-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Snyk] Security upgrade node-sass from 3.13.1 to 7.0.0 #43
base: develop
Are you sure you want to change the base?
Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JS-NODESASS-1059081 - https://snyk.io/vuln/SNYK-JS-NODESASS-535499 - https://snyk.io/vuln/SNYK-JS-NODESASS-535501 - https://snyk.io/vuln/SNYK-JS-NODESASS-535503 - https://snyk.io/vuln/SNYK-JS-NODESASS-535504 - https://snyk.io/vuln/SNYK-JS-NODESASS-535505 - https://snyk.io/vuln/SNYK-JS-NODESASS-540960 - https://snyk.io/vuln/SNYK-JS-NODESASS-540962 - https://snyk.io/vuln/SNYK-JS-NODESASS-540966 - https://snyk.io/vuln/SNYK-JS-NODESASS-540968 - https://snyk.io/vuln/SNYK-JS-NODESASS-540970 - https://snyk.io/vuln/SNYK-JS-NODESASS-540972 - https://snyk.io/vuln/SNYK-JS-NODESASS-540974 - https://snyk.io/vuln/SNYK-JS-NODESASS-540982 - https://snyk.io/vuln/SNYK-JS-NODESASS-540984 - https://snyk.io/vuln/SNYK-JS-NODESASS-540986 - https://snyk.io/vuln/SNYK-JS-NODESASS-540988 - https://snyk.io/vuln/SNYK-JS-NODESASS-542662
Cross-Site ScriptingClick here to find a Cross-Site Scripting training lab DescriptionCross-Site Scripting (otherwise known as XSS) is a vulnerability that allows a malicious actor to manipulate a legitimate user's interactions with a vulnerable web application. Attackers exploit this to bypass the same-origin policy, often allowing them to perform any actions that the target user would normally perform, including gaining access to their data. In cases where the victim user has privileged application access, the attacker may use XSS to seize control of the application. XSS attacks typically occur in web applications when data is received, frequently in the form of a web request, and the data is reflected back in the HTTP response to the user without validation. XSS attacks can generally be divided into the following three categories. # Read moreReflected XSSReflected XSS attacks arise when a web server reflects injected script, such as a search result, an error message, or any other response that includes some or all of the input sent to the server as part of the request. The attack is then delivered to the victim through another route (e.g., e-mail or an alternative website), thus tricking the user into clicking on a malicious link. The injected code travels to the vulnerable website, which reflects the attack payload back to the user's browser. The browser then executes the code because it came from a "trusted" server. Stored XSSIn the Stored XSS attack, the injected script is stored on the target application as legitimate content, such as a message in a forum or a comment in a blog post. The injected code is stored in the database and sent to the users when it is retrieved, thus executing the attack payload in the victim's browser. DOM-based XSSDOM-based XSS vulnerabilities usually occur when the JavaScript in a page takes user-provided data from a source in the HTML, such as the ImpactXSS attacks can result in the disclosure of the user's session cookie, allowing an attacker to hijack the user's session and take over the account. Even though As with all of the severe vulnerabilities that make up a part of the OWASP Top 10, XSS attacks can result in the complete compromise of a user's system. As stated in the description, if an attacker compromises a user holding the 'keys to the kingdom,' i.e., privileged access to applications/administrator rights, the results can be devastating. PreventionXSS attacks can be mitigated by performing appropriate server-side validation and escaping. Remediation relies on performing Output Encoding (e.g., using an escape syntax) for the type of HTML context into which untrusted data is reflected. Input Validation
Output EncodingOutput Encoding is used to convert untrusted input into a safe form where the input is displayed as data to the user without executing as code in the browser. Output Encoding is performed when the data leaves the application to a downstream component. The table below lists the possible downstream contexts where the untrusted input could be used:
The following chart details a list of critical output encoding methods required to mitigate Cross-Site Scripting:
Defense in DepthContent Security Policy (CSP)The Content Security Policy (CSP) is a browser mechanism that enables the creation of source allow lists for client-side resources of web applications, e.g., JavaScript, CSS, images, etc. CSP via a special HTTP header instructs the browser to only execute or render resources from those sources. For example:
The above CSP will instruct the web browser to load all resources only from the page's origin and JavaScript source code files from X-XSS-Protection HeaderThis HTTP response header enables the Cross-Site Scripting (XSS) filter built into some modern web browsers. The header is usually enabled by default anyway, so its role is to re-enable the filter for a particular website if it was disabled by the user. Content TypesTo prevent non-HTML HTTP responses from embedding data which might be dangerously interpreted as HTML or JavaScript, it is recommended to always send the Modern FrameworksModern JavaScript frameworks (e.g., AngularJS, ReactJS) or server-side templating systems (e.g., Go Templates) have robust built-in protections against Reflected Cross-Site Scripting. TestingVerify that context-aware, preferably automated - or at worst, manual - output escaping protects against reflected, stored, and DOM-based XSS.
