security: fixed issue with class-validator dependency cve #214
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
PR Checklist
Please check if your PR fulfills the following requirements:
PR Type
What kind of change does this PR introduce?
fixes #number
Previous version is using a vulnerable version of
class-validator
that suffers from a SQL injection and Cross-site Scripting (GHSA-fj58-h2fr-3pp2). This vulnerability affects all versions below 0.14.0.This PR seeks to fix it by updating it(together to
@latipun7/releaserc
andsemantic-release
thatnpm audit
has showed to be fixable, and were bumped to the highest supported version that did not introduced breakage) to at least 0.14.0What is the current behavior?
Behavior persists the same without changes, aside from the above mentioned CVE no-longer affecting this project.
Issue Number: N/A
What is the new behavior?
Does this PR introduce a breaking change?
Other information
Tests have been ran multiple times locally, and it shows to not have changed any sort of behavior or inner-works of the library.
Would be glad if this could be double-checked before merged in