Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps-dev): bump werkzeug from 3.0.1 to 3.0.6 #10

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Oct 26, 2024

Bumps werkzeug from 3.0.1 to 3.0.6.

Release notes

Sourced from werkzeug's releases.

3.0.6

This is the Werkzeug 3.0.6 security fix release, which fixes security issues but does not otherwise change behavior and should not result in breaking changes.

PyPI: https://pypi.org/project/Werkzeug/3.0.6/ Changes: https://werkzeug.palletsprojects.com/en/stable/changes/#version-3-0-6

  • Fix how max_form_memory_size is applied when parsing large non-file fields. GHSA-q34m-jh98-gwm2
  • safe_join catches certain paths on Windows that were not caught by ntpath.isabs on Python < 3.11. GHSA-f9vj-2wh5-fj8j

3.0.5

This is the Werkzeug 3.0.5 fix release, which fixes bugs but does not otherwise change behavior and should not result in breaking changes.

PyPI: https://pypi.org/project/Werkzeug/3.0.5/ Changes: https://werkzeug.palletsprojects.com/en/stable/changes/#version-3-0-5 Milestone: https://github.com/pallets/werkzeug/milestone/37?closed=1

  • The Watchdog reloader ignores file closed no write events. #2945
  • Logging works with client addresses containing an IPv6 scope. #2952
  • Ignore invalid authorization parameters. #2955
  • Improve type annotation fore SharedDataMiddleware. #2958
  • Compatibility with Python 3.13 when generating debugger pin and the current UID does not have an associated name. #2957

3.0.4

This is the Werkzeug 3.0.4 fix release, which fixes bugs but does not otherwise change behavior and should not result in breaking changes.

PyPI: https://pypi.org/project/Werkzeug/3.0.4/ Changes: https://werkzeug.palletsprojects.com/en/3.0.x/changes/#version-3-0-4 Milestone: https://github.com/pallets/werkzeug/milestone/36?closed=1

  • Restore behavior where parsing multipart/x-www-form-urlencoded data with invalid UTF-8 bytes in the body results in no form data parsed rather than a 413 error. #2930
  • Improve parse_options_header performance when parsing unterminated quoted string values. #2904
  • Debugger pin auth is synchronized across threads/processes when tracking failed entries. #2916
  • Dev server handles unexpected SSLEOFError due to issue in Python < 3.13. #2926
  • Debugger pin auth works when the URL already contains a query string. #2918

3.0.3

This is the Werkzeug 3.0.3 security release, which fixes security issues and bugs but does not otherwise change behavior and should not result in breaking changes.

PyPI: https://pypi.org/project/Werkzeug/3.0.3/ Changes: https://werkzeug.palletsprojects.com/en/3.0.x/changes/#version-3-0-3 Milestone: https://github.com/pallets/werkzeug/milestone/35?closed=1

  • Only allow localhost, .localhost, 127.0.0.1, or the specified hostname when running the dev server, to make debugger requests. Additional hosts can be added by using the debugger middleware directly. The debugger UI makes requests using the full URL rather than only the path. GHSA-2g68-c3qc-8985
  • Make reloader more robust when "" is in sys.path. #2823

... (truncated)

Changelog

Sourced from werkzeug's changelog.

Version 3.0.6

Released 2024-10-25

  • Fix how max_form_memory_size is applied when parsing large non-file fields. :ghsa:q34m-jh98-gwm2
  • safe_join catches certain paths on Windows that were not caught by ntpath.isabs on Python < 3.11. :ghsa:f9vj-2wh5-fj8j

Version 3.0.5

Released 2024-10-24

  • The Watchdog reloader ignores file closed no write events. :issue:2945
  • Logging works with client addresses containing an IPv6 scope :issue:2952
  • Ignore invalid authorization parameters. :issue:2955
  • Improve type annotation fore SharedDataMiddleware. :issue:2958
  • Compatibility with Python 3.13 when generating debugger pin and the current UID does not have an associated name. :issue:2957