|
Micro-Learning Topic: Weak input validation (Detected by phrase)Matched on "Improper Input Validation"Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Denial of service (Detected by phrase)Matched on "Denial of Service"The Denial of Service (DoS) attack is focused on making a resource (site, application, server) unavailable for the purpose it was designed. There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical, or resources handling vulnerabilities, among others. Source: https://www.owasp.org/index.php/Denial_of_Service Try a challenge in Secure Code WarriorMicro-Learning Topic: Resource exhaustion (Detected by phrase)Matched on "Resource Exhaustion"Allocating objects or timers with user-controlled sizes or durations can cause resource exhaustion. Try a challenge in Secure Code WarriorMicro-Learning Topic: Cross-site scripting (Detected by phrase)Matched on "xss"Cross-site scripting vulnerabilities occur when unescaped input is rendered into a page displayed to the user. When HTML or script is included in the input, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context. Try a challenge in Secure Code WarriorHelpful references
|
Micro-Learning Topic: Cross-site scripting (Detected by phrase)Matched on "Cross-Site Scripting"Cross-site scripting vulnerabilities occur when unescaped input is rendered into a page displayed to the user. When HTML or script is included in the input, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: DOM-based cross-site scripting (Detected by phrase)Matched on "DOM-Based Cross Site Scripting"DOM-based cross-site scripting vulnerabilities occur when unescaped input is processed by client-side script and insecurely written into the page Document Object Model (DOM). This will result in immediate changes to the page, potentially without any call to the server. When HTML or script is included in the input, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context. Try a challenge in Secure Code WarriorMicro-Learning Topic: Reflected cross-site scripting (Detected by phrase)Matched on "Reflected Cross-Site Scripting"Reflected cross-site scripting vulnerabilities occur when unescaped input is displayed in the resulting page displayed to the user. When HTML or script is included in the input, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context. Try a challenge in Secure Code WarriorMicro-Learning Topic: Stored cross-site scripting (Detected by phrase)Matched on "Stored Cross Site Scripting"Stored cross-site scripting vulnerabilities happen when unescaped input is displayed by the application after successful storage in persistence layers (e.g. database or cache). When HTML or script is included in the input that is stored in the database, and is then rendered into a page without escaping or encoding, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context. Try a challenge in Secure Code Warrior |
Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.
Changes included in this PR
Vulnerabilities that will be fixed
With an upgrade:
Why? Has a fix available, CVSS 5.3
SNYK-JS-NODESASS-1059081
Why? Has a fix available, CVSS 6.5
SNYK-JS-NODESASS-535499
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
SNYK-JS-NODESASS-535501
Why? Has a fix available, CVSS 7.5
SNYK-JS-NODESASS-535503
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
SNYK-JS-NODESASS-535504
Why? Proof of Concept exploit, Has a fix available, CVSS 8.8
SNYK-JS-NODESASS-535505
Why? Has a fix available, CVSS 7.5
SNYK-JS-NODESASS-540960
Why? Has a fix available, CVSS 7.5
SNYK-JS-NODESASS-540962
Why? Has a fix available, CVSS 7.5
SNYK-JS-NODESASS-540966
Why? Has a fix available, CVSS 7.5
SNYK-JS-NODESASS-540968
Why? Has a fix available, CVSS 7.5
SNYK-JS-NODESASS-540970
Why? Has a fix available, CVSS 7.5
SNYK-JS-NODESASS-540972
Why? Proof of Concept exploit, Has a fix available, CVSS 8.8
SNYK-JS-NODESASS-540974
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
SNYK-JS-NODESASS-540982
Why? Has a fix available, CVSS 6.5
SNYK-JS-NODESASS-540984
Why? Has a fix available, CVSS 7.5
SNYK-JS-NODESASS-540986
Why? Has a fix available, CVSS 7.5
SNYK-JS-NODESASS-540988
Why? Has a fix available, CVSS 5.9
SNYK-JS-NODESASS-542662
(*) Note that the real score may have changed since the PR was raised.
Commit messages
Package name: node-sass
The new version differs by 250 commits.See the full diff
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
🛠 Adjust project settings
📚 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Resource Exhaustion
🦉 Uncontrolled Recursion
🦉 Out-of-bounds Read
🦉 More lessons are available in Snyk Learn