react-ssr-advanced-seed
                                
                                 react-ssr-advanced-seed copied to clipboard
                                
                                    react-ssr-advanced-seed copied to clipboard
                            
                            
                            
                        chore(deps): update dependency swagger-ui-dist to 4.1.3 [security] - abandoned
This PR contains the following updates:
| Package | Change | 
|---|---|
| swagger-ui-dist | 3.24.3->4.1.3 | 
GitHub Vulnerability Alerts
GHSA-qrmm-w75w-3wpx
SwaggerUI supports displaying remote OpenAPI definitions through the ?url parameter. This enables robust demonstration capabilities on sites like petstore.swagger.io, editor.swagger.io, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered.
However, this functionality may pose a risk for users who host their own SwaggerUI instances. In particular, including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances.
An example scenario abusing this functionality could take the following form:
- https://example.com/api-docshosts a version of SwaggerUI with- ?url=query parameter enabled.
- Users will trust the domain https://example.comand the contents of the OpenAPI definition.
- A malicious actor may craft a similar OpenAPI definition and service that responds to the defined APIs at https://evildomain.
- Users mistakenly click a phishing URL like https://example.com/api-docs?url=https://evildomain/fakeapi.yamland enters sensitive data via the "Try-it-out" feature.
We do want to stress that this attack vector is limited to scenarios that actively trick users into divulging sensitive information. The ease of this is highly contextual and, therefore, the threat model may be different for individual users and organizations. It is not possible to perform non-interactive attacks (e.g., cross-site scripting or code injection) through this mechanism.
Resolution
We've made the decision to disable query parameters (#4872) by default starting with SwaggerUI version 4.1.3. Please update to this version when it becomes available (ETA: 2021 December). Users will still be able to be re-enable the options at their discretion. We'll continue to enable query parameters on the Swagger demo sites.
Workaround
If you host a version of SwaggerUI and wish to mitigate this issue immediately, you are encouraged to add the following custom plugin code:
SwaggerUI({
  //  ...other configuration options,
  plugins: [function UrlParamDisablePlugin() {
    return {
      statePlugins: {
        spec: {
          wrapActions: {
            // Remove the ?url parameter from loading an external OpenAPI definition.
            updateUrl: (oriAction) => (payload) => {
              const url = new URL(window.location.href)
              if (url.searchParams.has('url')) {
                url.searchParams.delete('url')
                window.location.replace(url.toString())
              }
              return oriAction(payload)
            }
          }
        }
      }
    }
  }],
})
Future UX work
Through the exploration of this issue, it became apparent that users may not be aware to which web server the Try-it-out function will send requests. While this information is currently presented at the top of the page, understanding may improve by displaying it closer to the "Execute" button where requests are actually made. We'll be exploring these UX improvements over the coming months and welcome community input. Please create a Feature Request under the GitHub Issue tab to start a conversation with us and the community.
Reflected XSS attack
Warning in versions <= 3.36.2, it is possible to combine the URL options (as mentioned above) with a vunerability in DOMPurify (https://www.cvedetails.com/cve/CVE-2020-26870/) to create a reflected XSS vector. If your version of Swagger UI is older than or equal to 3.36.2, we suggest you upgrade or implement the workaround as mentioned above.
CVE-2021-46708
The swagger-ui-dist package before 4.1.3 for Node.js could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim.
Configuration
📅 Schedule: "" (UTC).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, click this checkbox.
This PR has been generated by WhiteSource Renovate. View repository job log here.
⚠ Artifact update problem
Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.
♻ Renovate will retry this branch, including artifacts, only when one of the following happens:
- any of the package files in this branch needs updating, or
- the branch becomes conflicted, or
- you click the rebase/retry checkbox if found above, or
- you rename this PR's title to start with "rebase!" to trigger it manually
The artifact failure details are included below:
File name: package-lock.json
npm WARN deprecated [email protected]: The functionality that this package provided is now in @npmcli/arborist
npm WARN deprecated [email protected]: See https://github.com/lydell/source-map-resolve#deprecated
npm WARN deprecated [email protected]: https://github.com/lydell/resolve-url#deprecated
npm WARN deprecated [email protected]: See https://github.com/lydell/source-map-url#deprecated
npm WARN deprecated [email protected]: Please see https://github.com/lydell/urix#deprecated
npm WARN deprecated [email protected]: request has been deprecated, see https://github.com/request/request/issues/3142
npm WARN deprecated [email protected]: this library is no longer supported
