Skip to content

Conversation

@campaigner-prod
Copy link

Summary: Critical-severity security update — 3 packages upgraded (MINOR changes included)

Manifests changed:

  • php/Laravel57 (npm)

Updates

Package From To Type Vulnerabilities Fixed
lodash 4.17.5 4.17.21 patch 1 CRITICAL, 3 HIGH, 2 MODERATE
axios 0.18 0.30.2 minor 4 HIGH, 2 MODERATE
jquery 3.2 3.7.1 minor 1 HIGH, 3 MODERATE

Security Details

🚨 Critical & High Severity (9 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
lodash GHSA-jf85-cpcp-j695 CRITICAL Prototype Pollution in lodash 4.17.5 4.17.12
axios GHSA-42xw-2xvc-qx8m HIGH Denial of Service in axios 0.18 0.18.1
axios GHSA-4hjh-wcwx-xvwj HIGH Axios is vulnerable to DoS attack through lack of data size check 0.18 1.12.0
axios GHSA-jr5f-v2jv-69x6 HIGH axios Requests Vulnerable To Possible SSRF and Credential Leakage via Absolute URL 0.18 1.8.2
axios GHSA-cph5-m8f7-6c5x HIGH axios Inefficient Regular Expression Complexity vulnerability 0.18 0.21.2
jquery CVE-2020-11023 high This package is related to CVE CVE-2020-11023 which was detected by cisa.gov as actively being exploited in the wild 3.2 -
lodash GHSA-4xc9-xhrj-v574 HIGH Prototype Pollution in lodash 4.17.5 4.17.11
lodash GHSA-35jh-r3h4-6jhm HIGH Command Injection in lodash 4.17.5 4.17.21
lodash GHSA-p6mc-m468-83gw HIGH Prototype Pollution in lodash 4.17.5 4.17.19
ℹ️ Other Vulnerabilities (7)
Package CVE Severity Summary Unsafe Version Fixed In
axios GHSA-4w2v-q235-vp99 MODERATE Axios vulnerable to Server-Side Request Forgery 0.18 0.21.1
axios GHSA-wf5p-g6vw-rhxx MODERATE Axios Cross-Site Request Forgery Vulnerability 0.18 1.6.0
jquery GHSA-6c3j-c64m-qhgq MODERATE XSS in jQuery as used in Drupal, Backdrop CMS, and other products 3.2 3.4.0
jquery GHSA-gxr4-xjj5-5px2 MODERATE Potential XSS vulnerability in jQuery 3.2 3.5.0
jquery GHSA-jpcq-cgw6-v4j6 MODERATE Potential XSS vulnerability in jQuery 3.2 3.5.0
lodash GHSA-x5rq-j2xg-h7qm MODERATE Regular Expression Denial of Service (ReDoS) in lodash 4.17.5 4.17.11
lodash GHSA-29mw-wpgm-hmr9 MODERATE Regular Expression Denial of Service (ReDoS) in lodash 4.17.5 4.17.21

Review Checklist

Enhanced review recommended for this update:

  • Review changes for compatibility with your code
  • Check release notes for breaking changes
  • Run integration tests to verify service behavior
  • Test in staging environment before production
  • Monitor key metrics after deployment

Update Mode: Vulnerability Remediation (Critical/High)

🤖 Generated by DataDog Automated Dependency Management System

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant