Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade: bcrypt, dotenv, fastify, fastify-multer, pg, qrcode, sequelize #40

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

MoJassor
Copy link
Owner

snyk-top-banner

Snyk has created this PR to upgrade multiple dependencies.

👯‍♂ The following dependencies are linked and will therefore be updated together.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.

Name Versions Released on

bcrypt
from 5.0.1 to 5.1.1 | 2 versions ahead of your current version | a year ago
on 2023-08-16
dotenv
from 16.0.0 to 16.4.5 | 20 versions ahead of your current version | 7 months ago
on 2024-02-20
fastify
from 3.28.0 to 3.29.5 | 6 versions ahead of your current version | 2 years ago
on 2023-01-21
fastify-multer
from 2.0.2 to 2.0.3 | 1 version ahead of your current version | 2 years ago
on 2022-05-31
pg
from 8.7.3 to 8.12.0 | 11 versions ahead of your current version | 3 months ago
on 2024-06-04
qrcode
from 1.5.0 to 1.5.4 | 4 versions ahead of your current version | a month ago
on 2024-08-05
sequelize
from 6.19.0 to 6.37.3 | 50 versions ahead of your current version | 5 months ago
on 2024-04-13

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
critical severity SQL Injection
SNYK-JS-SEQUELIZE-2932027
791 Proof of Concept
high severity SQL Injection
SNYK-JS-SEQUELIZE-2959225
791 No Known Exploit
high severity Improper Filtering of Special Elements
SNYK-JS-SEQUELIZE-3324088
791 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JS-DICER-2311764
791 Mature
high severity Prototype Pollution
SNYK-JS-DOTTIE-3332763
791 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-MOMENT-2944238
791 Proof of Concept
medium severity Information Exposure
SNYK-JS-SEQUELIZE-3324089
791 No Known Exploit
medium severity Access of Resource Using Incompatible Type ('Type Confusion')
SNYK-JS-SEQUELIZE-3324090
791 No Known Exploit
medium severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JS-TAR-6476909
791 Proof of Concept
medium severity Cross-site Request Forgery (CSRF)
SNYK-JS-FASTIFY-3136527
791 No Known Exploit
Release notes
Package name: bcrypt from bcrypt GitHub release notes
Package name: dotenv from dotenv GitHub release notes
Package name: fastify from fastify GitHub release notes
Package name: fastify-multer from fastify-multer GitHub release notes
Package name: pg
  • 8.12.0 - 2024-06-04
  • 8.11.6 - 2024-06-04
  • 8.11.5 - 2024-04-02
  • 8.11.4 - 2024-03-30
  • 8.11.3 - 2023-08-16
  • 8.11.2 - 2023-08-01
  • 8.11.1 - 2023-06-26
  • 8.11.0 - 2023-05-15
  • 8.10.0 - 2023-03-06
  • 8.9.0 - 2023-01-27
  • 8.8.0 - 2022-08-23
  • 8.7.3 - 2022-02-04
from pg GitHub release notes
Package name: qrcode from qrcode GitHub release notes
Package name: sequelize
  • 6.37.3 - 2024-04-13

    6.37.3 (2024-04-13)

    Bug Fixes

    • postgres: use schema for foreign key constrains of a table (#17099) (6aba382)
  • 6.37.2 - 2024-03-29

    6.37.2 (2024-03-29)

    Bug Fixes

    • add readOnly to the transaction options types and docs (#17226) (7c8972f)
  • 6.37.1 - 2024-02-18

    6.37.1 (2024-02-18)

    Bug Fixes

    • types: Add definition of returning in SaveOptions. (#16954) (505467b)
  • 6.37.0 - 2024-02-11

    6.37.0 (2024-02-11)

    Features

    • postgres: support connectionTimeoutMillis dialectOption (#14119) (e81200e)
  • 6.36.0 - 2024-02-02
  • 6.35.2 - 2023-12-11
  • 6.35.1 - 2023-11-19
  • 6.35.0 - 2023-11-12
  • 6.34.0 - 2023-11-03
  • 6.33.0 - 2023-09-08
  • 6.32.1 - 2023-06-17
  • 6.32.0 - 2023-06-01
  • 6.31.1 - 2023-05-01
  • 6.31.0 - 2023-04-09
  • 6.30.0 - 2023-03-24
  • 6.29.3 - 2023-03-10
  • 6.29.2 - 2023-03-09
  • 6.29.1 - 2023-03-07
  • 6.29.0 - 2023-02-23
  • 6.28.2 - 2023-02-22
  • 6.28.1 - 2023-02-21
  • 6.28.0 - 2022-12-20
  • 6.27.0 - 2022-12-12
  • 6.26.0 - 2022-11-29
  • 6.25.8 - 2022-11-22
  • 6.25.7 - 2022-11-19
  • 6.25.6 - 2022-11-15
  • 6.25.5 - 2022-11-07
  • 6.25.4 - 2022-11-05
  • 6.25.3 - 2022-10-19
  • 6.25.2 - 2022-10-15
  • 6.25.1 - 2022-10-13
  • 6.25.0 - 2022-10-11
  • 6.24.0 - 2022-10-04
  • 6.23.2 - 2022-09-27
  • 6.23.1 - 2022-09-22
  • 6.23.0 - 2022-09-17
  • 6.22.1 - 2022-09-16
  • 6.22.0 - 2022-09-15
  • 6.21.6 - 2022-09-09
  • 6.21.5 - 2022-09-08
  • 6.21.4 - 2022-08-18
  • 6.21.3 - 2022-07-11
  • 6.21.2 - 2022-06-28
  • 6.21.1 - 2022-06-25
  • 6.21.0 - 2022-06-16
  • 6.20.1 - 2022-05-27
  • 6.20.0 - 2022-05-23
  • 6.19.2 - 2022-05-18
  • 6.19.1 - 2022-05-17
  • 6.19.0 - 2022-04-12
from sequelize GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"bcrypt","from":"5.0.1","to":"5.1.1"},{"name":"dotenv","from":"16.0.0","to":"16.4.5"},{"name":"fastify","from":"3.28.0","to":"3.29.5"},{"name":"fastify-multer","from":"2.0.2","to":"2.0.3"},{"name":"pg","from":"8.7.3","to":"8.12.0"},{"name":"qrcode","from":"1.5.0","to":"1.5.4"},{"name":"sequelize","from":"6.19.0","to":"6.37.3"}],"env":"prod","hasFixes":true,"isBreakingChange":false,"isMajorUpgrade":false,"issuesToFix":[{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-SEQUELIZE-2932027","issue_id":"SNYK-JS-SEQUELIZE-2932027","priority_score":791,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.4","score":470},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"SQL Injection"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SEQUELIZE-2959225","issue_id":"SNYK-JS-SEQUELIZE-2959225","priority_score":564,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7","score":350},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"SQL Injection"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SEQUELIZE-3324088","issue_id":"SNYK-JS-SEQUELIZE-3324088","priority_score":629,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.3","score":415},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Filtering of Special Elements"},{"exploit_maturity":"mature","id":"SNYK-JS-DICER-2311764","issue_id":"SNYK-JS-DICER-2311764","priority_score":761,"priority_score_factors":[{"type":"exploit","label":"Functional","score":171},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-DOTTIE-3332763","issue_id":"SNYK-JS-DOTTIE-3332763","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-MOMENT-2944238","issue_id":"SNYK-JS-MOMENT-2944238","priority_score":696,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SEQUELIZE-3324089","issue_id":"SNYK-JS-SEQUELIZE-3324089","priority_score":479,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.3","score":265},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Information Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-SEQUELIZE-3324090","issue_id":"SNYK-JS-SEQUELIZE-3324090","priority_score":529,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"6.3","score":315},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Access of Resource Using Incompatible Type ('Type Confusion')"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-TAR-6476909","issue_id":"SNYK-JS-TAR-6476909","priority_score":432,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"6.5","score":325},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Uncontrolled Resource Consumption ('Resource Exhaustion')"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-FASTIFY-3136527","issue_id":"SNYK-JS-FASTIFY-3136527","priority_score":424,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"4.2","score":210},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Cross-site Request Forgery (CSRF)"}],"prId":"eeab0ed5-1a73-4592-abe3-62189c68704c","prPublicId":"eeab0ed5-1a73-4592-abe3-62189c68704c","packageManager":"npm","priorityScoreList":[791,564,629,761,696,696,479,529,432,424],"projectPublicId":"066b283b-df82-4c56-8256-e1e5e087af71","projectUrl":"https://app.snyk.io/org/mojassor/project/066b283b-df82-4c56-8256-e1e5e087af71?utm_source=github&utm_medium=referral&page=upgrade-pr","prType":"upgrade","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["priorityScore"],"type":"auto","upgrade":["SNYK-JS-SEQUELIZE-2932027","SNYK-JS-SEQUELIZE-2959225","SNYK-JS-SEQUELIZE-3324088","SNYK-JS-DICER-2311764","SNYK-JS-DOTTIE-3332763","SNYK-JS-MOMENT-2944238","SNYK-JS-SEQUELIZE-3324089","SNYK-JS-SEQUELIZE-3324090","SNYK-JS-TAR-6476909","SNYK-JS-FASTIFY-3136527"],"upgradeInfo":{"versionsDiff":2,"publishedDate":"2023-08-16T03:48:51.540Z"},"vulns":["SNYK-JS-SEQUELIZE-2932027","SNYK-JS-SEQUELIZE-2959225","SNYK-JS-SEQUELIZE-3324088","SNYK-JS-DICER-2311764","SNYK-JS-DOTTIE-3332763","SNYK-JS-MOMENT-2944238","SNYK-JS-SEQUELIZE-3324089","SNYK-JS-SEQUELIZE-3324090","SNYK-JS-TAR-6476909","SNYK-JS-FASTIFY-3136527"]}'

Snyk has created this PR to upgrade:
  - bcrypt from 5.0.1 to 5.1.1.
    See this package in npm: https://www.npmjs.com/package/bcrypt
  - dotenv from 16.0.0 to 16.4.5.
    See this package in npm: https://www.npmjs.com/package/dotenv
  - fastify from 3.28.0 to 3.29.5.
    See this package in npm: https://www.npmjs.com/package/fastify
  - fastify-multer from 2.0.2 to 2.0.3.
    See this package in npm: https://www.npmjs.com/package/fastify-multer
  - pg from 8.7.3 to 8.12.0.
    See this package in npm: https://www.npmjs.com/package/pg
  - qrcode from 1.5.0 to 1.5.4.
    See this package in npm: https://www.npmjs.com/package/qrcode
  - sequelize from 6.19.0 to 6.37.3.
    See this package in npm: https://www.npmjs.com/package/sequelize

See this project in Snyk:
https://app.snyk.io/org/mojassor/project/066b283b-df82-4c56-8256-e1e5e087af71?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants