-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency mongoose to v6.13.5 [SECURITY] #14
base: master
Are you sure you want to change the base?
Conversation
Kudos, SonarCloud Quality Gate passed! 0 Bugs No Coverage information |
2798d0a
to
b4c8971
Compare
Kudos, SonarCloud Quality Gate passed! 0 Bugs No Coverage information |
b4c8971
to
4c4db2e
Compare
4c4db2e
to
e6fbb54
Compare
e6fbb54
to
7911290
Compare
Quality Gate passedIssues Measures |
This PR contains the following updates:
6.0.10
->6.13.5
GitHub Vulnerability Alerts
CVE-2022-2564
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()
function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.CVE-2023-3696
Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.3, 6.11.3, and 5.13.20.
CVE-2022-24304
Description
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment.
Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()
function is vulnerable to prototype pollution when setting theschema
object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.Proof of Concept
Impact
This vulnerability can be manipulated to exploit other types of attacks, such as Denial of service (DoS), Remote Code Execution, or Property Injection.
CVE-2024-53900
Mongoose versions prior to 8.8.3, 7.8.3, and 6.13.5 are vulnerable to improper use of the $where operator. This vulnerability arises from the ability of the $where clause to execute arbitrary JavaScript code in MongoDB queries, potentially leading to code injection attacks and unauthorized access or manipulation of database data.
Release Notes
Automattic/mongoose (mongoose)
v6.13.5
Compare Source
v6.13.4
Compare Source
v6.13.3
Compare Source
v6.13.2
Compare Source
===================
v6.13.1
Compare Source
v6.13.0
Compare Source
v6.12.9
Compare Source
v6.12.8
Compare Source
===================
value
property rather than boolean #14418v6.12.7
Compare Source
v6.12.6
Compare Source
v6.12.5
Compare Source
v6.12.4
Compare Source
v6.12.3
Compare Source
v6.12.2
Compare Source
v6.12.1
Compare Source
v6.12.0
Compare Source
===================
v6.11.6
Compare Source
===================
v6.11.5
Compare Source
===================
v6.11.4
Compare Source
===================
7.3.4 / 2023-07-12
v6.11.3
Compare Source
===================
v6.11.2
Compare Source
===================
v6.11.1
Compare Source
===================
v6.11.0
Compare Source
===================
v6.10.5
Compare Source
===================
v6.10.4
Compare Source
===================
v6.10.3
Compare Source
===================
v6.10.2
Compare Source
===================
engines
inpackage.json
#13124 lorand-horvathv6.10.1
Compare Source
===================
$and
and$or
#13086 #12898Model.populate()
#13070v6.10.0
Compare Source
===================
v6.9.3
Compare Source
==================
autoCreate
andautoIndex
until after initial connection established #13007 #12940 lpizzinidevv6.9.2
Compare Source
==================
v6.9.1
Compare Source
==================
v6.9.0
Compare Source
==================
$or
conditions after strict applied #12898 0x0a0dv6.8.4
Compare Source
==================
v6.8.3
Compare Source
==================
v6.8.2
Compare Source
==================
v6.8.1
Compare Source
==================
$locals
parameters to getters/setters tutorial #12814 #12550 IslandRhythmsv6.8.0
Compare Source
==================
localField
andforeignField
for virtual populate #12657 #6963 IslandRhythmsv6.7.5
Compare Source
==================
v6.7.4
Compare Source
==================
v6.7.3
Compare Source
v6.7.2
Compare Source
v6.7.1
Compare Source
==================
v6.7.0
Compare Source
v6.6.7
Compare Source
==================
v6.6.6
Compare Source
==================
v6.6.5
Compare Source
v6.6.4
Compare Source
v6.6.3
Compare Source
==================
v6.6.2
Compare Source
v6.6.1
Compare Source
==================
v6.6.0
Compare Source
==================
v6.5.5
Compare Source
==================
v6.5.4
Compare Source
==================
v6.5.3
Compare Source
==================
discriminator()
generic #10349connection.model()
#12298 #12125 hasezoeyfindById()
type definitions #12309 lpizzinidevConfiguration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.