Version 3.0.4

Released 2024-08-21

  • Restore behavior where parsing multipart/x-www-form-urlencoded data with invalid UTF-8 bytes in the body results in no form data parsed rather than a 413 error. :issue:2930
  • Improve parse_options_header performance when parsing unterminated quoted string values. :issue:2904
  • Debugger pin auth is synchronized across threads/processes when tracking failed entries. :issue:2916
  • Dev server handles unexpected SSLEOFError due to issue in Python < 3.13. :issue:2926
  • Debugger pin auth works when the URL already contains a query string. :issue:2918

Version 3.0.3

Released 2024-05-05

  • Only allow localhost, .localhost, 127.0.0.1, or the specified hostname when running the dev server, to make debugger requests. Additional hosts can be added by using the debugger middleware directly. The debugger

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [werkzeug](https://github.com/pallets/werkzeug) from 3.0.1 to 3.0.6.
- [Release notes](https://github.com/pallets/werkzeug/releases)
- [Changelog](https://github.com/pallets/werkzeug/blob/main/CHANGES.rst)
- [Commits](pallets/werkzeug@3.0.1...3.0.6)

---
updated-dependencies:
- dependency-name: werkzeug
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Oct 26, 2024
@wiz-security-bot-22793c4344
Copy link

Wiz Scan Summary

Scan Module Critical High Medium Low Info Total
IaC Misconfigurations 0 0 0 0 0 0
Vulnerabilities 0 5 16 1 2 24
Sensitive Data 0 0 0 0 0 0
Secrets 0 0 0 0 0 0
Total 0 5 16 1 2 24

View scan details in Wiz

To detect these findings earlier in the dev lifecycle, try using Wiz Code VS Code Extension.

@wiz-security-bot-22793c4344
Copy link

Wiz Scan Summary

Scan Module Critical High Medium Low Info Total
IaC Misconfigurations 0 0 0 0 0 0
Vulnerabilities 0 5 16 1 2 24
Sensitive Data 0 0 0 0 0 0
Secrets 0 0 0 0 0 0
Total 0 5 16 1 2 24

View scan details in Wiz

To detect these findings earlier in the dev lifecycle, try using Wiz Code VS Code Extension.

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Wiz Vulnerability Finding

Details

Vulnerabilities [aiohttp:3.9.1]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-23334 Medium GHSA-5h86-8mv2-jq9f 3.9.2 7.5 3.6 true false
CVE-2024-23829 Medium GHSA-8qpw-xqxj-h4r2 3.9.2 6.5 2.5 false false
CVE-2024-27306 Medium GHSA-7gpw-8wmc-pm8g 3.9.4 - - false false
CVE-2024-30251 High GHSA-5m98-qgg9-wh84 3.9.4 - - false false
CVE-2024-42367 Medium GHSA-jwhx-xcg6-8xhj 3.10.2 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Wiz Vulnerability Finding

Details

Vulnerabilities [setuptools:69.0.2]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-6345 High GHSA-cx63-2mw6-8hw5 70.0.0 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [requests:2.31.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-35195 Medium GHSA-9wx4-h78v-vm56 2.32.0 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Wiz Vulnerability Finding

Details

Vulnerabilities [cryptography:41.0.7]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2023-50782 High GHSA-3ww4-gg4f-jr7f 42.0.0 7.5 3.6 false false
CVE-2023-5678 Medium https://data.safetycli.com/v/65510/52d 42.0.0 5.3 1.4 false false
CVE-2023-6129 Medium https://data.safetycli.com/v/65212/52d 42.0.2 6.5 4.2 false false
CVE-2023-6237 None https://data.safetycli.com/v/66777/52d 42.0.2 - - false false
CVE-2024-0727 Medium GHSA-9v9h-cgj8-h64p 42.0.2 5.5 3.6 false false
CVE-2024-2511 None https://data.safetycli.com/v/71684/52d 42.0.6 - - false false
CVE-2024-26130 High GHSA-6vqw-3v5j-54x4 42.0.4 - - false false
CVE-2024-4603 Medium https://data.safetycli.com/v/71681/52d 42.0.8 - - false false
GHSA-h4gh-qq45-vh27 Medium GHSA-h4gh-qq45-vh27 43.0.1 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [aws-sam-cli:1.105.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
GHSA-rjc6-vm4h-85cg Medium GHSA-rjc6-vm4h-85cg 1.122.0 4.8 - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [idna:3.6]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-3651 Medium GHSA-jjg7-2v4v-x38h 3.7.0 7.5 3.6 false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [urllib3:2.0.7]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-37891 Medium GHSA-34jh-p97f-mpxf 2.2.2 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Wiz Vulnerability Finding

