Code Monkey home page Code Monkey logo

postie's People

Contributors

aricheux avatar mend-bolt-for-github[bot] avatar philprime avatar pomanks avatar renovate[bot] avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

postie's Issues

Dependency Dashboard

This issue lists Renovate updates and detected dependencies. Read the Dependency Dashboard docs to learn more.

This repository currently has no open or pending branches.

Detected dependencies

bundler
Gemfile
  • jazzy "0.15.1"
github-actions
.github/workflows/build-test.yml
  • actions/checkout v4
  • codecov/codecov-action v4
.github/workflows/codeql.yml
  • actions/checkout v4
  • github/codeql-action v3
  • github/codeql-action v3
  • github/codeql-action v3
.github/workflows/danger.yml
  • actions/checkout v4
  • ghcr.io/danger/danger-swift-with-swiftlint 3.15.0
.github/workflows/documentation.yml
  • actions/checkout v4
  • ruby/setup-ruby v1
.github/workflows/publish_release.yml
  • actions/checkout v4
ruby-version
.ruby-version
  • ruby 3.3.5
swift
Package.swift
  • MaxDesiatov/XMLCoder from: "0.17.1"

  • Check this box to trigger a request for Renovate to run again on this repository

CVE-2021-32740 (High) detected in addressable-2.7.0.gem - autoclosed

CVE-2021-32740 - High Severity Vulnerability

Vulnerable Library - addressable-2.7.0.gem

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. It is flexible, offers heuristic parsing, and additionally provides extensive support for IRIs and URI templates.

Library home page: https://rubygems.org/gems/addressable-2.7.0.gem

Dependency Hierarchy:

  • jazzy-0.13.7.gem (Root Library)
    • cocoapods-1.10.1.gem
      • addressable-2.7.0.gem (Vulnerable Library)

Found in HEAD commit: d650232187aa473f2ebe712121df73b0ecfde0a3

Found in base branch: main

Vulnerability Details

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

Publish Date: 2021-07-06

URL: CVE-2021-32740

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-jxhc-q857-3j6g

Release Date: 2021-07-06

Fix Resolution: addressable - 2.8.0


Step up your Open Source Security Game with WhiteSource here

CVE-2022-24440 (High) detected in cocoapods-downloader-1.5.1.gem - autoclosed

CVE-2022-24440 - High Severity Vulnerability

Vulnerable Library - cocoapods-downloader-1.5.1.gem

Library home page: https://rubygems.org/gems/cocoapods-downloader-1.5.1.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /var/lib/gems/2.5.0/cache/cocoapods-downloader-1.5.1.gem

Dependency Hierarchy:

  • jazzy-0.14.1.gem (Root Library)
    • cocoapods-1.11.2.gem
      • cocoapods-downloader-1.5.1.gem (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

Publish Date: 2022-04-01

URL: CVE-2022-24440

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24440

Release Date: 2022-04-01

Fix Resolution: cocoapods-downloader - 1.6.0,1.6.3


Step up your Open Source Security Game with WhiteSource here

CVE-2022-21223 (High) detected in cocoapods-downloader-1.5.1.gem - autoclosed

CVE-2022-21223 - High Severity Vulnerability

Vulnerable Library - cocoapods-downloader-1.5.1.gem

Library home page: https://rubygems.org/gems/cocoapods-downloader-1.5.1.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /var/lib/gems/2.5.0/cache/cocoapods-downloader-1.5.1.gem

Dependency Hierarchy:

  • jazzy-0.14.1.gem (Root Library)
    • cocoapods-1.11.2.gem
      • cocoapods-downloader-1.5.1.gem (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection.

Publish Date: 2022-04-01

URL: CVE-2022-21223

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21223

Release Date: 2022-04-01

Fix Resolution: cocoapods-downloader - 1.6.2


Step up your Open Source Security Game with WhiteSource here

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.