-
Notifications
You must be signed in to change notification settings - Fork 0
chore(deps): update dependency mongoose to v6 [security] #274
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
develop
Choose a base branch
from
renovate/npm-mongoose-vulnerability
base: develop
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
99f4c79 to
cce37a0
Compare
9f52e78 to
f50084d
Compare
f50084d to
95be6b5
Compare
f80fd59 to
37339a2
Compare
0a81c16 to
693b485
Compare
693b485 to
6613256
Compare
6613256 to
6ef54d6
Compare
d43fea6 to
84d7135
Compare
84d7135 to
173220e
Compare
173220e to
635ed98
Compare
635ed98 to
2e2415b
Compare
2e2415b to
d639a92
Compare
d639a92 to
f883657
Compare
f883657 to
e1c81ae
Compare
e1c81ae to
df4cd8f
Compare
df4cd8f to
ff0fc0c
Compare
ff0fc0c to
ef0eff7
Compare
ef0eff7 to
bdb32d0
Compare
63f4edb to
316f2d4
Compare
316f2d4 to
0d0e43d
Compare
0d0e43d to
7ea0419
Compare
7ea0419 to
28eae87
Compare
28eae87 to
1e360eb
Compare
5dd07e2 to
96016b5
Compare
96016b5 to
59e28f0
Compare
59e28f0 to
a5003ed
Compare
a5003ed to
eb16b2b
Compare
eb16b2b to
0994573
Compare
e8b76a3 to
c753cce
Compare
c753cce to
2f5a379
Compare
2f5a379 to
bb78e6d
Compare
bb78e6d to
8dbb925
Compare
8dbb925 to
e162c6e
Compare
e162c6e to
abab8b8
Compare
abab8b8 to
e25754b
Compare
557681e to
8118f13
Compare
8118f13 to
5ac3cbb
Compare
5ac3cbb to
254432a
Compare
254432a to
3ff4dd3
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
5.8.6->6.13.6GitHub Vulnerability Alerts
CVE-2022-2564
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.CVE-2023-3696
Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.3, 6.11.3, and 5.13.20.
CVE-2022-24304
Description
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment.
Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()function is vulnerable to prototype pollution when setting theschemaobject. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.Proof of Concept
Impact
This vulnerability can be manipulated to exploit other types of attacks, such as Denial of service (DoS), Remote Code Execution, or Property Injection.
CVE-2024-53900
Mongoose versions prior to 8.8.3, 7.8.3, and 6.13.5 are vulnerable to improper use of the $where operator. This vulnerability arises from the ability of the $where clause to execute arbitrary JavaScript code in MongoDB queries, potentially leading to code injection attacks and unauthorized access or manipulation of database data.
CVE-2025-23061
Mongoose versions prior to 8.9.5, 7.8.4, and 6.13.6 are vulnerable to improper use of the
$whereoperator. This vulnerability arises from the ability of the$whereclause to execute arbitrary JavaScript code in MongoDB queries, potentially leading to code injection attacks and unauthorized access or manipulation of database data.NOTE: this issue exists because of an incomplete fix for CVE-2024-53900.
Release Notes
Automattic/mongoose (mongoose)
v6.13.6Compare Source
===================
v6.13.5Compare Source
===================
v6.13.4Compare Source
===================
v6.13.3Compare Source
===================
v6.13.2Compare Source
===================
v6.13.1Compare Source
===================
v6.13.0Compare Source
===================
v6.12.9Compare Source
===================
v6.12.8Compare Source
===================
valueproperty rather than boolean #14418v6.12.7Compare Source
===================
openUri()#14370 #13376 #13335v6.12.6Compare Source
===================
v6.12.5Compare Source
===================
v6.12.4Compare Source
===================
v6.12.3Compare Source
===================
removeVirtual()#14019 #13085v6.12.2Compare Source
===================
v6.12.1Compare Source
===================
v6.12.0Compare Source
===================
v6.11.6Compare Source
===================
v6.11.5Compare Source
===================
v6.11.4Compare Source
===================
v6.11.3Compare Source
===================
v6.11.2Compare Source
===================
v6.11.1Compare Source
===================
v6.11.0Compare Source
===================
v6.10.5Compare Source
===================
v6.10.4Compare Source
===================
v6.10.3Compare Source
===================
v6.10.2Compare Source
===================
enginesinpackage.json#13124 lorand-horvathv6.10.1Compare Source
===================
$andand$or#13086 #12898Model.populate()#13070v6.10.0Compare Source
===================
v6.9.3Compare Source
==================
autoCreateandautoIndexuntil after initial connection established #13007 #12940 lpizzinidevv6.9.2Compare Source
==================
v6.9.1Compare Source
==================
v6.9.0Compare Source
==================
$orconditions after strict applied #12898 0x0a0dv6.8.4Compare Source
==================
v6.8.3Compare Source
==================
v6.8.2Compare Source
==================
v6.8.1Compare Source
==================
$localsparameters to getters/setters tutorial #12814 #12550 IslandRhythmsv6.8.0Compare Source
==================
localFieldandforeignFieldfor virtual populate #12657 #6963 IslandRhythmsv6.7.5Compare Source
==================
v6.7.4Compare Source
==================
v6.7.3Compare Source
==================
v6.7.2Compare Source
==================
applyPlugins == false#12613 #12604 lpizzinidevv6.7.1Compare Source
==================
v6.7.0Compare Source
==================
v6.6.7Compare Source
==================
v6.6.6[Compare Source](https://
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.