chore(deps): update dependency shelljs to ^0.8.0 [security] #206
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
^0.7.6->^0.8.0GitHub Vulnerability Alerts
GHSA-64g7-mvw6-v9qj
Impact
Output from the synchronous version of
shell.exec()may be visible to other users on the same system. You may be affected if you executeshell.exec()in multi-user Mac, Linux, or WSL environments, or if you executeshell.exec()as the root user.Other shelljs functions (including the asynchronous version of
shell.exec()) are not impacted.Patches
Patched in shelljs 0.8.5
Workarounds
Recommended action is to upgrade to 0.8.5.
References
https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/
For more information
If you have any questions or comments about this advisory:
CVE-2022-0144
shelljs is vulnerable to Improper Privilege Management
Improper Privilege Management in shelljs
GHSA-64g7-mvw6-v9qj
More information
Details
Impact
Output from the synchronous version of
shell.exec()may be visible to other users on the same system. You may be affected if you executeshell.exec()in multi-user Mac, Linux, or WSL environments, or if you executeshell.exec()as the root user.Other shelljs functions (including the asynchronous version of
shell.exec()) are not impacted.Patches
Patched in shelljs 0.8.5
Workarounds
Recommended action is to upgrade to 0.8.5.
References
https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/
For more information
If you have any questions or comments about this advisory:
Severity
Moderate
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Improper Privilege Management in shelljs
CVE-2022-0144 / GHSA-4rq4-32rv-6wp6
More information
Details
shelljs is vulnerable to Improper Privilege Management
Severity
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
shelljs/shelljs (shelljs)
v0.8.5Compare Source
Full Changelog
This was a small security fix for #1058.
v0.8.4Compare Source
Full Changelog
This was a small security fix for #1058.
v0.8.3Compare Source
Full Changelog
Small patch release to fix a circular dependency warning in node v14. See #973.
v0.8.2Compare Source
Full Changelog
Closed issues:
.to\(file\)does not mute STDIO output #146Merged pull requests:
v0.8.1Compare Source
Full Changelog
Closed issues:
Merged pull requests:
v0.8.0Compare Source
Full Changelog
Closed issues:
Merged pull requests:
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.