trudesk icon indicating copy to clipboard operation
trudesk copied to clipboard

[Snyk] Fix for 2 vulnerabilities

Open polonel opened this issue 7 months ago • 0 comments

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123)

Snyk has created this PR to fix 2 vulnerabilities in the yarn dependencies of this project.

Snyk changed the following file(s):

  • package.json
  • yarn.lock

Note for zero-installs users

If you are using the Yarn feature zero-installs that was introduced in Yarn V2, note that this PR does not update the .yarn/cache/ directory meaning this code cannot be pulled and immediately developed on as one would expect for a zero-install project - you will need to run yarn to update the contents of the ./yarn/cache directory. If you are not using zero-install you can ignore this as your flow should likely be unchanged.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
high severity Uncaught Exception
SNYK-JS-SOCKETIO-7278048
  721  
high severity Improper Control of Generation of Code ('Code Injection')
SNYK-JS-PUGCODEGEN-7086056
  696  

[!IMPORTANT]

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report 📜 Customise PR templates 🛠 Adjust project settings 📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Improper Control of Generation of Code ('Code Injection') 🦉 Uncaught Exception

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"email-templates","from":"10.0.0","to":"11.1.1"},{"name":"socket.io","from":"4.5.2","to":"4.6.2"}],"env":"prod","issuesToFix":[{"exploit_maturity":"Proof of Concept","id":"SNYK-JS-PUGCODEGEN-7086056","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Control of Generation of Code ('Code Injection')"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JS-SOCKETIO-7278048","priority_score":721,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.7","score":435},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Uncaught Exception"}],"prId":"ae70893b-8776-4615-9a16-24f99cea9f2c","prPublicId":"ae70893b-8776-4615-9a16-24f99cea9f2c","packageManager":"yarn","priorityScoreList":[696,721],"projectPublicId":"bc45f84f-9c96-4602-8a94-a3de05b98cb2","projectUrl":"https://app.snyk.io/org/polonel/project/bc45f84f-9c96-4602-8a94-a3de05b98cb2?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["priorityScore"],"type":"auto","upgrade":["SNYK-JS-PUGCODEGEN-7086056","SNYK-JS-SOCKETIO-7278048"],"vulns":["SNYK-JS-PUGCODEGEN-7086056","SNYK-JS-SOCKETIO-7278048"],"patch":[],"isBreakingChange":true,"remediationStrategy":"vuln"}'

polonel avatar Jun 27 '24 07:06 polonel