Skip to content

Conversation

@markus0x1
Copy link
Contributor

Motivation

The current version of mocha and recursive-readdir use a unsafe version of minimatch

Solution

Bump mocha and recursive-readdir

verify with

yarn audit --groups dependencies

Related PR

#758

@markus0x1 markus0x1 changed the title bump recursive-dir and mocha Bump recursive-dir and mocha Nov 9, 2022
@markus0x1
Copy link
Contributor Author

Hey @cgewecke, is there any way we can merge this? I would like to have these vulnerabilities fixed in my dependency graph.

@hellwolf
Copy link

hellwolf commented Aug 23, 2023

│ └─┬ [email protected]
│   └─┬ [email protected]
│     └─┬ [email protected]
│       └── [email protected]

This is getting bad since more Critical CVE dependencies are leaked into it.

flat helps flatten/unflatten nested Javascript objects. A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 can address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability.

@cgewecke
Copy link
Member

Thanks for this - mocha has been updated in #810 and I think the readdir package should default to the correct patch version on new installs.

@cgewecke cgewecke closed this Sep 21, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants