Fix security vulnerabilities reported by GitHub

Description

1 kind-of vulnerability

found in yarn.lock 18 hours ago

Remediation

Upgrade kind-of to version 6.0.3 or later. For example:

Always verify the validity and compatibility of suggestions with your codebase.

Details

CVE-2019-20149

moderate severity

*Vulnerable versions:* < 6.0.3

*Patched version:* 6.0.3

ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.

1 ecstatic vulnerability

found in yarn.lock yesterday

Remediation

No patched version is available.

Details

CVE-2019-10775

moderate severity

*Vulnerable versions:* <= 4.1.2

*Patched version:* No fix

ecstatic have a denial of service vulnerability. Successful exploitation could lead to crash of an application.

1 minimist vulnerability

found in yarn.lock 19 days ago

h3 Remediation

Upgrade minimist to version 1.2.2 or later. For example:

Always verify the validity and compatibility of suggestions with your codebase.

Details

GHSA-7fhm-mqm4-2wp7

moderate severity

*Vulnerable versions:* < 1.2.2

*Patched version:* 1.2.2

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "*proto*" payload.

1 acorn vulnerability

found in yarn.lock 20 days ago

Remediation

Upgrade acorn to version 6.4.1 or later. For example:

Always verify the validity and compatibility of suggestions with your codebase.

Details

GHSA-7fhm-mqm4-2wp7

moderate severity

*Vulnerable versions:* >= 6.0.0, < 6.4.1

*Patched version:* 6.4.1

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "*proto*" payload.

Environment

None

Potential Workaround

None

relates to

Checklist

hide

TestRail: Results

Activity

Show:

Peter Murray April 17, 2020 at 2:56 PM

GitHub reported a new issue overnight:

https-proxy-agent vulnerability found in [yarn.lock](https://github.com/folio-org/ui-notes/blob/master/yarn.lock) yesterday

Remediation

Upgrade https-proxy-agent to version 2.2.3 or later. For example:

Always verify the validity and compatibility of suggestions with your codebase.

Details

WS-2019-0310

moderate severity

*Vulnerable versions:* < 2.2.3

*Patched version:* 2.2.3

There is a Machine-In-The-Middle vulnerability found in https-proxy-agent before 2.2.3. There is a failure of TLS enforcement on the socket. Attacker may intercept unencrypted communications.

Done

Details

Assignee

Reporter

Priority

Story Points

Sprint

Development Team

Spitfire

Fix versions

TestRail: Cases

Open TestRail: Cases

TestRail: Runs

Open TestRail: Runs
Created April 2, 2020 at 7:08 PM
Updated April 30, 2020 at 4:29 PM
Resolved April 30, 2020 at 4:29 PM
TestRail: Cases
TestRail: Runs