Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade socket.io from 2.3.0 to 2.5.0 #28

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

AlbertoCime14
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade socket.io from 2.3.0 to 2.5.0.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 3 versions ahead of your current version.
  • The recommended version was released a year ago, on 2022-06-26.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Denial of Service (DoS)
SNYK-JS-SOCKETIOPARSER-1056752
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Insecure Defaults
SNYK-JS-SOCKETIO-1024859
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Improper Input Validation
SNYK-JS-SOCKETIOPARSER-3091012
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Improper Input Validation
SNYK-JS-SOCKETIOPARSER-3091012
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Denial of Service (DoS)
SNYK-JS-ENGINEIO-3136336
482/1000
Why? Proof of Concept exploit, CVSS 7.5
No Known Exploit
Arbitrary Code Injection
SNYK-JS-XMLHTTPREQUESTSSL-1082936
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Access Restriction Bypass
SNYK-JS-XMLHTTPREQUESTSSL-1255647
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-WS-1296835
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-WS-1296835
482/1000
Why? Proof of Concept exploit, CVSS 7.5
Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Release notes
Package name: socket.io
  • 2.5.0 - 2022-06-26

    ⚠️ WARNING ⚠️

    The default value of the maxHttpBufferSize option has been decreased from 100 MB to 1 MB, in order to prevent attacks by denial of service.

    Security advisory: GHSA-j4f2-536g-r55m

    Bug Fixes

    • fix race condition in dynamic namespaces (05e1278)
    • ignore packet received after disconnection (22d4bdf)
    • only set 'connected' to true after middleware execution (226cc16)
    • prevent the socket from joining a room after disconnection (f223178)

    Links:

  • 2.4.1 - 2021-01-07
  • 2.4.0 - 2021-01-04
  • 2.3.0 - 2019-09-20
from socket.io GitHub release notes
Commit messages
Package name: socket.io
  • baa6804 chore(release): 2.5.0
  • f223178 fix: prevent the socket from joining a room after disconnection
  • 226cc16 fix: only set 'connected' to true after middleware execution
  • 05e1278 fix: fix race condition in dynamic namespaces
  • 22d4bdf fix: ignore packet received after disconnection
  • dfded53 chore: update engine.io version to 3.6.0
  • e6b8697 chore(release): 2.4.1
  • a169050 revert: fix(security): do not allow all origins by default
  • 873fdc5 chore(release): 2.4.0
  • f78a575 fix(security): do not allow all origins by default
  • d33a619 fix: properly overwrite the query sent in the handshake
  • 3951a79 chore: bump engine.io version
  • 6fa026f ci: migrate to GitHub Actions

Compare


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants