Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade: react, react-dom, jquery, react-router-dom, react-scripts #269

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

Darkon3-1
Copy link
Owner

snyk-top-banner

Snyk has created this PR to upgrade multiple dependencies.

👯‍♂ The following dependencies are linked and will therefore be updated together.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.

Name Versions Released on

react
from 16.8.6 to 16.14.0 | 11 versions ahead of your current version | 4 years ago
on 2020-10-14
react-dom
from 16.8.6 to 16.14.0 | 11 versions ahead of your current version | 4 years ago
on 2020-10-14
jquery
from 3.4.1 to 3.7.1 | 9 versions ahead of your current version | a year ago
on 2023-08-28
react-router-dom
from 5.0.0 to 5.3.4 | 11 versions ahead of your current version | 2 years ago
on 2022-10-02
react-scripts
from 3.0.1 to 3.4.4 | 15 versions ahead of your current version | 4 years ago
on 2020-10-20

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Improper Verification of Cryptographic Signature
SNYK-JS-BROWSERIFYSIGN-6037026
292 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JS-DECODEURICOMPONENT-3149970
292 Proof of Concept
high severity Remote Memory Exposure
SNYK-JS-DNSPACKET-1293563
292 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ACORN-559469
292 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ACORN-559469
292 No Known Exploit
high severity Prototype Pollution
SNYK-JS-AJV-584908
292 No Known Exploit
high severity Arbitrary Code Execution
SNYK-JS-HANDLEBARS-534478
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-MIXINDEEP-450212
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-NODEFORGE-598677
292 Proof of Concept
high severity Arbitrary File Write
SNYK-JS-TAR-1579147
292 No Known Exploit
high severity Arbitrary File Write
SNYK-JS-TAR-1579152
292 No Known Exploit
high severity Cryptographic Issues
SNYK-JS-ELLIPTIC-571484
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-450202
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-567746
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-608086
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-LODASH-6139239
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-MERGEDEEP-1070277
292 No Known Exploit
high severity Prototype Pollution
SNYK-JS-INI-1048974
292 Proof of Concept
high severity Server-side Request Forgery (SSRF)
SNYK-JS-IP-6240864
292 Proof of Concept
high severity Improper Input Validation
SNYK-JS-FOLLOWREDIRECTS-6141137
292 Proof of Concept
high severity Remote Code Execution (RCE)
SNYK-JS-HANDLEBARS-1056767
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-HANDLEBARS-469063
292 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JS-HANDLEBARS-480388
292 No Known Exploit
high severity Arbitrary Code Execution
SNYK-JS-ESLINTUTILS-460220
292 No Known Exploit
high severity Asymmetric Resource Consumption (Amplification)
SNYK-JS-BODYPARSER-7926860
292 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-COLORSTRING-1082939
292 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-DOTPROP-543489
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PROMPTS-1729737
292 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-HANDLEBARS-567742
292 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-HAPIHOEK-548452
292 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-HOSTEDGITINFO-1088355
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-HTMLMINIFIER-3091181
292 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-MINIMIST-559764
292 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-MINIMIST-559764
292 Proof of Concept
medium severity Cryptographic Issues
SNYK-JS-ELLIPTIC-1064899
292 No Known Exploit
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-6444610
292 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-HANDLEBARS-1279029
292 Proof of Concept
medium severity Information Exposure
SNYK-JS-EVENTSOURCE-2823375
292 Proof of Concept
medium severity Open Redirect
SNYK-JS-EXPRESS-6474509
292 No Known Exploit
low severity Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
292 Proof of Concept
low severity Regular Expression Denial of Service (ReDoS)
npm:debug:20170905
292 Proof of Concept
critical severity Prototype Pollution
SNYK-JS-HANDLEBARS-534988
292 No Known Exploit
medium severity Command Injection
SNYK-JS-NODENOTIFIER-1035794
292 No Known Exploit
medium severity Timing Attack
SNYK-JS-ELLIPTIC-511941
292 No Known Exploit
medium severity Cross-site Scripting
SNYK-JS-EXPRESS-7926867
292 No Known Exploit
medium severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-2332181
292 Proof of Concept
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
292 Proof of Concept
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
292 Proof of Concept
low severity Information Exposure
SNYK-JS-FOLLOWREDIRECTS-2396346
292 No Known Exploit
critical severity Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-7577916
292 Proof of Concept
