Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency gatsby-plugin-sharp to v5.8.1 [SECURITY] #69

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented May 30, 2023

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
gatsby-plugin-sharp (source) 5.3.2 -> 5.8.1 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2023-30548

Impact

The gatsby-plugin-sharp plugin prior to versions 5.8.1 and 4.25.1 contains a path traversal vulnerability exposed when running the Gatsby develop server (gatsby develop).

The following steps can be used to reproduce the vulnerability:


# Create a new Gatsby project, and install gatsby-plugin-sharp
$ npm init gatsby
$ cd my-gatsby-site
$ npm install gatsby-plugin-sharp

# Add the plugin to gatsby-config.js
module.exports = {
  plugins: [
    {
      resolve: `gatsby-plugin-sharp`,
    },
  ]
}

# Start the Gatsby develop server
$ gatsby develop

# Execute the path traversal vulnerability
$ curl "http://127.0.0.1:8000/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"

It should be noted that by default gatsby develop is only accessible via the localhost 127.0.0.1, and one would need to intentionally expose the server to other interfaces to exploit this vulnerability by using server options such as --host 0.0.0.0, -H 0.0.0.0, or the GATSBY_HOST=0.0.0.0 environment variable.

Patches

A patch has been introduced in gatsby-plugin-sharp@5.8.1 and gatsby-plugin-sharp@4.25.1 which mitigates the issue by ensuring that included paths remain within the project directory.

Workarounds

As stated above, by default gatsby develop is only exposed to the localhost 127.0.0.1. For those using the develop server in the default configuration no risk is posed. If other ranges are required, preventing the develop server from being exposed to untrusted interfaces or IP address ranges would mitigate the risk from this vulnerability.

We encourage projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.

Credits

We would like to thank Patrick Rombouts and Bart Veneman [drukwerkdeal.nl] for bringing the issue to our attention.

For more information

Email us at security@gatsbyjs.com.


Release Notes

gatsbyjs/gatsby (gatsby-plugin-sharp)

v5.8.1

Compare Source

Bug Fixes

v5.8.0

Compare Source

🧾 Release notes

Note: Version bump only for package gatsby-plugin-sharp

v5.7.0

Compare Source

🧾 Release notes

Note: Version bump only for package gatsby-plugin-sharp

v5.6.0

Compare Source

🧾 Release notes

Bug Fixes
Chores

v5.5.0

Compare Source

🧾 Release notes

Chores

v5.4.0

Compare Source

🧾 Release notes

Bug Fixes
Chores
5.3.2 (2022-12-14)

Note: Version bump only for package gatsby-plugin-sharp

5.3.1 (2022-12-14)

Note: Version bump only for package gatsby-plugin-sharp


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 0e98c96 to 37a62da Compare June 4, 2023 20:48
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch 2 times, most recently from 51f4df9 to 35a04da Compare June 18, 2023 05:45
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 35a04da to 9131f4f Compare June 30, 2023 03:01
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch 2 times, most recently from e3c47b3 to 0492833 Compare July 10, 2023 11:59
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch 2 times, most recently from 4f7d81f to 1127579 Compare July 20, 2023 02:48
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch 2 times, most recently from b106d00 to 6b596ee Compare August 3, 2023 02:27
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 6b596ee to a97f054 Compare August 11, 2023 02:19
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch 2 times, most recently from 5a89154 to 045993a Compare August 27, 2023 20:56
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 045993a to cf3f80e Compare September 20, 2023 02:34
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch 2 times, most recently from cf1f914 to 6692de9 Compare September 29, 2023 22:55
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch 2 times, most recently from c90fc2a to 8b6f4f1 Compare October 16, 2023 08:54
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 8b6f4f1 to a872435 Compare October 24, 2023 23:24
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from a872435 to da5c2c2 Compare November 7, 2023 17:51
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from da5c2c2 to f34119a Compare November 17, 2023 05:46
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from f34119a to e5d02cf Compare December 5, 2023 08:25
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch 2 times, most recently from 23b2882 to c7300c8 Compare February 5, 2024 05:33
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from c7300c8 to b6a30fe Compare February 27, 2024 08:38
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from b6a30fe to 755a65a Compare March 13, 2024 08:48
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 755a65a to b97b72f Compare March 22, 2024 00:01
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch 2 times, most recently from 5e0824e to b93cc90 Compare April 22, 2024 23:42
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from b93cc90 to 82b7ee8 Compare April 26, 2024 02:42
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 82b7ee8 to 24dda53 Compare June 5, 2024 05:40
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 24dda53 to 324845e Compare July 24, 2024 02:50
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 324845e to f66ce11 Compare August 9, 2024 23:54
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from f66ce11 to fedc780 Compare August 28, 2024 20:58
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from fedc780 to 3f3108e Compare October 10, 2024 02:55
@renovate renovate bot force-pushed the renovate/npm-gatsby-plugin-sharp-vulnerability branch from 3f3108e to a3944c9 Compare December 3, 2024 02:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants