daplog
daplog copied to clipboard
chore(deps): update dependency next to 12.1.0 [security] - abandoned
This PR contains the following updates:
Package | Change |
---|---|
next | 10.0.0 -> 12.1.0 |
GitHub Vulnerability Alerts
CVE-2021-39178
Impact
-
Affected: All of the following must be true to be affected
- Next.js between version 10.0.0 and 11.1.0
- The
next.config.js
file hasimages.domains
array assigned - The image host assigned in
images.domains
allows user-provided SVG
-
Not affected: The
next.config.js
file hasimages.loader
assigned to something other than default - Not affected: Deployments on Vercel are not affected
Patches
CVE-2022-23646
Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the next.config.js
file must have an images.domains
array assigned and the image host assigned in images.domains
must allow user-provided SVG. If the next.config.js
file has images.loader
assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change next.config.js
to use a different loader configuration
other than the default.
Impact
-
Affected: All of the following must be true to be affected
- Next.js between version 10.0.0 and 12.0.10
- The
next.config.js
file has images.domains array assigned - The image host assigned in images.domains allows user-provided SVG
-
Not affected: The
next.config.js
file has images.loader assigned to something other than default
Patches
Workarounds
Change next.config.js
to use a different loader configuration other than the default, for example:
module.exports = {
images: {
loader: 'imgix',
path: 'https://example.com/myaccount/',
},
}
Or if you want to use the loader
prop on the component, you can use custom
:
module.exports = {
images: {
loader: 'custom',
},
}
CVE-2021-43803
Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue. Note that prior version 0.9.9 package next
hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
CVE-2021-37699
Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js
was statically generated, allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although it can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain.
Impact
-
Affected: Users of Next.js between
10.0.5
and10.2.0
-
Affected: Users of Next.js between
11.0.0
and11.0.1
usingpages/_error.js
withoutgetInitialProps
-
Affected: Users of Next.js between
11.0.0
and11.0.1
usingpages/_error.js
andnext export
- Not affected: Deployments on Vercel (vercel.com) are not affected
-
Not affected: Deployments with
pages/404.js
- Note that versions prior to 0.9.9 package
next
npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
We recommend upgrading to the latest version of Next.js to improve the overall security of your application.
Patches
https://github.com/vercel/next.js/releases/tag/v11.1.0
Configuration
📅 Schedule: Branch creation - "" in timezone Asia/Tokyo, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, check this box
This PR has been generated by Mend Renovate. View repository job log here.
This pull request is being automatically deployed with Vercel (learn more).
To see the status of your deployment, click below or on the icon next to each commit.
🔍 Inspect: https://vercel.com/ruedap/daplog/7kpmwpKH6H9UnyVHKBZ4Es8smP5Y
✅ Preview: Failed
[Deployment for ef5adfc failed]
Edited/Blocked Notification
Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.
You can manually request rebase by checking the rebase/retry box above.
⚠️ Warning: custom changes will be lost.
Autoclosing Skipped
This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.