Details

Vulnerabilities [py:1.11.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2022-42969 High GHSA-w596-4wvx-j9j6 - 7.5 3.6 true false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [black:23.12.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-21503 Medium GHSA-fj7x-q9j7-g6q6 24.3.0 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [jinja2:3.1.2]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-22195 Medium GHSA-h5c8-rqwp-cp95 3.1.3 6.1 2.7 false false
CVE-2024-34064 Medium GHSA-h75v-3vvj-5mfj 3.1.4 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [aws-sam-cli:1.105.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
GHSA-rjc6-vm4h-85cg Medium GHSA-rjc6-vm4h-85cg 1.122.0 4.8 - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Wiz Vulnerability Finding

Details

Vulnerabilities [py:1.11.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2022-42969 High GHSA-w596-4wvx-j9j6 - 7.5 3.6 true false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [urllib3:2.0.7]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-37891 Medium GHSA-34jh-p97f-mpxf 2.2.2 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [idna:3.6]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-3651 Medium GHSA-jjg7-2v4v-x38h 3.7.0 7.5 3.6 false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [requests:2.31.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-35195 Medium GHSA-9wx4-h78v-vm56 2.32.0 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Wiz Vulnerability Finding

Details

Vulnerabilities [setuptools:69.0.2]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-6345 High GHSA-cx63-2mw6-8hw5 70.0.0 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Wiz Vulnerability Finding

Details

Vulnerabilities [cryptography:41.0.7]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2023-50782 High GHSA-3ww4-gg4f-jr7f 42.0.0 7.5 3.6 false false
CVE-2023-5678 Medium https://data.safetycli.com/v/65510/52d 42.0.0 5.3 1.4 false false
CVE-2023-6129 Medium https://data.safetycli.com/v/65212/52d 42.0.2 6.5 4.2 false false
CVE-2023-6237 None https://data.safetycli.com/v/66777/52d 42.0.2 - - false false
CVE-2024-0727 Medium GHSA-9v9h-cgj8-h64p 42.0.2 5.5 3.6 false false
CVE-2024-2511 None https://data.safetycli.com/v/71684/52d 42.0.6 - - false false
CVE-2024-26130 High GHSA-6vqw-3v5j-54x4 42.0.4 - - false false
CVE-2024-4603 Medium https://data.safetycli.com/v/71681/52d 42.0.8 - - false false
GHSA-h4gh-qq45-vh27 Medium GHSA-h4gh-qq45-vh27 43.0.1 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Wiz Vulnerability Finding

Details

Vulnerabilities [aiohttp:3.9.1]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-23334 Medium GHSA-5h86-8mv2-jq9f 3.9.2 7.5 3.6 true false
CVE-2024-23829 Medium GHSA-8qpw-xqxj-h4r2 3.9.2 6.5 2.5 false false
CVE-2024-27306 Medium GHSA-7gpw-8wmc-pm8g 3.9.4 - - false false
CVE-2024-30251 High GHSA-5m98-qgg9-wh84 3.9.4 - - false false
CVE-2024-42367 Medium GHSA-jwhx-xcg6-8xhj 3.10.2 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [black:23.12.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-21503 Medium GHSA-fj7x-q9j7-g6q6 24.3.0 - - false false

@@ -1,4 +1,4 @@
# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand.
# This file is automatically @generated by Poetry 1.8.3 and should not be changed by hand.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Medium Wiz Vulnerability Finding

Details

Vulnerabilities [jinja2:3.1.2]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-22195 Medium GHSA-h5c8-rqwp-cp95 3.1.3 6.1 2.7 false false
CVE-2024-34064 Medium GHSA-h75v-3vvj-5mfj 3.1.4 - - false false

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants