WRR-21447: Updated dependency to fix vulnerabilities #258
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Checklist
Issue Resolved / Feature Added
There were high vulnerability
path-to-regexp <0.1.12
Severity: high
Unpatched
path-to-regexp
ReDoS in 0.1.x - GHSA-rhx6-c78j-4q9wfix available via
npm audit fix --force
Will install [email protected], which is a breaking change
node_modules/express/node_modules/path-to-regexp
node_modules/gatsby/node_modules/path-to-regexp
express 4.0.0-rc1 - 4.21.1 || 5.0.0-alpha.1 - 5.0.0-beta.3
Depends on vulnerable versions of path-to-regexp
node_modules/express
gatsby 3.4.0-alpha-parallel.36 - 3.14.2 || 4.0.0-alpha-9689ff.4 - 4.0.0-zz-next.9 || 5.13.0-alpha-alt-image-cdn.38 - 5.15.0-next.0
Depends on vulnerable versions of path-to-regexp
node_modules/gatsby
Resolution
Added
"path-to-regexp": "^0.1.12"
into overridesAdditional Considerations
Links
WRR-21447
Comments
Enact-DCO-1.0-Signed-off-by: Ion Andrusciac [email protected]