chore(deps): update dependency standard-version to v8 [security]#1
chore(deps): update dependency standard-version to v8 [security]#1renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
⚠ Artifact update problemRenovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is. ♻ Renovate will retry this branch, including artifacts, only when one of the following happens:
The artifact failure details are included below: File name: yarn.lock |
|
73f147d to
446c8f5
Compare
|
|
Important Review skippedBot user detected. To trigger a single review, invoke the You can disable this status message by setting the Comment |
446c8f5 to
f48464b
Compare
This PR contains the following updates:
^6.0.1→^8.0.0GitHub Vulnerability Alerts
GHSA-7xcx-6wjh-7xp2
GitHub Security Lab (GHSL) Vulnerability Report:
GHSL-2020-111The GitHub Security Lab team has identified a potential security vulnerability in standard-version.
Summary
The
standardVersionfunction has a command injection vulnerability. Clients of thestandard-versionlibrary are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.Product
Standard Version
Tested Version
Commit 2f04ac8
Details
Issue 1: Command injection in
standardVersionThe following proof-of-concept illustrates the vulnerability. First install Standard Version and create an empty git repo to run the PoC in:
Now create a file with the following contents:
and run it:
Notice that a file named
exploithas been created.This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples:
CVE-2020-7646,
CVE-2020-7614,
CVE-2020-7597,
CVE-2019-10778,
CVE-2019-10776,
CVE-2018-16462,
CVE-2018-16461,
CVE-2018-16460,
CVE-2018-13797,
CVE-2018-3786,
CVE-2018-3772,
CVE-2018-3746,
CVE-2017-16100,
CVE-2017-16042.
We have written a CodeQL query, which automatically detects this vulnerability. You can see the results of the query on the
standard-versionproject here.Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
Remediation
We recommend not using an API that can interpret a string as a shell command. For example, use
child_process.execFileinstead ofchild_process.exec.Credit
This issue was discovered and reported by GitHub Engineer @erik-krogh (Erik Krogh Kristensen).
Contact
You can contact the GHSL team at
securitylab@github.com, please includeGHSL-2020-111in any communication regarding this issue.Disclosure Policy
This report is subject to our coordinated disclosure policy.
Release Notes
conventional-changelog/standard-version (standard-version)
v8.0.1Compare Source
⚠ BREAKING CHANGES
Bug Fixes
Build System
8.0.2 (2020-07-14)
Bug Fixes
8.0.1 (2020-07-12)
Bug Fixes
v8.0.0Compare Source
⚠ BREAKING CHANGES
Bug Fixes
Build System
8.0.2 (2020-07-14)
Bug Fixes
8.0.1 (2020-07-12)
Bug Fixes
v7.1.0Compare Source
Features
header(--header) configuration based on the spec. (#364) (ba80a0c)Bug Fixes
7.0.1 (2019-11-07)
Bug Fixes
v7.0.1Compare Source
Features
header(--header) configuration based on the spec. (#364) (ba80a0c)Bug Fixes
7.0.1 (2019-11-07)
Bug Fixes
v7.0.0Compare Source
Features
header(--header) configuration based on the spec. (#364) (ba80a0c)Bug Fixes
7.0.1 (2019-11-07)
Bug Fixes
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.