Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency pug to v3 [SECURITY] - abandoned #37

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Mar 3, 2021

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
pug (source) ^2.0.4 -> ^3.0.0 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2021-21353

Impact

If a remote attacker was able to control the pretty option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend.

Patches

Upgrade to pug@3.0.1 or pug-code-gen@3.0.2 or pug-code-gen@2.0.3, which correctly sanitise the parameter.

Workarounds

If there is no way for un-trusted input to be passed to pug as the pretty option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade.

References

Original report: https://github.com/pugjs/pug/issues/3312

For more information

If you believe you have found other vulnerabilities, please DO NOT open an issue. Instead, you can follow the instructions in our Security Policy


Release Notes

pugjs/pug

v3.0.1

Compare Source

Bug Fixes

  • Sanitise the pretty option (#​3314)

    If a malicious attacker could control the pretty option, it was possible for them to achieve remote code execution on the server rendering the template. All pug users should upgrade as soon as possible, see #​3312 for more details.

v3.0.0

Compare Source

Breaking Changes

  • read plugins must now return Buffer if you want to support filters that use renderBuffer (#​3213)

    If you don't wish to support this advanced use case, you can continue returning string. If you did not provide a read plugin, you do not need to do anything.

  • The minify option on filters now requires you to install the relevant jstransformer (#​3084)

    Currently we support:

    • jstransformer-uglify-js for JavaScript
    • jstransformer-clean-css for CSS
  • Drop support for node 6 and 8 (#​3243)

New Features

  • Support filters that apply to Buffers (#​3213)

    e.g.

    // options.js
    exports.filters = {
      png: {
        // instead of a function, specify an object with a "renderBuffer" property
        // whose value is a function that takes a Buffer instead of a string
        renderBuffer: function(buffer, options) {
          var data = Buffer.from(buffer).toString('base64');
          return '<img src="data:image/png;base64, ' + data + '"/>';
        }
      }
    };

    You can then use the filter like:

    // foo.pug
    include:png my-small-image.png
  • Add support for replacing code gen via a plugin with generateCode (#​3230)

  • Support each ... of ... loops (#​3179)

    each value of iterable
      li= value

    This requires an environment that supports the for (const val of iterable) syntax in JS. You can iterate over Maps, Sets etc. as well as arrays. There is also some destructuring of map keys:

    - const map = new Map([['a', 'x'], ['b', 'y']]);
    each [key, value] of map
      li
        strong= key
        = value

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] Update dependency pug to v3 [SECURITY] - autoclosed Jun 1, 2021
@renovate renovate bot closed this Jun 1, 2021
@renovate renovate bot deleted the renovate/npm-pug-vulnerability branch June 1, 2021 13:07
@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] - autoclosed Update dependency pug to v3 [SECURITY] Jun 1, 2021
@renovate renovate bot restored the renovate/npm-pug-vulnerability branch June 1, 2021 13:51
@renovate renovate bot reopened this Jun 1, 2021
@renovate renovate bot force-pushed the renovate/npm-pug-vulnerability branch from b6a2e4e to 4fced96 Compare June 1, 2021 13:52
@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] Update dependency pug to v3 [SECURITY] - autoclosed Sep 22, 2021
@renovate renovate bot closed this Sep 22, 2021
@renovate renovate bot deleted the renovate/npm-pug-vulnerability branch September 22, 2021 15:27
@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] - autoclosed Update dependency pug to v3 [SECURITY] Sep 22, 2021
@renovate renovate bot reopened this Sep 22, 2021
@renovate renovate bot restored the renovate/npm-pug-vulnerability branch September 22, 2021 17:28
@renovate renovate bot force-pushed the renovate/npm-pug-vulnerability branch from 4fced96 to 7c48cc4 Compare September 22, 2021 17:28
@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] Update dependency pug to v3 [SECURITY] - autoclosed Feb 2, 2023
@renovate renovate bot closed this Feb 2, 2023
@renovate renovate bot deleted the renovate/npm-pug-vulnerability branch February 2, 2023 03:05
@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] - autoclosed Update dependency pug to v3 [SECURITY] Feb 2, 2023
@renovate renovate bot reopened this Feb 2, 2023
@renovate renovate bot restored the renovate/npm-pug-vulnerability branch February 2, 2023 07:53
@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] Update dependency pug to v3 [SECURITY] - autoclosed Feb 11, 2023
@renovate renovate bot closed this Feb 11, 2023
@renovate renovate bot deleted the renovate/npm-pug-vulnerability branch February 11, 2023 02:50
@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] - autoclosed Update dependency pug to v3 [SECURITY] Feb 11, 2023
@renovate renovate bot reopened this Feb 11, 2023
@renovate renovate bot restored the renovate/npm-pug-vulnerability branch February 11, 2023 06:25
@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] Update dependency pug to v3 [SECURITY] - autoclosed Mar 13, 2023
@renovate renovate bot closed this Mar 13, 2023
@renovate renovate bot deleted the renovate/npm-pug-vulnerability branch March 13, 2023 20:31
@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] - autoclosed Update dependency pug to v3 [SECURITY] Mar 14, 2023
@renovate renovate bot restored the renovate/npm-pug-vulnerability branch March 14, 2023 00:50
@renovate renovate bot reopened this Mar 14, 2023
@renovate
Copy link
Author

renovate bot commented Mar 24, 2023

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

Warning: custom changes will be lost.

Copy link
Author

renovate bot commented Apr 4, 2024

Autoclosing Skipped

This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.

@renovate renovate bot changed the title Update dependency pug to v3 [SECURITY] Update dependency pug to v3 [SECURITY] - abandoned Apr 4, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant