vue-meta
vue-meta copied to clipboard
chore(deps): update devdependency standard-version to v8.0.1 [security]
[!NOTE] Mend has cancelled the proposed renaming of the Renovate GitHub app being renamed to
mend[bot].This notice will be removed on 2025-10-07.
This PR contains the following updates:
| Package | Change | Age | Confidence |
|---|---|---|---|
| standard-version | 8.0.0 -> 8.0.1 |
GitHub Vulnerability Alerts
GHSA-7xcx-6wjh-7xp2
GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2020-111
The GitHub Security Lab team has identified a potential security vulnerability in standard-version.
Summary
The standardVersion function has a command injection vulnerability. Clients of the standard-version library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
Product
Standard Version
Tested Version
Commit 2f04ac8
Details
Issue 1: Command injection in standardVersion
The following proof-of-concept illustrates the vulnerability. First install Standard Version and create an empty git repo to run the PoC in:
npm install standard-version
git init
echo "foo" > foo.txt # the git repo has to be non-empty
git add foo.txt
git commit -am "initial commit"
Now create a file with the following contents:
var fs = require("fs");
// setting up a bit of environment
fs.writeFileSync("package.json", '{"name": "foo", "version": "1.0.0"}');
const standardVersion = require('standard-version')
standardVersion({
noVerify: true,
infile: 'foo.txt',
releaseCommitMessageFormat: "bla `touch exploit`"
})
and run it:
node test.js
Notice that a file named exploit has been created.
This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples: CVE-2020-7646, CVE-2020-7614, CVE-2020-7597, CVE-2019-10778, CVE-2019-10776, CVE-2018-16462, CVE-2018-16461, CVE-2018-16460, CVE-2018-13797, CVE-2018-3786, CVE-2018-3772, CVE-2018-3746, CVE-2017-16100, CVE-2017-16042.
We have written a CodeQL query, which automatically detects this vulnerability. You can see the results of the query on the standard-version project here.
Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
Remediation
We recommend not using an API that can interpret a string as a shell command. For example, use child_process.execFile instead of child_process.exec.
Credit
This issue was discovered and reported by GitHub Engineer @erik-krogh (Erik Krogh Kristensen).
Contact
You can contact the GHSL team at [email protected], please include GHSL-2020-111 in any communication regarding this issue.
Disclosure Policy
This report is subject to our coordinated disclosure policy.
Release Notes
conventional-changelog/standard-version (standard-version)
v8.0.1
⚠ BREAKING CHANGES
- NodeJS@8 is no longer supported. (#612)
Bug Fixes
- deps: update dependency conventional-changelog to v3.1.23 (#652) (00dd3c0)
- deps: update dependency conventional-changelog-conventionalcommits to v4.4.0 (#650) (9f201a6)
- deps: update dependency conventional-recommended-bump to v6.0.10 (#653) (c360d6a)
Build System
8.0.2 (2020-07-14)
Bug Fixes
8.0.1 (2020-07-12)
Bug Fixes
- deps: update dependency conventional-changelog to v3.1.21 (#586) (fd456c9)
- deps: update dependency conventional-changelog-conventionalcommits to v4.3.0 (#587) (b3b5eed)
- deps: update dependency conventional-recommended-bump to v6.0.9 (#588) (d4d2ac2)
- deps: update dependency git-semver-tags to v4 (#589) (a0f0e81)
- Vulnerability Report GHSL-2020-11101 (9d978ac)
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, check this box
This PR was generated by Mend Renovate. View the repository job log.