-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency n8n to v1.76.1 #9937
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Auto-approved because label type/renovate is present.
🔍 Vulnerabilities of
|
digest | sha256:2b1e105ad3f3edabcb2530345a1d4b3338cff77d21e2e1de2511987f34de097c |
vulnerabilities | |
platform | linux/amd64 |
size | 168 MB |
packages | 1435 |
cross-spawn
|
Affected range | <6.0.6 |
Fixed version | 7.0.5 |
CVSS Score | 7.5 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Description
Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
semver 5.3.0
(npm)
pkg:npm/semver@5.3.0
Inefficient Regular Expression Complexity
Affected range | <5.7.2 |
Fixed version | 5.7.2 |
CVSS Score | 7.5 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Description
Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
pdfjs-dist 2.16.105
(npm)
Affected range | <=4.1.392 |
Fixed version | 4.2.67 |
CVSS Score | 8.8 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Description
Impact
If pdf.js is used to load a malicious PDF, and PDF.js is configured with
isEvalSupported
set totrue
(which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.Patches
The patch removes the use of
eval
:
mozilla/pdf.js#18015Workarounds
Set the option
isEvalSupported
tofalse
.References
path-to-regexp 0.1.10
(npm)
pkg:npm/path-to-regexp@0.1.10
Inefficient Regular Expression Complexity
Affected range | <0.1.12 |
Fixed version | 0.1.12 |
CVSS Score | 7.7 |
CVSS Vector | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P |
Description
Impact
The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of
path-to-regexp
, originally reported in CVE-2024-45296Patches
Upgrade to 0.1.12.
Workarounds
Avoid using two parameters within a single path segment, when the separator is not
.
(e.g. no/:a-:b
). Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking.References
snowflake-sdk 1.12.0
(npm)
pkg:npm/snowflake-sdk@1.12.0
Improper Preservation of Permissions
Affected range | >=1.12.0 |
Fixed version | 2.0.2 |
CVSS Score | 4.4 |
CVSS Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
Description
Issue
Snowflake discovered and remediated a vulnerability in the Snowflake NodeJS Driver. File permissions checks of the temporary credential cache could be bypassed by an attacker with write access to the local cache directory.
This vulnerability affects versions 1.12.0 through 2.0.1 on Linux. Snowflake fixed the issue in version 2.0.2.
Vulnerability Details
On Linux, when either EXTERNALBROWSER or USERNAME_PASSWORD_MFA authentication methods are used with temporary credential caching enabled, the Snowflake NodeJS Driver will cache temporary credentials in a local file. Due to a bug, the check verifying that the cache file can be accessed only by the user running the Driver always succeeded, but didn’t verify the permissions or the ownership correctly. An attacker with write access to the local cache folder could plant an empty file there and the Driver would use it to store temporary credentials instead of rejecting it due to overly broad permissions.
Solution
Snowflake released version 2.0.2 of the Snowflake NodeJS Driver, which fixes this issue. We recommend users upgrade to version 2.0.2.
Additional Information
If you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our Vulnerability Disclosure Policy.
identity 3.4.2
(npm)
pkg:npm/%40azure/identity@3.4.2
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Affected range | <4.2.1 |
Fixed version | 4.2.1 |
CVSS Score | 6.8 |
CVSS Vector | CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
Description
Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability.
cookie 0.4.2
(npm)
pkg:npm/cookie@0.4.2
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Affected range | <0.7.0 |
Fixed version | 0.7.0 |
Description
Impact
The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. For example,
serialize("userName=<script>alert('XSS3')</script>; Max-Age=2592000; a", value)
would result in"userName=<script>alert('XSS3')</script>; Max-Age=2592000; a=test"
, settinguserName
cookie to<script>
and ignoringvalue
.A similar escape can be used for
path
anddomain
, which could be abused to alter other fields of the cookie.Patches
Upgrade to 0.7.0, which updates the validation for
name
,path
, anddomain
.Workarounds
Avoid passing untrusted or arbitrary values for these fields, ensure they are set by the application instead of user input.
References
node 8.42.0
(npm)
pkg:npm/%40sentry/node@8.42.0
Allocation of File Descriptors or Handles Without Limits or Throttling
Affected range | >=8.10.0 |
Fixed version | 8.49.0 |
CVSS Score | 3.7 |
CVSS Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L |
Description
Impact
The ContextLines integration uses readable streams to more efficiently use memory when reading files. The ContextLines integration is used to attach source context to outgoing events.
The stream was not explicitly closed after use. This could lead to excessive amounts of file handles open on the system and potentially lead to a Denial of Service (DoS).
The ContextLines integration is enabled by default in the Node SDK (
@sentry/node
) and SDKs that run in Node.js environments (@sentry/astro
,@sentry/aws-serverless
,@sentry/bun
,@sentry/google-cloud-serverless
,@sentry/nestjs
,@sentry/nextjs
,@sentry/nuxt
,@sentry/remix
,@sentry/solidstart
,@sentry/sveltekit
).Patches
Users should upgrade to version
8.49.0
or higher.Workarounds
To remediate this issue in affected versions without upgrading to version
8.49.0
and above you can disable the ContextLines integration. See the docs for more details.Sentry.init({ // ... integrations: function (integrations) { // integrations will be all default integrations return integrations.filter(function (integration) { return integration.name !== "ContextLines"; }); }, });If you disable the ContextLines integration, you will lose source context on your error events.
References
Attempting automerge. See https://github.com/uniget-org/tools/actions/runs/13069348618. |
PR is clean and can be merged. See https://github.com/uniget-org/tools/actions/runs/13069348618. |
This PR contains the following updates:
1.75.2
->1.76.1
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
n8n-io/n8n (n8n)
v1.76.1
Compare Source
Bug Fixes
v1.76.0
Compare Source
Bug Fixes
workflowExecuteAfter
hooks (#12731) (9d76210)hookFunctionsSave
andhookFunctionsSaveWorker
(#12740) (d410b8f)Features
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.