source
Patch Changes
ba436c66
)v1.15.1
Compare Source
Patch Changes
chore: more compact representation for invalidated search param (#9708)
chore: fix import path to app script on windows (#9743)
fix: make $app/navigation more resilient to bundler reordering (#9808)
fix: page load
fetch()
now accepts the same input types for the body as the native fetch function (#9801)fix: handle preload and filterSerializedResponseHeaders in sequence function (#9741)
v1.15.0
Compare Source
Minor Changes
SubmitFunction
through./$types
(#9201)Patch Changes
fix: throw error when file can't be found in Vite manifest (#9558)
fix: make
error.message
enumerable when sendingssrLoadModule
error to client (#9440)fix: pass
publicDir
Vite config in SSR (#9565)fix: balance parentheses in error about wrong content type for action (#9513)
v1.14.0
Compare Source
Minor Changes
Patch Changes
submitter
type toSumbitFunction
(#9484)v1.13.0
Compare Source
Minor Changes
Patch Changes
v1.12.0
Compare Source
Minor Changes
feat: expose submitter in use:enhance SubmitFunction (#9425)
feat: add data-sveltekit-keepfocus and data-sveltekit-replacestate options to links (requires Svelte version 3.56 for type-checking with
svelte-check
) (#9019)Patch Changes
fix: don't start debugger on 404s (#9424)
fix: handle srcset attributes with newline after comma (#9388)
fix: allow tsconfig to extend multiple other tsconfigs (#9413)
chore: update Undici to 5.21.0 (#9417)
v1.11.0
Compare Source
Minor Changes
feat: pause on debugger when falling back to full page reload during development (#9305)
feat: expose
base
via$service-worker
, make paths relative (#9250)Patch Changes
fix: don't automatically prerender non-SSR'd pages (#9352)
fix: use 308 responses for trailing slash redirects, instead of 301s (#9351)
fix: remove buggy cookie path detection (#9298)
fix: don't prevent
beforeNavigate
callbacks from running following a cancelled unloading navigation (#9347)fix: persist DOM state on beforeunload (#9345)
fix: redirect to path with/without trailing slash when previewing prerendered pages (#9353)
fix: avoid FOUC when using CSS modules in dev (#9323)
fix: don't skip required parameters after missing optional parameters (#9331)
fix: account for server-emitted assets when prerenering (#9349)
fix: deal with fast consecutive promise resolutions when streaming (#9332)
chore: replace deprecated property access in preparation for TS 5.0 (#9361)
v1.10.0
Compare Source
Minor Changes
cookies.getAll
(#9287)Patch Changes
fix: always include
<link rel="stylesheet">
, even for stylesheets excluded from Link headers (#9255)fix: preserve form state when submitting a second time (#9267)
v1.9.3
Compare Source
Patch Changes
v1.9.2
Compare Source
Patch Changes
v1.9.1
Compare Source
Patch Changes
v1.9.0
Compare Source
Minor Changes
paths.relative
option to control interpretation ofpaths.assets
andpaths.base
(#9220)v1.8.8
Compare Source
Patch Changes
@sveltejs/kit
tonoExternal
for ssr build (#9242)api.methods
andpage.methods
tobuilder.routes
(#9145)v1.8.7
Compare Source
Patch Changes
paths.base
(#9232)v1.8.6
Compare Source
Patch Changes
v1.8.5
Compare Source
Patch Changes
handle
(#9198)v1.8.4
Compare Source
Patch Changes
fix: include .mjs files in precompression (#9179)
fix: revert mjs extension usage by default, make it an option (#9179)
chore: dummy changeset to force a release (#9207)
v1.8.3
Compare Source
Patch Changes
v1.8.2
Compare Source
Patch Changes
v1.8.1
Compare Source
Patch Changes
v1.8.0
Compare Source
Minor Changes
Patch Changes
fix: set public env before starting app (#8957)
fix: preload modules on Safari (#8957)
fix: make
assets
work in client when app is served from a subfolder (#8957)v1.7.2
Compare Source
Patch Changes
builder.writeClient()
(#9095)v1.7.1
Compare Source
Patch Changes
v1.7.0
Minor Changes
Patch Changes
v1.6.0
Minor Changes
OPTIONS
server method (#8731)Patch Changes
missing "./paths" specifier in "@​sveltejs/kit" package
error occurring in all projects (#9050)v1.5.7
Patch Changes
v1.5.6
Patch Changes
fix: ssr defaults preventing minification for client build (#9012)
fix: client-side trailing slash redirect when preloading data (#8982)
v1.5.5
Compare Source
Patch Changes
v1.5.3
Compare Source
Patch Changes
docs: clarify that
version.name
should be deterministic (#8956)fix: correctly include exported http methods in allow header (#8968)
chore: polyfill File from node:buffer (#8925)
fix: provide helpful error/warning when calling
fetch
during render (#8551)fix: print useful error when subscribing to SvelteKit's stores at the wrong time during SSR (#8960)
fix: ignore external links when automatically preloading (#8961)
chore: refactor fallback generation (#8972)
v1.5.2
Compare Source
Patch Changes
paths.assets
topaths.base
(#8928)v1.5.1
Compare Source
Patch Changes
