-
Notifications
You must be signed in to change notification settings - Fork 1
chore(deps): update dependency standard-version to v8 [security] #25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
|
New dependency changes detected. Learn more about Socket for GitHub ↗︎ 👍 No new dependency issues detected in pull request Bot CommandsTo ignore an alert, reply with a comment starting with Pull request alert summary
📊 Modified Dependency Overview:
|
5f5ae0d
to
795ee98
Compare
Vulnerable Libraries (54)
More info on how to fix Vulnerable Libraries in JavaScript. 👉 Go to the dashboard for detailed results. 📥 Happy? Share your feedback with us. |
795ee98
to
d849bab
Compare
d849bab
to
4ac4de3
Compare
4ac4de3
to
a9c1c61
Compare
This PR contains the following updates:
^4.4.0
->^8.0.0
GitHub Vulnerability Alerts
GHSA-7xcx-6wjh-7xp2
GitHub Security Lab (GHSL) Vulnerability Report:
GHSL-2020-111
The GitHub Security Lab team has identified a potential security vulnerability in standard-version.
Summary
The
standardVersion
function has a command injection vulnerability. Clients of thestandard-version
library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.Product
Standard Version
Tested Version
Commit 2f04ac8
Details
Issue 1: Command injection in
standardVersion
The following proof-of-concept illustrates the vulnerability. First install Standard Version and create an empty git repo to run the PoC in:
Now create a file with the following contents:
and run it:
Notice that a file named
exploit
has been created.This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples:
CVE-2020-7646,
CVE-2020-7614,
CVE-2020-7597,
CVE-2019-10778,
CVE-2019-10776,
CVE-2018-16462,
CVE-2018-16461,
CVE-2018-16460,
CVE-2018-13797,
CVE-2018-3786,
CVE-2018-3772,
CVE-2018-3746,
CVE-2017-16100,
CVE-2017-16042.
We have written a CodeQL query, which automatically detects this vulnerability. You can see the results of the query on the
standard-version
project here.Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
Remediation
We recommend not using an API that can interpret a string as a shell command. For example, use
child_process.execFile
instead ofchild_process.exec
.Credit
This issue was discovered and reported by GitHub Engineer @erik-krogh (Erik Krogh Kristensen).
Contact
You can contact the GHSL team at
[email protected]
, please includeGHSL-2020-111
in any communication regarding this issue.Disclosure Policy
This report is subject to our coordinated disclosure policy.
Release Notes
conventional-changelog/standard-version (standard-version)
v8.0.1
Compare Source
v8.0.0
Compare Source
⚠ BREAKING CHANGES
composer.json
andcomposer.lock
will no longer be read from or bumped by default. If you need to obtain a version or write a version to these files, please usebumpFiles
and/orpackageFiles
options accordingly.Bug Fixes
v7.1.0
Compare Source
Features
header
(--header) configuration based on the spec. (#364) (ba80a0c)Bug Fixes
7.0.1 (2019-11-07)
Bug Fixes
v7.0.1
Compare Source
v7.0.0
Compare Source
⚠ BREAKING CHANGES
Bug Fixes
releaseCommitMessageFormat
(#351) (a7133cc)6.0.1 (2019-05-05)
Bug Fixes
v6.0.1
Compare Source
v6.0.0
Compare Source
Bug Fixes
Build System
Features
Tests
BREAKING CHANGES
v5.0.2
Compare Source
v5.0.1
Compare Source
Bug Fixes
v5.0.0
Compare Source
Bug Fixes
chore
Features
BREAKING CHANGES
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.