GEL icon indicating copy to clipboard operation
GEL copied to clipboard

[Snyk] Security upgrade @keystone-6/core from 2.3.1 to 3.0.0

Open jaortiz opened this issue 8 months ago • 2 comments

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `yarn` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • website-backend/package.json

Note for zero-installs users

If you are using the Yarn feature zero-installs that was introduced in Yarn V2, note that this PR does not update the .yarn/cache/ directory meaning this code cannot be pulled and immediately developed on as one would expect for a zero-install project - you will need to run yarn to update the contents of the ./yarn/cache directory. If you are not using zero-install you can ignore this as your flow should likely be unchanged.

⚠️ Warning
Failed to update the yarn.lock, please update manually before merging.

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVER-3247795
Yes Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
CRLF Injection
SNYK-JS-UNDICI-2953389
Yes Proof of Concept
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Information Exposure
SNYK-JS-UNDICI-2957529
Yes Proof of Concept
medium severity 484/1000
Why? Has a fix available, CVSS 5.4
CRLF Injection
SNYK-JS-UNDICI-2980276
Yes No Known Exploit
medium severity 534/1000
Why? Has a fix available, CVSS 6.4
Server-side Request Forgery (SSRF)
SNYK-JS-UNDICI-2980286
Yes No Known Exploit
medium severity 551/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 4.6
CRLF Injection
SNYK-JS-UNDICI-3323844
Yes Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Regular Expression Denial of Service (ReDoS)
SNYK-JS-UNDICI-3323845
Yes Proof of Concept
low severity 409/1000
Why? Has a fix available, CVSS 3.9
Information Exposure
SNYK-JS-UNDICI-5962466
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS) 🦉 CRLF Injection 🦉 Server-side Request Forgery (SSRF)

jaortiz avatar Nov 25 '23 23:11 jaortiz