-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency passport to ~0.6.0 [SECURITY] #24
base: master
Are you sure you want to change the base?
Conversation
cb489c3
to
ed3f438
Compare
Micro-Learning Topic: Cross-site scripting (Detected by phrase)Matched on "cross-site scripting"Cross-site scripting vulnerabilities occur when unescaped input is rendered into a page displayed to the user. When HTML or script is included in the input, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Race condition (Detected by phrase)Matched on "race condition"A race condition is a flaw that produces an unexpected result when the timing of actions impact other actions. Try a challenge in Secure Code Warrior |
1 similar comment
Micro-Learning Topic: Cross-site scripting (Detected by phrase)Matched on "cross-site scripting"Cross-site scripting vulnerabilities occur when unescaped input is rendered into a page displayed to the user. When HTML or script is included in the input, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Race condition (Detected by phrase)Matched on "race condition"A race condition is a flaw that produces an unexpected result when the timing of actions impact other actions. Try a challenge in Secure Code Warrior |
ed3f438
to
05cb669
Compare
05cb669
to
3d014c4
Compare
861bfd4
to
7b2b686
Compare
b2493b3
to
10c9672
Compare
10c9672
to
a3fa477
Compare
a3fa477
to
e2d3108
Compare
72b5a1e
to
1cea614
Compare
f9e275d
to
bdd77aa
Compare
bdd77aa
to
a3c90ea
Compare
a9fa5e1
to
1abc0e0
Compare
1abc0e0
to
2e1b673
Compare
2e1b673
to
65528bc
Compare
65528bc
to
4f013b3
Compare
a9d499f
to
6009a3a
Compare
6009a3a
to
ef2745c
Compare
c6398fe
to
595b439
Compare
595b439
to
e786712
Compare
e786712
to
4f3325c
Compare
4f3325c
to
e12e00f
Compare
e12e00f
to
a414f91
Compare
a414f91
to
777e5e7
Compare
777e5e7
to
ea11976
Compare
This PR contains the following updates:
~0.3.0
->~0.6.0
GitHub Vulnerability Alerts
CVE-2022-25896
This affects the package passport before 0.6.0. When a user logs in or logs out, the session is regenerated instead of being closed.
Release Notes
jaredhanson/passport (passport)
v0.6.0
Compare Source
Added
authenticate()
,req#login
, andreq#logout
accept akeepSessionInfo: true
option to keep session information after regeneratingthe session.
Changed
req#login()
andreq#logout()
regenerate the the session and clear sessioninformation by default.
req#logout()
is now an asynchronous function and requires a callbackfunction as the last argument.
Security
physical access to the same system or the application is susceptible to
cross-site scripting (XSS).
v0.5.3
Compare Source
Fixed
initialize()
middleware extends request withlogin()
,logIn()
,logout()
,logOut()
,isAuthenticated()
, andisUnauthenticated()
functionsagain, reverting change from 0.5.1.
v0.5.2
Compare Source
Fixed
passport@0.4.x
or earlier (such aspassport-azure-ad
), which werebroken by the removal of private variables in
passport@0.5.1
.v0.5.1
Compare Source
Added
available.
Changed
authenticate()
middleware, rather thaninitialize()
middleware, extendsrequest with
login()
,logIn()
,logout()
,logOut()
,isAuthenticated()
,and
isUnauthenticated()
functions.v0.5.0
Compare Source
Changed
initialize()
middleware extends request withlogin()
,logIn()
,logout()
,logOut()
,isAuthenticated()
, andisUnauthenticated()
functions.
Removed
login()
,logIn()
,logout()
,logOut()
,isAuthenticated()
, andisUnauthenticated()
functions no longer added tohttp.IncomingMessage.prototype
.Fixed
userProperty
option toinitialize()
middleware only affects the currentrequest, rather than all requests processed via singleton Passport instance,
eliminating a race condition in situations where
initialize()
middleware isused multiple times in an application with
userProperty
set to differentvalues.
v0.4.1
Compare Source
v0.4.0
Compare Source
v0.3.2
Compare Source
v0.3.1
Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.