-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency open to v6 [SECURITY] #9
base: master
Are you sure you want to change the base?
Conversation
Micro-Learning Topic: OS command injection (Detected by phrase)In many situations, applications will rely on OS provided functions, scripts, macros and utilities instead of reimplementing them in code. While functions would typically be accessed through a native interface library, the remaining three OS provided features will normally be invoked via the command line or launched as a process. If unsafe inputs are used to construct commands or arguments, it may allow arbitrary OS operations to be performed that can compromise the server. Try this challenge in Secure Code Warrior |
Micro-Learning Topic: OS command injection (Detected by phrase)Matched on "command injection"In many situations, applications will rely on OS provided functions, scripts, macros and utilities instead of reimplementing them in code. While functions would typically be accessed through a native interface library, the remaining three OS provided features will normally be invoked via the command line or launched as a process. If unsafe inputs are used to construct commands or arguments, it may allow arbitrary OS operations to be performed that can compromise the server. Try this challenge in Secure Code Warrior |
1 similar comment
Micro-Learning Topic: OS command injection (Detected by phrase)Matched on "command injection"In many situations, applications will rely on OS provided functions, scripts, macros and utilities instead of reimplementing them in code. While functions would typically be accessed through a native interface library, the remaining three OS provided features will normally be invoked via the command line or launched as a process. If unsafe inputs are used to construct commands or arguments, it may allow arbitrary OS operations to be performed that can compromise the server. Try this challenge in Secure Code Warrior |
485e7b0
to
7a78623
Compare
7a78623
to
74b0eb9
Compare
74b0eb9
to
f056ee0
Compare
f056ee0
to
e4abf51
Compare
e4abf51
to
f5f03b9
Compare
f5f03b9
to
f30e410
Compare
f30e410
to
f0e23d9
Compare
f0e23d9
to
8f95112
Compare
8f95112
to
c679901
Compare
c679901
to
9e89409
Compare
9e89409
to
059e032
Compare
059e032
to
5c2457f
Compare
2e3dfac
to
bfac01e
Compare
bfac01e
to
b488d23
Compare
b488d23
to
dbb2840
Compare
dbb2840
to
6597744
Compare
6597744
to
d85c324
Compare
d85c324
to
991cc92
Compare
991cc92
to
167ad02
Compare
167ad02
to
4a039fd
Compare
4a039fd
to
bed75b3
Compare
bed75b3
to
32f649c
Compare
32f649c
to
aace5aa
Compare
aace5aa
to
a951bb5
Compare
a951bb5
to
76acf5b
Compare
76acf5b
to
77aa77a
Compare
This PR contains the following updates:
~0.0.4
->~6.0.0
GitHub Vulnerability Alerts
GHSA-28xh-wpgr-7fm8
Versions of
open
before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in.The package does come with the following warning in the readme:
Recommendation
open
is now the deprecatedopn
package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability.Release Notes
sindresorhus/open (open)
v6.0.0
Breaking:
opn
toopen
(See the readme for more info)eca88d8
wait
optionfalse
by defaultda2d663
5c525b5
Enhancements:
b30220c
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.