critical severity Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-7577917
292 Proof of Concept
critical severity Improper Verification of Cryptographic Signature
SNYK-JS-ELLIPTIC-7577918
292 Proof of Concept
critical severity Incomplete List of Disallowed Inputs
SNYK-JS-BABELTRAVERSE-5962462
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-JSONSCHEMA-1920922
292 No Known Exploit
high severity Code Injection
SNYK-JS-LODASH-1040724
292 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-UAPARSERJS-610226
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-SETVALUE-1540541
292 Proof of Concept
high severity Cross-site Scripting (XSS)
SNYK-JS-SERIALIZEJAVASCRIPT-536840
292 No Known Exploit
high severity Arbitrary Code Injection
SNYK-JS-SERIALIZEJAVASCRIPT-570062
292 Proof of Concept
high severity Cross-site Scripting (XSS)
SNYK-JS-SERIALIZEJAVASCRIPT-6056521
292 No Known Exploit
high severity Prototype Pollution
SNYK-JS-SETVALUE-1540541
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-SETVALUE-450213
292 Proof of Concept
high severity Arbitrary File Write
SNYK-JS-TAR-1579155
292 No Known Exploit
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TMPL-1583443
292 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-UAPARSERJS-1023599
292 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-WEBSOCKETEXTENSIONS-570623
292 Proof of Concept
high severity Denial of Service (DoS)
SNYK-JS-WS-7266574
292 Proof of Concept
high severity Denial of Service (DoS)
SNYK-JS-WS-7266574
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-Y18N-1021887
292 Proof of Concept
high severity Improper Input Validation
SNYK-JS-URLPARSE-2407770
292 Proof of Concept
high severity Prototype Pollution
SNYK-JS-SETVALUE-450213
292 Proof of Concept
high severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-SSRI-1246392
292 Proof of Concept
high severity Arbitrary File Overwrite
SNYK-JS-TAR-1536528
292 No Known Exploit
high severity Arbitrary File Overwrite
SNYK-JS-TAR-1536531
292 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ISSVG-1085627
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-ISSVG-1243891
292 Proof of Concept
medium severity Cross-site Scripting (XSS)
SNYK-JS-JQUERY-565129
292 Mature
medium severity Cross-site Scripting (XSS)
SNYK-JS-JQUERY-567880
292 Mature
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-LODASH-1018905
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-UGLIFYJS-1727251
292 No Known Exploit
medium severity Information Exposure
SNYK-JS-NODEFETCH-2342118
292 No Known Exploit
medium severity Denial of Service
SNYK-JS-NODEFETCH-674311
292 No Known Exploit
medium severity Prototype Pollution
SNYK-JS-MINIMIST-559764
292 Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JS-NWSAPI-2841516
292 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHPARSE-1077067
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHTOREGEXP-7925106
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-PATHTOREGEXP-7925106
292 Proof of Concept
medium severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JS-TAR-6476909
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TERSER-2806366
292 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-UAPARSERJS-1072471
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-WS-1296835
292 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-WS-1296835
292 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-YARGSPARSER-560381
292 Proof of Concept
medium severity Prototype Pollution
SNYK-JS-YARGSPARSER-560381
292 Proof of Concept
medium severity Improper Input Validation
SNYK-JS-URLPARSE-1078283
292 No Known Exploit
medium severity Open Redirect
SNYK-JS-URLPARSE-1533425
292 Proof of Concept
medium severity Access Restriction Bypass
SNYK-JS-URLPARSE-2401205
292 Proof of Concept
medium severity Authorization Bypass
SNYK-JS-URLPARSE-2407759
292 Proof of Concept
medium severity Authorization Bypass Through User-Controlled Key
SNYK-JS-URLPARSE-2412697
292 Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JS-SOCKJS-575261
292 Proof of Concept
low severity Validation Bypass
SNYK-JS-KINDOF-537849
292 Proof of Concept
low severity Prototype Pollution
SNYK-JS-MINIMIST-2429795
292 Proof of Concept
low severity Cross-site Scripting
SNYK-JS-SEND-7926862
292 No Known Exploit
low severity Cross-site Scripting
SNYK-JS-SERVESTATIC-7926865
292 No Known Exploit
low severity Regular Expression Denial of Service (ReDoS)
SNYK-JS-TAR-1536758
292 No Known Exploit
Release notes
Package name: react from react GitHub release notes
Package name: react-dom from react-dom GitHub release notes
Package name: jquery from jquery GitHub release notes
Package name: react-router-dom
  • 5.3.4 - 2022-10-02
  • 5.3.3 - 2022-05-18
  • 5.3.2 - 2022-05-17
  • 5.3.1 - 2022-04-17
  • 5.3.0 - 2021-09-03
  • 5.2.1 - 2021-08-27
  • 5.2.0 - 2020-05-11
  • 5.1.2 - 2019-09-30
  • 5.1.1 - 2019-09-27
  • 5.1.0 - 2019-09-24
  • 5.0.1 - 2019-06-04
  • 5.0.0 - 2019-03-18
from react-router-dom GitHub release notes
