[Security] Bump better_errors from 2.7.1 to 2.9.1
Bumps better_errors from 2.7.1 to 2.9.1.
Release notes
Sourced from better_errors's releases.
v2.9.1
- Fix setting editor with symbol #492
v2.9.0
- Mention path in text response #487
- Use Github Actions for CI #489
- Exception Hints #302
- Hide "live shell" hint after console has been used #490
- Improve editor support for virtual environments #488
- Fix "live shell" hint reappearing when frame changed #491
v2.8.3
- Fix 'uninitialized constant BetterErrors::Middleware::VERSION' #480
- Fix CSRF_TOKEN_COOKIE_NAME wrong reference to VERSION constant #481
v2.8.2
- Fix path of CSRF Token cookie #478
v2.8.1
v2.8.0
Commits
fce143fMerge pull request #492 from srachner/fix-setting-editor-with-symbol1f65a70Fix setting editor with symbolafc1e3eMerge pull request #491 from BetterErrors/fix/hiding-hint-not-working-when-fr...9d7256bFix "live shell" hint reappearing when frame changed66f2949Merge pull request #488 from BetterErrors/feature/editor-support-docker123f9b3Test invalid editor45915e6Support for virtual and host paths6591cf9Rename method and reorderb95d3c3Create instances of Editor5931137Specs for Editor module- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -
@dependabot use these labelswill set the current labels as the default for future PRs for this repo and language -
@dependabot use these reviewerswill set the current reviewers as the default for future PRs for this repo and language -
@dependabot use these assigneeswill set the current assignees as the default for future PRs for this repo and language -
@dependabot use this milestonewill set the current milestone as the default for future PRs for this repo and language -
@dependabot badge mewill comment on this PR with code to add a "Dependabot enabled" badge to your readme
Additionally, you can set the following in your Dependabot dashboard:
- Update frequency (including time of day and day of week)
- Pull request limits (per update run and/or open at any time)
- Automerge options (never/patch/minor, and dev/runtime dependencies)
- Out-of-range updates (receive only lockfile updates, if desired)
- Security updates (receive only security updates, if desired)
We've just been alerted that this update fixes a security vulnerability:
Sourced from The GitHub Security Advisory Database.
Older releases of better_errors open to Cross-Site Request Forgery attack
Impact
better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with better_errors enabled open to cross-origin attacks.
As a developer tool, better_errors documentation strongly recommends addition only to the
developmentbundle group, so this vulnerability should only affect development environments. Please ensure that your project limits better_errors to thedevelopmentgroup (or the non-Rails equivalent).Patches
Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to "~> 2.8.3".
Workarounds
There are no known workarounds to mitigate the risk of using older releases of better_errors.
References
- Chris Moberly provided an example attack that uses a vulnerability of webpack-dev-server in conjunction with Better Errors that will be published soon.
... (truncated)
Affected versions: ["< 2.8.0"]