npm WARN deprecated [email protected]: Please upgrade  to version 7 or higher.  Older versions may use Math.random() in certain circumstances, which is known to be problematic.  See https://v8.dev/blog/math-random for details.
npm WARN deprecated [email protected]: This package is broken and no longer maintained. 'mkdirp' itself supports promises now, please switch to that.
npm WARN @octokit/[email protected] requires a peer of @octokit/core@>=3 but none is installed. You must install peer dependencies yourself.
ERR! lerna Unknown command "info"
ERR! lerna Did you mean init?
npm WARN [email protected] No repository field.
lerna notice cli v3.18.4
lerna info versioning independent
lerna notice filter excluding "__tests__"
lerna info filter [ '!__tests__' ]
lerna info Bootstrapping 27 packages
lerna info Installing external dependencies
lerna ERR! npm install --ignore-scripts --no-package-lock --ignore-scripts --no-audit --package-lock-only exited 1 in 'omega-web'
lerna ERR! npm install --ignore-scripts --no-package-lock --ignore-scripts --no-audit --package-lock-only stderr:
npm ERR! code ERESOLVE
npm ERR! ERESOLVE could not resolve
npm ERR! 
npm ERR! While resolving: [email protected]
npm ERR! Found: [email protected]
npm ERR! node_modules/react
npm ERR!   peer react@"^16.8.0" from @material-ui/[email protected]
npm ERR!   node_modules/@material-ui/core
npm ERR!     @material-ui/core@"4.4.2" from the root project
npm ERR!     peer @material-ui/core@"^4.0.0" from @material-ui/[email protected]
npm ERR!     node_modules/@material-ui/icons
npm ERR!       @material-ui/icons@"4.4.1" from the root project
npm ERR!   peer react@"^16.0.0" from [email protected]
npm ERR!   node_modules/react-dom
npm ERR!     react-dom@"16.8.6" from the root project
npm ERR!     peer react-dom@"^16.8.0" from @material-ui/[email protected]
npm ERR!     node_modules/@material-ui/core
npm ERR!       @material-ui/core@"4.4.2" from the root project
npm ERR!       1 more (@material-ui/icons)
npm ERR!     2 more (@material-ui/icons, @material-ui/styles)
npm ERR!   2 more (@material-ui/icons, @material-ui/styles)
npm ERR! 
npm ERR! Could not resolve dependency:
npm ERR! react-fade-in@"0.1.6" from the root project
npm ERR! 
npm ERR! Conflicting peer dependency: [email protected]
npm ERR! node_modules/react
npm ERR!   peer react@"^15.4.1" from [email protected]
npm ERR!   node_modules/react-fade-in
npm ERR!     react-fade-in@"0.1.6" from the root project
npm ERR! 
npm ERR! Fix the upstream dependency conflict, or retry
npm ERR! this command with --force, or --legacy-peer-deps
npm ERR! to accept an incorrect (and potentially broken) dependency resolution.
npm ERR! 
npm ERR! See /tmp/renovate-cache/others/npm/eresolve-report.txt for a full report.
npm ERR! A complete log of this run can be found in:
npm ERR!     /tmp/renovate-cache/others/npm/_logs/2022-03-07T11_11_46_719Z-debug-0.log
lerna ERR! npm install --ignore-scripts --no-package-lock --ignore-scripts --no-audit --package-lock-only exited 1 in 'omega-web'
:warning: We detected 35 security issues in this pull request:
Vulnerable Libraries (35)
| Severity | Details | 
|---|---|
| High | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| High | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| High | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| Medium | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| High | @lerna/[email protected] (t) upgrade to: >3.22.0 | 
| High | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| High | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| Medium | @lerna/[email protected] (t) upgrade to: >3.22.0 | 
| High | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| High | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| High | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| Medium | @lerna/[email protected] (t) upgrade to: >3.18.5 | 
| Medium | @lerna/[email protected] (t) upgrade to: >3.22.1 | 
| High | @lerna/[email protected] (t) upgrade to: >3.21.0 | 
| High | @pm2/[email protected] (t) upgrade to: >2.0.0 | 
| High | @pm2/[email protected] (t) upgrade to: >0.6.1 | 
| Medium | [email protected] (t) upgrade to: 3.0.0 | 
| Medium | [email protected] (t) upgrade to: >1.0.0-rc.3 | 
| High | [email protected] (t) upgrade to: >4.2.1 | 
| High | [email protected] (t) upgrade to: >=1.3.2 | 
| Medium | [email protected] (t) upgrade to: >=6.5.4 | 
| Critical | [email protected] (t) upgrade to: >=4.7.7 | 
| Medium | [email protected] (t) upgrade to: >=2.8.9 | 
| Medium | [email protected] (t) upgrade to: >1.4.1 || >2.0.1 | 
| Medium | [email protected] (t) upgrade to: >=3.7.0 | 
| Medium | [email protected] (t) upgrade to: >=0.14.3 | 
| Critical | [email protected] (t) upgrade to: >=3.0.3 | 
| Medium | [email protected] (t) upgrade to: >=8.0.1 | 
| Medium | [email protected] (t) upgrade to: >=1.0.7 | 
| Medium | [email protected] (t) upgrade to: >2.0.5 | 
| High | [email protected] (t) upgrade to: >1.10.7 | 
| High | [email protected] (t) upgrade to: >5.6.3 | 
| Medium | [email protected] (t) upgrade to: >=1.0.5 | 
| Medium | [email protected] (t) upgrade to: >=1.0.3 | 
| Critical | [email protected] (t) upgrade to: >1.5.8 | 
More info on how to fix Vulnerable Libraries in JavaScript.
👉 Go to the dashboard for detailed results.
📥 Happy? Share your feedback with us.
Autoclosing Skipped
This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.