-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency mongoose to v8 [security] #654
base: develop
Are you sure you want to change the base?
Conversation
581f43e
to
04dcc3a
Compare
1d6c923
to
db0b44e
Compare
db0b44e
to
9cbfe3f
Compare
e4abe3d
to
a5ae4b5
Compare
a5ae4b5
to
3bd6186
Compare
⚠ Artifact update problemRenovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is. ♻ Renovate will retry this branch, including artifacts, only when one of the following happens:
The artifact failure details are included below: File name: package-lock.json
|
|
3bd6186
to
286b278
Compare
286b278
to
81f5549
Compare
This PR contains the following updates:
5.12.13
->8.8.3
GitHub Vulnerability Alerts
CVE-2022-2564
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()
function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.CVE-2023-3696
Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.3, 6.11.3, and 5.13.20.
CVE-2022-24304
Description
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment.
Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()
function is vulnerable to prototype pollution when setting theschema
object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.Proof of Concept
Impact
This vulnerability can be manipulated to exploit other types of attacks, such as Denial of service (DoS), Remote Code Execution, or Property Injection.
CVE-2024-53900
Mongoose before 8.8.3 can improperly use $where in match.
Release Notes
Automattic/mongoose (mongoose)
v8.8.3
Compare Source
==================
v8.8.2
Compare Source
==================
v8.8.1
Compare Source
==================
v8.8.0
Compare Source
==================
__v
to lean() result type and ModifyResult #14990 #12959v8.7.3
Compare Source
==================
v8.7.2
Compare Source
==================
v8.7.1
Compare Source
==================
v8.7.0
Compare Source
==================
v8.6.4
Compare Source
==================
v8.6.3
Compare Source
==================
v8.6.2
Compare Source
==================
v8.6.1
Compare Source
==================
v8.6.0
Compare Source
==================
MongooseError
instead ofMongoCursorExhaustedError
#14813v8.5.5
Compare Source
==================
v8.5.4
Compare Source
==================
v8.5.3
Compare Source
==================
lean()
set #14799 #14794 #14759 MohOrabyv8.5.2
Compare Source
==================
v8.5.1
Compare Source
==================
v8.5.0
Compare Source
==================
v8.4.5
Compare Source
==================
v8.4.4
Compare Source
==================
v8.4.3
Compare Source
==================
v8.4.2
Compare Source
==================
v8.4.1
Compare Source
==================
v8.4.0
Compare Source
==================
v8.3.5
Compare Source
==================
v8.3.4
Compare Source
==================
#14546 #14536
v8.3.3
Compare Source
==================
v8.3.2
Compare Source
==================
v8.3.1
Compare Source
==================
v8.3.0
Compare Source
==================
v8.2.4
Compare Source
==================
v8.2.3
Compare Source
==================
v8.2.2
Compare Source
==================
v8.2.1
Compare Source
==================
v8.2.0
Compare Source
==================
hydratedPopulatedDocs
option to make hydrate recursively hydrate populated docs #14352 #4727v8.1.3
Compare Source
==================
toObject.versionKey
set to false #14344v8.1.2
Compare Source
==================
createCollections()
#14295 #14279v8.1.1
Compare Source
==================
v8.1.0
Compare Source
==================
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.