-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency mongoose to v6 [security] #118
Open
renovate
wants to merge
1
commit into
develop
Choose a base branch
from
renovate/npm-mongoose-vulnerability
base: develop
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
50652f0
to
4029216
Compare
4029216
to
deb5d3f
Compare
deb5d3f
to
b0a9588
Compare
b0a9588
to
1915bfd
Compare
1915bfd
to
8446704
Compare
8446704
to
7611e83
Compare
9e70f54
to
7611e83
Compare
7611e83
to
76fc907
Compare
76fc907
to
b4aa15b
Compare
b4aa15b
to
96adc16
Compare
96adc16
to
c16cb0d
Compare
c16cb0d
to
7f681b4
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
5.5.10
->6.13.6
GitHub Vulnerability Alerts
CVE-2019-17426
Automattic Mongoose through 5.7.4 allows attackers to bypass access control (in some applications) because any query object with a
_bsontype
attribute is ignored. For example, adding"_bsontype":"a"
can sometimes interfere with a query filter. NOTE: this CVE is about Mongoose's failure to work around this _bsontype special case that exists in older versions of the bson parser (aka the mongodb/js-bson project).CVE-2022-2564
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()
function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.CVE-2023-3696
Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.3, 6.11.3, and 5.13.20.
CVE-2022-24304
Description
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment.
Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()
function is vulnerable to prototype pollution when setting theschema
object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.Proof of Concept
Impact
This vulnerability can be manipulated to exploit other types of attacks, such as Denial of service (DoS), Remote Code Execution, or Property Injection.
CVE-2024-53900
Mongoose versions prior to 8.8.3, 7.8.3, and 6.13.5 are vulnerable to improper use of the $where operator. This vulnerability arises from the ability of the $where clause to execute arbitrary JavaScript code in MongoDB queries, potentially leading to code injection attacks and unauthorized access or manipulation of database data.
CVE-2025-23061
Mongoose versions prior to 8.9.5, 7.8.4, and 6.13.6 are vulnerable to improper use of the
$where
operator. This vulnerability arises from the ability of the$where
clause to execute arbitrary JavaScript code in MongoDB queries, potentially leading to code injection attacks and unauthorized access or manipulation of database data.NOTE: this issue exists because of an incomplete fix for CVE-2024-53900.
Release Notes
Automattic/mongoose (mongoose)
v6.13.6
Compare Source
===================
v6.13.5
Compare Source
v6.13.4
Compare Source
v6.13.3
Compare Source
v6.13.2
Compare Source
===================
v6.13.1
Compare Source
v6.13.0
Compare Source
v6.12.9
Compare Source
v6.12.8
Compare Source
===================
value
property rather than boolean #14418v6.12.7
Compare Source
v6.12.6
Compare Source
v6.12.5
Compare Source
v6.12.4
Compare Source
v6.12.3
Compare Source
v6.12.2
Compare Source
v6.12.1
Compare Source
v6.12.0
Compare Source
===================
v6.11.6
Compare Source
===================
v6.11.5
Compare Source
===================
v6.11.4
Compare Source
===================
7.3.4 / 2023-07-12
v6.11.3
Compare Source
===================
v6.11.2
Compare Source
===================
v6.11.1
Compare Source
===================
v6.11.0
Compare Source
===================
v6.10.5
Compare Source
===================
v6.10.4
Compare Source
===================
v6.10.3
Compare Source
===================
v6.10.2
Compare Source
===================
engines
inpackage.json
#13124 lorand-horvathv6.10.1
Compare Source
===================
$and
and$or
#13086 #12898Model.populate()
#13070v6.10.0
Compare Source
===================
v6.9.3
Compare Source
==================
autoCreate
andautoIndex
until after initial connection established #13007 #12940 lpizzinidevv6.9.2
Compare Source
==================
v6.9.1
Compare Source
==================
v6.9.0
Compare Source
==================
$or
conditions after strict applied #12898 0x0a0dv6.8.4
Compare Source
==================
v6.8.3
Compare Source
==================
v6.8.2
Compare Source
==================
v6.8.1
Compare Source
==================
$locals
parameters to getters/setters tutorial #12814 #12550 IslandRhythmsv6.8.0
Compare Source
==================
localField
andforeignField
for virtual populate #12657 #6963 IslandRhythmsv6.7.5
Compare Source
==================
v6.7.4
Compare Source
==================
v6.7.3
Compare Source
v6.7.2
Compare Source
v6.7.1
Compare Source
==================
v6.7.0
Compare Source
v6.6.7
Compare Source
==================
v6.6.6
Compare Source
==================
v6.6.5
Compare Source
v6.6.4
Compare Source
v6.6.3
Compare Source
==================
v6.6.2
Compare Source
v6.6.1
Compare Source
==================
v6.6.0
Compare Source
==================
v6.5.5
Compare Source
==================
v6.5.4
Compare Source
==================
v6.5.3
Compare Source
==================
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.