fix: pick up config from endpoints (#8933)
fix: don't reuse previous server load cache when there's no server load function (#8893)
fix: deduplicate paths in tsconfig (#8880)
docs: clarify version management feature (#8941)
v1.5.0
Compare Source
Minor Changes
feat: support route-level configuration (#8740)
feat: add snapshot mechanism for preserving ephemeral DOM state (#8710)
Patch Changes
v1.4.0
Compare Source
Minor Changes
Patch Changes
fix: ensure types of all form actions are accessible even if differing (#8877)
fix: correctly handle HttpErrors on the client side (#8829)
docs: discourage use of
goto
with external URLs (#8837)fix: prevent crawling empty urls (
<img src="">
) (#8883)fix: correctly serialize request url when using load
fetch
(#8876)fix: ensure endpoints can fetch endpoints on the same host but not part of the application (#8869)
v1.3.10
Compare Source
Patch Changes
v1.3.9
Compare Source
Patch Changes
v1.3.8
Compare Source
Patch Changes
v1.3.7
Compare Source
Patch Changes
fix: only show prerendering message when actually prerendering (#8809)
fix: handle anchors with special chars when navigating (#8806)
fix: await finalise hook and run it only once (#8817)
v1.3.6
Compare Source
Patch Changes
fix: allow rest parameters to follow multiple optional - or not - parameters (#8761)
fix: consider headers when constructing request hash (#8754)
v1.3.5
Compare Source
Patch Changes
docs: fix typo (#8790)
fix: build error on layout with missing leaves (#8792)
fix: handle hash links with non-ASCII characters when navigating (#8767)
v1.3.4
Compare Source
Patch Changes
v1.3.3
Compare Source
Patch Changes
process.env
to child process (#8777)v1.3.2
Compare Source
Patch Changes
v1.3.1
Compare Source
Patch Changes
v1.3.0
Compare Source
Minor Changes
Patch Changes
v1.2.10
Compare Source
Patch Changes
chore: restrict methods allowed for POST (#8721)
fix: provide proper error when POSTing to a missing page endpoint (#8714)
v1.2.9
Compare Source
Patch Changes
v1.2.8
Compare Source
Patch Changes
v1.2.7
Compare Source
Patch Changes
v1.2.6
Compare Source
Patch Changes
v1.2.5
Compare Source
Patch Changes
v1.2.4
Compare Source
Patch Changes
v1.2.3
Compare Source
Patch Changes
v1.2.2
Compare Source
Patch Changes
v1.2.1
Compare Source
Patch Changes
chore: restrict methods allowed for POST (#8721)
fix: provide proper error when POSTing to a missing page endpoint (#8714)
v1.2.0
Compare Source
Minor Changes
feat: add
text(...)
helper for generating text responses (#8371)feat: enable access to public env within app.html (#8449)
fix: add
Content-Length
header to SvelteKit-generated responses (#8371)v1.1.4
Compare Source
Patch Changes
+error.svelte
components (#8593)v1.1.3
Compare Source
Patch Changes
docs: explain how to add ambient typings (#8558)
fix: ignore
target="_blank"
links (#8563)v1.1.2
Compare Source
Patch Changes
fix: correct link in types documentation (#8557)
fix: correctly detect changed data (#8377)
fix: only generate type definitions with
sync
command (#8552)fix: remove baseUrl to prevent wrong TypeScript auto imports if possible (#8568)
v1.1.1
Compare Source
Patch Changes
v1.1.0
Compare Source
Minor Changes
.svelte
files or missing<slot />
in layout is detected (#8475)Patch Changes
fix: exit postbuild step with code 0 (#8514)
fix: only run missing page check in dev mode (#8515)
fix: avoid input name clobbering form method check (#8471)
fix: exclude service worker from tsconfig (#8508)
fix: provide better error message in case of missing
+page.svelte
(#8478)v1.0.13
Compare Source
Patch Changes
v1.0.12
Compare Source
Patch Changes
fix: make prerendered endpoint callable from non-prerendered server load (#8453)
docs: add links to http status codes (#8480)
fix: prerender page when prerender set to 'auto' and ssr set to true (#8481)
fix: prevent false positive warnings for fetch uses in firefox (#8456)
fix: check version on node fetch fail (#8487)
fix: avoid unnecessary $page store updates (#8457)
v1.0.11
Compare Source
Patch Changes
<a>
elements with nohref
attribute when refocusing after navigation (#8418)fetch
in server load functions (#8420)v1.0.10
Compare Source
Patch Changes
v1.0.9
Compare Source
Patch Changes
assetFileNames
to worker rollup options (#8384)v1.0.8
Compare Source
Patch Changes
fetch
is used with relative URL (#8370)updated.check()
type changed toPromise<boolean>
(#8400)<link>
elements (#8369)v1.0.7
Compare Source
Patch Changes
*.test.js
and*.spec.js
files inparams
directory (#8250)v1.0.6
Compare Source
Patch Changes
$page.route
has the correct shape (#8359)v1.0.5
Compare Source
Patch Changes
event.platform
to be possibly undefined (#8232)v1.0.3
Compare Source
Patch Changes
<form method="get">
(#8273)v1.0.2
Compare Source
Patch Changes
filterSerializedResponseHeaders
error message (#8348)Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.