-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(deps): update dependency sanitize-html to v2.12.1 [security] #6621
Conversation
Hey there and thank you for opening this pull request! 👋 We require pull request titles to follow the Conventional Commits specification and it looks like your proposed title needs to be adjusted. Your PR title is: Details: Unknown scope "deps" found in pull request title "fix(deps): update dependency sanitize-html to v2.12.1 [security]". Scope must match one of: root, api, dashboard, inbound-mail, web, webhook, widget, worker, ws, ee-auth, ee-billing, ee-dal, ee-shared-services, ee-translation, application-generic, automation, dal, design-system, embed, notifications, novui, testing, client, framework, headless, js, nest, nextjs, node, notification-center, novu, providers, react, react-native, shared, stateless, nestjs, nextjs. |
✅ Deploy Preview for novu-stg-vite-dashboard-poc ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
a3f1d19
to
4651570
Compare
4651570
to
f8f7d24
Compare
f8f7d24
to
a382523
Compare
a382523
to
0c1652f
Compare
0c1652f
to
ce12963
Compare
ce12963
to
999b230
Compare
999b230
to
6cf09d1
Compare
81722ee
to
e869330
Compare
ab7198d
to
576087b
Compare
576087b
to
b7157ee
Compare
b7157ee
to
3085fe2
Compare
3085fe2
to
ed7ca8c
Compare
ed7ca8c
to
6e63813
Compare
This PR contains the following updates:
2.10.0
->2.12.1
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2024-21501
Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
Release Notes
apostrophecms/sanitize-html (sanitize-html)
v2.12.1
Compare Source
post-css
. This fixes a vulnerability in which information about the existence or non-existence of files on a server could be disclosed via properly crafted HTML input when thestyle
attribute is allowed by the configuration. Thanks to the Snyk Security team for the disclosure and to Dylan Armstrong for the fix.v2.12.0
Compare Source
Introduced the
allowedEmptyAttributes
option, enabling explicit specification of empty string values for select attributes, with the default attribute set toalt
. Thanks to Na for the contribution.Clarified the use of SVGs with a new test and changes to documentation. Thanks to Gauav Kumar for the contribution.
Do not process source maps when processing style tags with PostCSS.
v2.11.0
Compare Source
false
inallowedClasses
attributes. Thanks to Kevin Jiang for this fix!.idea
temp files to.gitignore
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.