Package name: react-scripts
  • 3.4.4 - 2020-10-20
  • 3.4.3 - 2020-08-12
  • 3.4.2 - 2020-08-11
  • 3.4.1 - 2020-03-21
  • 3.4.0 - 2020-02-14
  • 3.3.1 - 2020-01-31
  • 3.3.0 - 2019-12-05
  • 3.3.0-next.80 - 2019-12-04
  • 3.3.0-next.62 - 2019-11-14
  • 3.3.0-next.39 - 2019-10-24
  • 3.3.0-next.38 - 2019-10-24
  • 3.2.0 - 2019-10-03
  • 3.1.2 - 2019-09-19
  • 3.1.1 - 2019-08-13
  • 3.1.0 - 2019-08-09
  • 3.0.1 - 2019-05-08
from react-scripts GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"react","from":"16.8.6","to":"16.14.0"},{"name":"react-dom","from":"16.8.6","to":"16.14.0"},{"name":"jquery","from":"3.4.1","to":"3.7.1"},{"name":"react-router-dom","from":"5.0.0","to":"5.3.4"},{"name":"react-scripts","from":"3.0.1","to":"3.4.4"}],"env":"prod","hasFixes":true,"isBreakingChange":false,"isMajorUpgrade":false,"issuesToFix":[{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-BROWSERIFYSIGN-6037026","issue_id":"SNYK-JS-BROWSERIFYSIGN-6037026","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Improper Verification of Cryptographic Signature"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-DECODEURICOMPONENT-3149970","issue_id":"SNYK-JS-DECODEURICOMPONENT-3149970","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-DNSPACKET-1293563","issue_id":"SNYK-JS-DNSPACKET-1293563","priority_score":385,"priority_score_factors":[{"type":"cvssScore","label":"7.7","score":385},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Remote Memory Exposure"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-ACORN-559469","issue_id":"SNYK-JS-ACORN-559469","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-ACORN-559469","issue_id":"SNYK-JS-ACORN-559469","priority_score":375,"priority_score_factors":[{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Regular Expression Denial of Service (ReDoS)"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-AJV-584908","issue_id":"SNYK-JS-AJV-584908","priority_score":405,"priority_score_factors":[{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-HANDLEBARS-534478","issue_id":"SNYK-JS-HANDLEBARS-534478","priority_score":512,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"8.1","score":405},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary Code Execution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-MIXINDEEP-450212","issue_id":"SNYK-JS-MIXINDEEP-450212","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-NODEFORGE-598677","issue_id":"SNYK-JS-NODEFORGE-598677","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579147","issue_id":"SNYK-JS-TAR-1579147","priority_score":425,"priority_score_factors":[{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-TAR-1579152","issue_id":"SNYK-JS-TAR-1579152","priority_score":425,"priority_score_factors":[{"type":"cvssScore","label":"8.5","score":425},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Arbitrary File Write"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-ELLIPTIC-571484","issue_id":"SNYK-JS-ELLIPTIC-571484","priority_score":492,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.7","score":385},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Cryptographic Issues"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-450202","issue_id":"SNYK-JS-LODASH-450202","priority_score":686,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-567746","issue_id":"SNYK-JS-LODASH-567746","priority_score":731,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"8.2","score":410},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-608086","issue_id":"SNYK-JS-LODASH-608086","priority_score":472,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-LODASH-6139239","issue_id":"SNYK-JS-LODASH-6139239","priority_score":482,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"cvssScore","label":"7.5","score":375},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"no-known-exploit","id":"SNYK-JS-MERGEDEEP-1070277","issue_id":"SNYK-JS-MERGEDEEP-1070277","priority_score":376,"priority_score_factors":[{"type":"exploit","label":"Unproven","score":11},{"type":"cvssScore","label":"7.3","score":365},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Prototype Pollution"},{"exploit_maturity":"proof-of-concept","id":"SNYK-JS-INI-1048974","issue_id":"S...

Snyk has created this PR to upgrade:
  - react from 16.8.6 to 16.14.0.
    See this package in npm: https://www.npmjs.com/package/react
  - react-dom from 16.8.6 to 16.14.0.
    See this package in npm: https://www.npmjs.com/package/react-dom
  - jquery from 3.4.1 to 3.7.1.
    See this package in npm: https://www.npmjs.com/package/jquery
  - react-router-dom from 5.0.0 to 5.3.4.
    See this package in npm: https://www.npmjs.com/package/react-router-dom
  - react-scripts from 3.0.1 to 3.4.4.
    See this package in npm: https://www.npmjs.com/package/react-scripts

See this project in Snyk:
https://app.snyk.io/org/david.silva.lee/project/9b31ddc1-ee07-468a-81fc-713812d73f7b?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants