Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade ipfs-http-client from 47.0.1 to 57.0.3 #32

Merged
merged 2 commits into from
Sep 28, 2022

Conversation

MarcelRaschke
Copy link
Member

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade ipfs-http-client from 47.0.1 to 57.0.3.

merge advice
ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


Warning: This is a major version upgrade, and may be a breaking change.

  • The recommended version is 240 versions ahead of your current version.
  • The recommended version was released 2 months ago, on 2022-06-24.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Prototype Pollution
SNYK-JS-Y18N-1021887
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Arbitrary File Write
SNYK-JS-TAR-1579155
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Write
SNYK-JS-TAR-1579152
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Write
SNYK-JS-TAR-1579147
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Overwrite
SNYK-JS-TAR-1536531
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Overwrite
SNYK-JS-TAR-1536528
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Write
SNYK-JS-TAR-1579155
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Write
SNYK-JS-TAR-1579152
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Write
SNYK-JS-TAR-1579147
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Overwrite
SNYK-JS-TAR-1536531
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Arbitrary File Overwrite
SNYK-JS-TAR-1536528
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Remote Code Execution (RCE)
SNYK-JS-SHELLQUOTE-1766506
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Improper Privilege Management
SNYK-JS-SHELLJS-2332187
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVERREGEX-1585624
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVERREGEX-1584358
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-MERGEDEEP-1070277
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-JSONSCHEMA-1920922
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-I18NEXT-1065979
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Remote Code Execution (RCE)
SNYK-JS-EJS-2803307
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-ASYNC-2441827
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-ASYNC-2441827
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-AJV-584908
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-WS-1296835
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVERREGEX-2824151
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-SEMVERREGEX-1047770
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-PATHVAL-596926
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHPARSE-1077067
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Information Exposure
SNYK-JS-NODEFETCH-2342118
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Information Exposure
SNYK-JS-NANOID-2332193
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-I18NEXT-585930
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Buffer Overflow
SNYK-JS-I18NEXT-575536
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-HAPISTATEHOOD-2769251
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-FLAT-596927
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Arbitrary Code Injection
SNYK-JS-EJS-1049328
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-COLORSTRING-1082939
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JS-TAR-1536758
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-TAR-1536758
472/1000
Why? Proof of Concept exploit, CVSS 7.3
No Known Exploit
Prototype Pollution
SNYK-JS-MINIMIST-2429795
472/1000
Why? Proof of Concept exploit, CVSS 7.3
Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Release notes
Package name: ipfs-http-client
  • 57.0.3 - 2022-06-24

