[Snyk] Upgrade: bcrypt, cloudinary, dotenv, formidable, joi, joi-password-complexity, mongoose #97
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to upgrade multiple dependencies.
👯 The following dependencies are linked and will therefore be updated together.ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
bcrypt
from 5.1.0 to 5.1.1 | 1 version ahead of your current version | a year ago
on 2023-08-16
cloudinary
from 1.33.0 to 1.41.3 | 18 versions ahead of your current version | 8 months ago
on 2024-01-18
dotenv
from 16.0.3 to 16.4.5 | 17 versions ahead of your current version | 7 months ago
on 2024-02-20
formidable
from 2.1.1 to 2.1.2 | 1 version ahead of your current version | 2 years ago
on 2022-12-01
joi
from 17.7.0 to 17.13.3 | 22 versions ahead of your current version | 3 months ago
on 2024-06-19
joi-password-complexity
from 5.1.0 to 5.2.0 | 1 version ahead of your current version | a year ago
on 2023-07-11
mongoose
from 6.10.5 to 6.13.0 | 18 versions ahead of your current version | 3 months ago
on 2024-06-06
Issues fixed by the recommended upgrade:
SNYK-JS-IP-6240864
SNYK-JS-FASTXMLPARSER-5668858
SNYK-JS-IP-6240864
SNYK-JS-IP-7148531
SNYK-JS-FASTXMLPARSER-7573289
SNYK-JS-IP-7148531
SNYK-JS-WORDWRAP-3149973
SNYK-JS-VM2-5415299
SNYK-JS-VM2-5422057
SNYK-JS-VM2-5426093
SNYK-JS-VM2-5537079
SNYK-JS-VM2-5537100
SNYK-JS-VM2-5772823
SNYK-JS-VM2-5772825
SNYK-JS-MONGOOSE-5777721
SNYK-JS-MONGODB-5871303
SNYK-JS-SIDEWAYFORMULA-3317169
SNYK-JS-TAR-6476909
Release notes
Package name: bcrypt
What's Changed
New Contributors
Full Changelog: v5.1.0...v5.1.1
What's Changed
New Contributors
Full Changelog: v5.0.1...v5.1.0
Package name: cloudinary
Package name: dotenv
16.4.5
16.4.4
16.4.3
16.4.2
16.4.1
16.4.0
16.3.2
16.3.1
16.3.0
16.2.0
Package name: formidable
Package name: joi
17.13.3
17.13.2
17.13.1
17.13.0
17.12.3
17.12.2
17.12.1
17.12.0
17.11.1
Package name: joi-password-complexity
Summary
Examples of usage:
or
Package name: mongoose
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.
For more information:
[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"bcrypt","from":"5.1.0","to":"5.1.1"},{"name":"cloudinary","from":"1.33.0","to":"1.41.3"},{"name":"dotenv","from":"16.0.3","to":"16.4.5"},{"name":"formidable","from":"2.1.1","to":"2.1.2"},{"name":"joi","from":"17.7.0","to":"17.13.3"},{"name":"joi-password-complexity","from":"5.1.0","to":"5.2.0"},{"name":"mongoose","from":"6.10.5","to":"6.13.0"}],"env":"prod","hasFixes":true,"isBreakingChange":false,"isMajorUpgrade":false,"issuesToFix":[{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-IP-6240864","issue_id":"SNYK-JS-IP-6240864","priority_score":751,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-FASTXMLPARSER-5668858","issue_id":"SNYK-JS-FASTXMLPARSER-5668858","priority_score":589,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-IP-6240864","issue_id":"SNYK-JS-IP-6240864","priority_score":751,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.6","score":430},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Server-side Request Forgery (SSRF)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-IP-7148531","issue_id":"SNYK-JS-IP-7148531","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Server-Side Request Forgery (SSRF)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-FASTXMLPARSER-7573289","issue_id":"SNYK-JS-FASTXMLPARSER-7573289","priority_score":559,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.9","score":345},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-IP-7148531","issue_id":"SNYK-JS-IP-7148531","priority_score":646,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Server-Side Request Forgery (SSRF)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-WORDWRAP-3149973","issue_id":"SNYK-JS-WORDWRAP-3149973","priority_score":506,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"3.7","score":185},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-VM2-5415299","issue_id":"SNYK-JS-VM2-5415299","priority_score":816,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.9","score":495},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Sandbox Escape"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-VM2-5422057","issue_id":"SNYK-JS-VM2-5422057","priority_score":811,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Sandbox Escape"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-VM2-5426093","issue_id":"SNYK-JS-VM2-5426093","priority_score":704,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Improper Handling of Exceptional Conditions"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-VM2-5537079","issue_id":"SNYK-JS-VM2-5537079","priority_score":586,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-VM2-5537100","issue_id":"SNYK-JS-VM2-5537100","priority_score":811,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Sandbox Bypass"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-VM2-5772823","issue_id":"SNYK-JS-VM2-5772823","priority_score":811,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"mature","id":"SNYK-JS-VM2-5772825","issue_id":"SNYK-JS-VM2-5772825","priority_score":876,"priority_score_factors":[{"type":"exploit","label":"Functional","score":171},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Remote Code Execution (RCE)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-MONGOOSE-5777721","issue_id":"SNYK-JS-MONGOOSE-5777721","priority_score":726,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MONGODB-5871303","issue_id":"SNYK-JS-MONGODB-5871303","priority_score":424,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"4.2","score":210},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SIDEWAYFORMULA-3317169","issue_id":"SNYK-JS-SIDEWAYFORMULA-3317169","priority_score":489,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.5","score":275},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-TAR-6476909","issue_id":"SNYK-JS-TAR-6476909","priority_score":432,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Uncontrolled Resource Consumption ('Resource Exhaustion')"}],"prId":"1611367e-ffba-47af-a504-0e91ff338f9f","prPublicId":"1611367e-ffba-47af-a504-0e91ff338f9f","packageManager":"npm","priorityScoreList":[751,589,646,559,506,816,811,704,586,811,811,876,726,424,489,432],"projectPublicId":"3e48a2b1-192d-45a9-aeda-6615b0d937bb","projectUrl":"https://app.snyk.io/org/maleeshas.2000/project/3e48a2b1-192d-45a9-aeda-6615b0d937bb?utm_source=github&utm_medium=referral&page=upgrade-pr","prType":"upgrade","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["priorityScore"],"type":"auto","upgrade":["SNYK-JS-IP-6240864","SNYK-JS-FASTXMLPARSER-5668858","SNYK-JS-IP-6240864","SNYK-JS-IP-7148531","SNYK-JS-FASTXMLPARSER-7573289","SNYK-JS-IP-7148531","SNYK-JS-WORDWRAP-3149973","SNYK-JS-VM2-5415299","SNYK-JS-VM2-5422057","SNYK-JS-VM2-5426093","SNYK-JS-VM2-5537079","SNYK-JS-VM2-5537100","SNYK-JS-VM2-5772823","SNYK-JS-VM2-5772825","SNYK-JS-MONGOOSE-5777721","SNYK-JS-MONGODB-5871303","SNYK-JS-SIDEWAYFORMULA-3317169","SNYK-JS-TAR-6476909"],"upgradeInfo":{"versionsDiff":1,"publishedDate":"2023-08-16T03:48:51.540Z"},"vulns":["SNYK-JS-IP-6240864","SNYK-JS-FASTXMLPARSER-5668858","SNYK-JS-IP-6240864","SNYK-JS-IP-7148531","SNYK-JS-FASTXMLPARSER-7573289","SNYK-JS-IP-7148531","SNYK-JS-WORDWRAP-3149973","SNYK-JS-VM2-5415299","SNYK-JS-VM2-5422057","SNYK-JS-VM2-5426093","SNYK-JS-VM2-5537079","SNYK-JS-VM2-5537100","SNYK-JS-VM2-5772823","SNYK-JS-VM2-5772825","SNYK-JS-MONGOOSE-5777721","SNYK-JS-MONGODB-5871303","SNYK-JS-SIDEWAYFORMULA-3317169","SNYK-JS-TAR-6476909"]}'