Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This pull request fixes 2 critical and 1 high security vulnerabilities open on 54d105f but 8 high and 4 moderate vulnerabilities remain open and need manual review.
npm audit fix
updated the following npm dependencies:ansi-regex
5.0.0 > 5.0.1async
3.2.0 > 3.2.3minimist
1.2.5 > 1.2.6node-fetch
2.6.1 > 2.6.7node-forge
1.2.1 > 1.3.1re2
3.0.0, 6.10.2 > 1.17.4tar
6.0.5 > 6.1.11universal-analytics
6.10.2 > 0.5.3vm2
3.9.5 > 3.9.9Fixed vulnerabilities
Following security vulnerabilities are fixed:
minimist
Prototype Pollution in minimist Upgrade to version 1.2.6 or later
critical ·
<1.2.6
· CVE-2021-44906 · automatic fix available[email protected]
· 4 vulnerable pathsportfinder > mkdirp > minimist
superstatic > update-notifier > latest-version > package-json > registry-auth-token > rc > minimist
unzipper > fstream > mkdirp > minimist
update-notifier > latest-version > package-json > registry-auth-token > rc > minimist
vm2
Sandbox bypass in vm2 Upgrade to version 3.9.6 or later
critical ·
<3.9.6
· CVE-2021-23555 · automatic fix available[email protected]
· 1 vulnerable pathproxy-agent > pac-proxy-agent > pac-resolver > degenerator > vm2
async
Prototype Pollution in async Upgrade to version 3.2.2 or later
high ·
>=3.0.0 <3.2.2
· CVE-2021-43138 · automatic fix available[email protected]
· 1 vulnerable patharchiver > async
node-fetch
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor Upgrade to version 2.6.7 or later
high ·
<2.6.7
· CVE-2022-0235 · automatic fix available[email protected]
· 5 vulnerable paths@google-cloud/pubsub > google-auth-library > gaxios > node-fetch
@google-cloud/pubsub > google-auth-library > gcp-metadata > gaxios > node-fetch
@google-cloud/pubsub > google-gax > google-auth-library > gcp-metadata > gaxios > node-fetch
google-auth-library > gaxios > node-fetch
node-fetch
node-forge
Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
high ·
<1.3.0
· CVE-2022-24772 · automatic fix available[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
@google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
google-auth-library > gtoken > google-p12-pem > node-forge
Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
high ·
<1.3.0
· CVE-2022-24771 · automatic fix available[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
@google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
google-auth-library > gtoken > google-p12-pem > node-forge
Improper Verification of Cryptographic Signature in
node-forge
Upgrade to version 1.3.0 or latermoderate ·
<1.3.0
· CVE-2022-24773 · automatic fix available[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
@google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
google-auth-library > gtoken > google-p12-pem > node-forge
tar
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning Upgrade to version 6.1.2 or later
high ·
>=6.0.0 <6.1.2
· CVE-2021-32803 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization Upgrade to version 6.1.1 or later
high ·
>=6.0.0 <6.1.1
· CVE-2021-32804 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links Upgrade to version 6.1.7 or later
high ·
>=6.0.0 <6.1.7
· CVE-2021-37701 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization Upgrade to version 6.1.9 or later
high ·
>=6.0.0 <6.1.9
· CVE-2021-37713 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links Upgrade to version 6.1.9 or later
high ·
>=6.0.0 <6.1.9
· CVE-2021-37712 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
ansi-regex
Inefficient Regular Expression Complexity in chalk/ansi-regex Upgrade to version 3.0.1 or later
moderate ·
>=3.0.0 <3.0.1
· CVE-2021-3807 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > npmlog > gauge > wide-align > string-width > strip-ansi > ansi-regex
Inefficient Regular Expression Complexity in chalk/ansi-regex Upgrade to version 5.0.1 or later
moderate ·
>=5.0.0 <5.0.1
· CVE-2021-3807 · automatic fix available[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > cliui > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > strip-ansi > ansi-regex
[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > cliui > wrap-ansi > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > wrap-ansi > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > wrap-ansi > strip-ansi > ansi-regex
[email protected]
· 2 vulnerable paths@google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > string-width > strip-ansi > ansi-regex
[email protected]
· 1 vulnerable pathsuperstatic > update-notifier > boxen > string-width > strip-ansi > ansi-regex
[email protected]
· 2 vulnerable pathssuperstatic > update-notifier > boxen > widest-line > string-width > strip-ansi > ansi-regex
