-
Notifications
You must be signed in to change notification settings - Fork 2
fix(deps): update dependency axios to v1.8.2 [security] - abandoned #138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
* refactor: ♻️ Abstractions made to bot + breadcrumb removed from /dashboard + zenodo callback state rehandle (#130) * wip: 🚧 bot workflow improvements * feat: ✨ abstractions made to main bot file * refactor: ♻️ remove breadcrumb in /dashboard page * refactor: ♻️ url search params are created rather than appended + token data is created once for db calls + url decoding change in zenodo callback * fix: 🐛 cwlObject is not const * fix: 🐛 dont' reassign subjects at end of iterateCommitDetails fn * fix: 🐛 allow fullCodefairRun to trigger * fix: 🐛 add missing scope in zenodo callback * feat: ✨ verify state before redirecting to zenodo * fix: 🐛 refer to correct db instance * refactor: ♻️ two modal states for metadata and license validation * fix: 🐛 final zenodo step state handling + prettier config normalized across bot folder * fix: 🐛 remove return on conditional PR title check * feat: ✨ add loading states to re-validate modals * fix: 🐛 dont update action count after reaching 0 * fix: 🐛 work with deposition drafts + update zenodo api + improve zenodo logging * fix: 🐛 license revalidation patch + update logs during workflow * fix: 🐛 revert last patch and update license re-validation again * fix: 🐛 revert conditional that never happens * merge: 🔀 merge abstractions to staging * fix: 🐛 update imports for abstractions * fix: 🐛 include new directory in Dockerfile * fix: 🐛 correct parameter for getCWLFiles in checkForCompliance fn * docs: 📝 updating changelog * feat: ✨ add badge-maker library * feat: ✨ expose app domain to client * feat: ❇️ add server api and routes to generate doi and redirect to deposition * wip: 🚧 provide doi badge to user * refactor: ♻️ remove lib not being used in file * refactor: ♻️ move log after badge generation
Reviewer's Guide by SourceryThis pull request updates the axios dependency from version 1.7.7 to 1.8.2 to address a security vulnerability (CVE-2025-27152) related to Server-Side Request Forgery (SSRF). The update includes fixes to prevent absolute URLs from bypassing the baseURL, potentially leading to credential leakage and SSRF attacks. No diagrams generated as the changes look simple and do not need a visual representation. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have skipped reviewing this pull request. It seems to have been created by a bot (hey, renovate[bot]!). We assume it knows what it's doing!
Autoclosing SkippedThis PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error. |
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
This PR contains the following updates:
1.7.7
->1.8.2
GitHub Vulnerability Alerts
CVE-2025-27152
Summary
A previously reported issue in axios demonstrated that using protocol-relative URLs could lead to SSRF (Server-Side Request Forgery).
Reference: axios/axios#6463
A similar problem that occurs when passing absolute URLs rather than protocol-relative URLs to axios has been identified. Even if
baseURL
is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios.Details
Consider the following code snippet:
In this example, the request is sent to
http://attacker.test/
instead of thebaseURL
. As a result, the domain owner ofattacker.test
would receive theX-API-KEY
included in the request headers.It is recommended that:
baseURL
is set, passing an absolute URL such ashttp://attacker.test/
toget()
should not ignorebaseURL
.baseURL
with the user-provided parameter), axios should verify that the resulting URL still begins with the expectedbaseURL
.PoC
Follow the steps below to reproduce the issue:
Even though
baseURL
is set tohttp://localhost:10001/
, axios sends the request tohttp://localhost:10002/
.Impact
baseURL
and does not validate path parameters is affected by this issue.Release Notes
axios/axios (axios)
v1.8.2
Compare Source
Bug Fixes
Contributors to this release
v1.8.1
Compare Source
Bug Fixes
generateString
to platform utils to avoid importing crypto module into client builds; (#6789) (36a5a62)Contributors to this release
v1.8.0
Compare Source
Bug Fixes
Features
Reverts
BREAKING CHANGES
code relying on the above will now combine the URLs instead of prefer request URL
feat: add config option for allowing absolute URLs
fix: add default value for allowAbsoluteUrls in buildFullPath
fix: typo in flow control when setting allowAbsoluteUrls
Contributors to this release
1.7.9 (2024-12-04)
Reverts
Contributors to this release
1.7.8 (2024-11-25)
Bug Fixes
globalThis.TextEncoder
when available (#6634) (df956d1)Contributors to this release
1.7.7 (2024-08-31)
Bug Fixes
Contributors to this release
1.7.6 (2024-08-30)
Bug Fixes
Contributors to this release
1.7.5 (2024-08-23)
Bug Fixes
ReferenceError: navigator is not defined
for custom environments; (#6567) (fed1a4b)Contributors to this release
1.7.4 (2024-08-13)
Bug Fixes
Contributors to this release
1.7.3 (2024-08-01)
Bug Fixes
Contributors to this release
1.7.2 (2024-05-21)
Bug Fixes
Contributors to this release
1.7.1 (2024-05-20)
Bug Fixes
Contributors to this release
v1.7.9
Compare Source
Reverts
Contributors to this release
v1.7.8
Compare Source
Bug Fixes
globalThis.TextEncoder
when available (#6634) (df956d1)Contributors to this release
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.