    Bug Fixes

  • 57.0.3-00bd3dd0.0 - 2022-06-24
  • 57.0.2 - 2022-06-23
  • 57.0.2-7be50bd1.0 - 2022-06-22
  • 57.0.2-70e142ac.0 - 2022-06-13
  • 57.0.1 - 2022-06-01
  • 57.0.1-ddfb899f.0 - 2022-05-30
  • 57.0.1-be025c89.0 - 2022-06-01
  • 57.0.1-87e00a69.0 - 2022-06-01
  • 57.0.1-764b4adc.0 - 2022-06-01
  • 57.0.0 - 2022-05-30
  • 56.0.4-919b27a8.0 - 2022-05-27
  • 56.0.4-7165bf71.0 - 2022-05-16
  • 56.0.4-4e93dd5d.0 - 2022-05-27
  • 56.0.3 - 2022-04-26
  • 56.0.3-e90b8f13.0 - 2022-04-05
  • 56.0.3-8f7ce23c.0 - 2022-04-20
  • 56.0.2 - 2022-04-05
  • 56.0.2-df1bd1bb.0 - 2022-03-01
  • 56.0.2-125d42ba.0 - 2022-03-01
  • 56.0.2-1082fce9.0 - 2022-02-18
  • 56.0.1 - 2022-02-07
  • 56.0.1-8d260215.0 - 2022-01-27
  • 56.0.1-709831f6.0 - 2022-02-06
  • 56.0.1-3a74c110.0 - 2022-02-04
  • 56.0.1-3a5d61d4.0 - 2022-01-27
  • 56.0.1-383dc07d.0 - 2022-02-04
  • 56.0.1-2c8ec080.0 - 2022-01-28
  • 56.0.1-2afef2eb.0 - 2022-01-27
  • 56.0.0 - 2022-01-27
  • 55.0.1-rc.5 - 2022-01-21
  • 55.0.1-rc.4 - 2022-01-20
  • 55.0.1-rc.3 - 2022-01-13
  • 55.0.1-rc.2 - 2021-12-17
  • 55.0.1-rc.1 - 2021-12-16
  • 55.0.1-rc.0 - 2021-12-15
  • 55.0.1-fbe14923.0 - 2022-01-27
  • 55.0.1-cca6e321.0 - 2022-01-27
  • 55.0.1-a6b201af.0 - 2022-01-27
  • 55.0.1-7fe0da57f.0 - 2022-01-26
  • 55.0.1-6cb3a87e.0 - 2022-01-27
  • 55.0.1-5439a0e.0 - 2022-01-26
  • 55.0.0 - 2021-12-15
  • 54.0.3-rc.13 - 2021-12-15
  • 54.0.3-rc.12 - 2021-12-15
  • 54.0.3-rc.11 - 2021-12-15
  • 54.0.3-rc.10 - 2021-12-15
  • 54.0.3-rc.9 - 2021-12-13
  • 54.0.3-rc.8 - 2021-12-13
  • 54.0.3-rc.7 - 2021-12-06
  • 54.0.3-rc.6 - 2021-12-06
  • 54.0.3-rc.5 - 2021-12-06
  • 54.0.3-rc.4 - 2021-12-03
  • 54.0.3-rc.3 - 2021-12-03
  • 54.0.3-rc.2 - 2021-12-03
  • 54.0.3-rc.1 - 2021-12-03
  • 54.0.3-rc.0 - 2021-11-24
  • 54.0.2 - 2021-11-24
  • 54.0.2-rc.3 - 2021-11-24
  • 54.0.2-rc.2 - 2021-11-22
  • 54.0.2-rc.1 - 2021-11-19
  • 54.0.2-rc.0 - 2021-11-19
  • 54.0.1 - 2021-11-19
  • 54.0.1-rc.1 - 2021-11-19
  • 54.0.1-rc.0 - 2021-11-12
  • 54.0.0 - 2021-11-12
  • 53.0.2-rc.6 - 2021-11-12
  • 53.0.2-rc.5 - 2021-11-04
  • 53.0.2-rc.4 - 2021-10-08
  • 53.0.2-rc.3 - 2021-10-02
  • 53.0.2-rc.2 - 2021-09-30
  • 53.0.2-rc.1 - 2021-09-30
  • 53.0.2-rc.0 - 2021-09-28
  • 53.0.1 - 2021-09-28
  • 53.0.1-rc.5 - 2021-09-28
  • 53.0.1-rc.3 - 2021-09-27
  • 53.0.1-rc.2 - 2021-09-25
  • 53.0.1-rc.1 - 2021-09-25
  • 53.0.1-rc.0 - 2021-09-24
  • 53.0.0 - 2021-09-24
  • 52.0.6-rc.18 - 2021-09-24
  • 52.0.6-rc.17 - 2021-09-24
  • 52.0.6-rc.16 - 2021-09-23
  • 52.0.6-rc.15 - 2021-09-23
  • 52.0.6-rc.14 - 2021-09-23
  • 52.0.6-rc.13 - 2021-09-23
  • 52.0.6-rc.12 - 2021-09-23
  • 52.0.6-rc.1 - 2021-09-21
  • 52.0.6-rc.0 - 2021-09-17
  • 52.0.5 - 2021-09-17
  • 52.0.5-rc.0 - 2021-09-17
  • 52.0.4 - 2021-09-17
  • 52.0.4-rc.11 - 2021-09-17
  • 52.0.4-rc.8 - 2021-09-14
  • 52.0.4-rc.5 - 2021-09-08
  • 52.0.4-rc.4 - 2021-09-07
  • 52.0.4-rc.2 - 2021-09-06
  • 52.0.4-rc.1 - 2021-09-06