update-notifier > boxen > widest-line > string-width > strip-ansi > ansi-regex
[email protected]
· 2 vulnerable pathsupdate-notifier > boxen > string-width > strip-ansi > ansi-regex
update-notifier > boxen > wrap-ansi > string-width > strip-ansi > ansi-regex
ajv
Prototype Pollution in Ajv Upgrade to version 6.12.3 or later
moderate ·
<6.12.3
· CVE-2020-15366 · automatic fix available[email protected]
· 3 vulnerable pathsrequest > har-validator > ajv
superstatic > re2 > node-gyp > request > har-validator > ajv
universal-analytics > request > har-validator > ajv
Open vulnerabilities
Following security vulnerabilities remain open and need manual review:
async
Prototype Pollution in async Upgrade to version 2.6.4 or later
high ·
<2.6.4
· CVE-2021-43138 · automatic fix available[email protected]
· 1 vulnerable pathportfinder > async
[email protected]
· 1 vulnerable pathsuperstatic > nash > async
node-forge
Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
high ·
<1.3.0
· CVE-2022-24772 · automatic fix available[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
@google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
google-auth-library > gtoken > google-p12-pem > node-forge
Improper Verification of Cryptographic Signature in node-forge Upgrade to version 1.3.0 or later
high ·
<1.3.0
· CVE-2022-24771 · automatic fix available[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
@google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
google-auth-library > gtoken > google-p12-pem > node-forge
Improper Verification of Cryptographic Signature in
node-forge
Upgrade to version 1.3.0 or latermoderate ·
<1.3.0
· CVE-2022-24773 · automatic fix available[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-auth-library > gtoken > google-p12-pem > node-forge
@google-cloud/pubsub > google-gax > google-auth-library > gtoken > google-p12-pem > node-forge
google-auth-library > gtoken > google-p12-pem > node-forge
tar
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning Upgrade to version 6.1.2 or later
high ·
>=6.0.0 <6.1.2
· CVE-2021-32803 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization Upgrade to version 6.1.1 or later
high ·
>=6.0.0 <6.1.1
· CVE-2021-32804 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links Upgrade to version 6.1.7 or later
high ·
>=6.0.0 <6.1.7
· CVE-2021-37701 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization Upgrade to version 6.1.9 or later
high ·
>=6.0.0 <6.1.9
· CVE-2021-37713 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links Upgrade to version 6.1.9 or later
high ·
>=6.0.0 <6.1.9
· CVE-2021-37712 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > tar
ansi-regex
Inefficient Regular Expression Complexity in chalk/ansi-regex Upgrade to version 3.0.1 or later
moderate ·
>=3.0.0 <3.0.1
· CVE-2021-3807 · automatic fix available[email protected]
· 1 vulnerable pathsuperstatic > re2 > node-gyp > npmlog > gauge > wide-align > string-width > strip-ansi > ansi-regex
Inefficient Regular Expression Complexity in chalk/ansi-regex Upgrade to version 5.0.1 or later
moderate ·
>=5.0.0 <5.0.1
· CVE-2021-3807 · automatic fix available[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > cliui > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > strip-ansi > ansi-regex
[email protected]
· 3 vulnerable paths@google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > cliui > wrap-ansi > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > wrap-ansi > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > cliui > wrap-ansi > strip-ansi > ansi-regex
[email protected]
· 2 vulnerable paths@google-cloud/pubsub > google-gax > @grpc/grpc-js > @grpc/proto-loader > yargs > string-width > strip-ansi > ansi-regex
@google-cloud/pubsub > google-gax > @grpc/proto-loader > yargs > string-width > strip-ansi > ansi-regex
[email protected]
· 1 vulnerable pathsuperstatic > update-notifier > boxen > string-width > strip-ansi > ansi-regex
[email protected]
· 2 vulnerable pathssuperstatic > update-notifier > boxen > widest-line > string-width > strip-ansi > ansi-regex
update-notifier > boxen > widest-line > string-width > strip-ansi > ansi-regex
[email protected]
· 2 vulnerable pathsupdate-notifier > boxen > string-width > strip-ansi > ansi-regex
update-notifier > boxen > wrap-ansi > string-width > strip-ansi > ansi-regex
ajv
Prototype Pollution in Ajv Upgrade to version 6.12.3 or later
moderate ·
<6.12.3
· CVE-2020-15366 · automatic fix available[email protected]
· 2 vulnerable pathsrequest > har-validator > ajv
superstatic > re2 > node-gyp > request > har-validator > ajv
Files changed:
package-lock.json
package.json
atomist/npm-vulnerability-scanner-skill · Configure