  • 52.0.3 - 2021-09-02
  • 52.0.3-rc.8 - 2021-09-02
  • 52.0.3-rc.7 - 2021-09-02
  • 52.0.3-rc.6 - 2021-08-31
  • 52.0.3-rc.5 - 2021-08-26
  • 52.0.3-rc.4 - 2021-08-26
  • 52.0.3-rc.3 - 2021-08-26
  • 52.0.3-rc.2 - 2021-08-26
  • 52.0.2 - 2021-08-25
  • 52.0.2-rc.7 - 2021-08-25
  • 52.0.2-rc.6 - 2021-08-25
  • 52.0.2-rc.4 - 2021-08-17
  • 52.0.2-rc.1 - 2021-08-17
  • 52.0.1 - 2021-08-17
  • 52.0.1-rc.10 - 2021-08-17
  • 52.0.1-rc.9 - 2021-08-17
  • 52.0.1-rc.7 - 2021-08-16
  • 52.0.1-rc.6 - 2021-08-12
  • 52.0.1-rc.5 - 2021-08-12
  • 52.0.1-rc.4 - 2021-08-12
  • 52.0.0 - 2021-08-11
  • 51.0.2-rc.11 - 2021-08-11
  • 51.0.2-rc.10 - 2021-08-10
  • 51.0.2-rc.8 - 2021-08-10
  • 51.0.2-rc.6 - 2021-08-09
  • 51.0.2-rc.3 - 2021-08-05
  • 51.0.2-rc.2 - 2021-08-04
  • 51.0.2-rc.1 - 2021-07-30
  • 51.0.1 - 2021-07-30
  • 51.0.1-rc.7 - 2021-07-30
  • 51.0.1-rc.5 - 2021-07-28
  • 51.0.1-rc.2 - 2021-07-28
  • 51.0.1-rc.1 - 2021-07-28
  • 51.0.0 - 2021-07-27
  • 50.1.3-rc.17 - 2021-07-27
  • 50.1.3-rc.14 - 2021-07-27
  • 50.1.3-rc.11 - 2021-07-27
  • 50.1.3-rc.9 - 2021-07-27
  • 50.1.3-rc.8 - 2021-07-27
  • 50.1.3-rc.6 - 2021-07-19
  • 50.1.3-rc.3 - 2021-07-01
  • 50.1.3-rc.2 - 2021-06-25
  • 50.1.3-rc.1 - 2021-06-18
  • 50.1.2 - 2021-06-18
  • 50.1.2-rc.4 - 2021-06-18
  • 50.1.2-rc.3 - 2021-06-18
  • 50.1.2-rc.2 - 2021-06-15
  • 50.1.2-rc.1 - 2021-06-10
  • 50.1.1 - 2021-06-05
  • 50.1.1-rc.4 - 2021-06-05
  • 50.1.1-rc.3 - 2021-06-01
  • 50.1.1-rc.1 - 2021-05-26
  • 50.1.0 - 2021-05-26
  • 50.0.1-rc.11 - 2021-05-25
  • 50.0.1-rc.7 - 2021-05-25
  • 50.0.1-rc.6 - 2021-05-13
  • 50.0.1-rc.5 - 2021-05-11
  • 50.0.1-rc.1 - 2021-05-11
  • 50.0.0 - 2021-05-10
  • 49.0.5-rc.32 - 2021-05-10
  • 49.0.5-rc.31 - 2021-05-10
  • 49.0.5-rc.30 - 2021-05-07
  • 49.0.5-rc.29 - 2021-05-07
  • 49.0.5-rc.28 - 2021-05-06
  • 49.0.5-rc.27 - 2021-05-06
  • 49.0.5-rc.26 - 2021-05-04
  • 49.0.5-rc.25 - 2021-05-04
  • 49.0.5-rc.24 - 2021-05-04
  • 49.0.5-rc.22 - 2021-05-04
  • 49.0.5-rc.21 - 2021-05-02
  • 49.0.5-rc.20 - 2021-05-01
  • 49.0.5-rc.19 - 2021-04-30
  • 49.0.5-rc.18 - 2021-04-30
  • 49.0.5-rc.17 - 2021-04-29
  • 49.0.5-rc.14 - 2021-04-28
  • 49.0.5-rc.11 - 2021-04-28
  • 49.0.5-rc.3 - 2021-03-31
  • 49.0.4 - 2021-03-10
  • 49.0.3 - 2021-03-09
  • 49.0.3-rc.5 - 2021-02-22
  • 49.0.3-rc.4 - 2021-02-21
  • 49.0.2 - 2021-02-08
  • 49.0.1 - 2021-02-02
  • 49.0.0 - 2021-02-01
  • 48.2.3-rc.3 - 2021-01-30
  • 48.2.2 - 2021-01-22
  • 48.2.1 - 2021-01-20
  • 48.2.0 - 2021-01-15
  • 48.1.4-rc.6 - 2021-01-15
  • 48.1.4-rc.5 - 2021-01-13
  • 48.1.4-rc.4 - 2020-12-18
  • 48.1.4-rc.1 - 2020-12-18
  • 48.1.3 - 2020-12-16
  • 48.1.3-rc.13 - 2020-12-14
  • 48.1.3-rc.11 - 2020-12-05
  • 48.1.3-rc.8 - 2020-12-03
  • 48.1.3-rc.7 - 2020-12-03
  • 48.1.3-rc.4 - 2020-11-26
  • 48.1.3-rc.3 - 2020-11-26
  • 48.1.3-rc.2 - 2020-11-26
  • 48.1.3-rc.1 - 2020-11-26
  • 48.1.2 - 2020-11-25
  • 48.1.2-rc.8 - 2020-11-25
  • 48.1.2-rc.6 - 2020-11-20
  • 48.1.2-rc.3 - 2020-11-18
  • 48.1.2-rc.2 - 2020-11-16
  • 48.1.1 - 2020-11-16
  • 48.1.1-rc.8 - 2020-11-16
  • 48.1.1-rc.7 - 2020-11-16
  • 48.1.1-rc.5 - 2020-11-13
  • 48.1.1-rc.3 - 2020-11-12
  • 48.1.1-rc.1 - 2020-11-10
  • 48.1.0 - 2020-11-09
  • 48.0.1-rc.13 - 2020-11-09
  • 48.0.1-rc.12 - 2020-11-09
  • 48.0.1-rc.10 - 2020-11-06
  • 48.0.1-rc.8 - 2020-11-02
  • 48.0.1-rc.6 - 2020-10-30
  • 48.0.1-rc.5 - 2020-10-30
  • 48.0.1-rc.4 - 2020-10-30
  • 48.0.1-rc.2 - 2020-10-28
  • 48.0.0 - 2020-10-28
  • 47.0.2-rc.31 - 2020-10-28
  • 47.0.2-rc.29 - 2020-10-27
  • 47.0.2-rc.28 - 2020-10-27
  • 47.0.2-rc.26 - 2020-10-27
  • 47.0.2-rc.25 - 2020-10-27
  • 47.0.2-rc.24 - 2020-10-23
  • 47.0.2-rc.22 - 2020-10-22
  • 47.0.2-rc.16 - 2020-10-21
  • 47.0.2-rc.15 - 2020-10-15
  • 47.0.2-rc.14 - 2020-10-15
  • 47.0.2-rc.12 - 2020-10-10
  • 47.0.2-rc.11 - 2020-10-10
  • 47.0.2-rc.10 - 2020-10-06
  • 47.0.2-rc.9 - 2020-10-06
  • 47.0.2-rc.7 - 2020-10-06
  • 47.0.2-rc.6 - 2020-10-05
  • 47.0.2-rc.4 - 2020-09-25
  • 47.0.2-rc.3 - 2020-09-14
  • 47.0.2-rc.2 - 2020-09-11
  • 47.0.2-rc.1 - 2020-09-10
  • 47.0.1 - 2020-09-09
from ipfs-http-client GitHub release notes
Commit messages
Package name: ipfs-http-client
  • 965f5a4 chore: release master (#4146)
  • 00bd3dd fix: make pubsub message types consistent (#4145)
  • c1cbc81 chore: update changelogs (#4144)
  • 5a9039a chore: release master (#4143)
  • 7be50bd fix: use default ws filters instead of connecting to everything (#4142)
  • 0078aad chore: release master (#4132)
  • 70e142a chore: cleanup changelog (#4129)
  • 129ac77 fix: onMessage assignment should be undefined not null (#4131)
  • 92155bc Add .github/workflows/stale.yml
  • 14e506a docs: Added update to packages/ipfs-http-client/README.md for Issue #4072 (#4088)
  • 97430f8 docs: update block api documentation (#4124)
  • 548cfb2 chore: release master (#4121)
  • 87e00a6 chore(deps): bump sinon from 13.0.2 to 14.0.0 (#4105)
  • be025c8 Updates findProvs example (#4114)
  • 764b4ad fix: export ipfs-http-client types (#4120)
  • 6acae1d chore: minor migration guide fixes (#4118)
  • a5856a6 chore: release master (#4113)
  • ddfb899 fix: base64url encode seq no
  • 8eeba69 fix: pad seqno if needed
  • 38e78cc chore: release master (#4099)
  • 919b27a chore: update deps
  • 4e93dd5 fix: update to latest libp2p interfaces (#4111)
  • 7165bf7 docs: add upgrade guide for ESM release (#4098)
  • 74aee8b feat: update to libp2p 0.37.x (#4092)

Compare


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

@MarcelRaschke MarcelRaschke self-assigned this Sep 28, 2022
@MarcelRaschke MarcelRaschke added this to the snyk milestone Sep 28, 2022
@MarcelRaschke MarcelRaschke merged commit 1ee9693 into master Sep 28, 2022
@delete-merged-branch delete-merged-branch bot deleted the snyk-upgrade-48086ea1028ad3b19b5501d4ffd996a0 branch September 28, 2022 23:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

2 participants