-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency mongoose to v6.13.6 [SECURITY] #180
Open
renovate
wants to merge
1
commit into
main
Choose a base branch
from
renovate/npm-mongoose-vulnerability
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cf01cc9
to
234ad85
Compare
947550e
to
882f405
Compare
44d8136
to
d8ddfc4
Compare
d8ddfc4
to
8f03c23
Compare
775798d
to
588131c
Compare
588131c
to
a3f7732
Compare
6e3b4e9
to
dc05bd5
Compare
e7aa8fd
to
d6c7ed1
Compare
d6c7ed1
to
237ad64
Compare
237ad64
to
4bf79fe
Compare
0192bb5
to
985d91f
Compare
74b0629
to
3dbf4b8
Compare
3dbf4b8
to
273324b
Compare
273324b
to
3d4a159
Compare
a64ed5a
to
c28873f
Compare
64ee43f
to
b1781a9
Compare
b1781a9
to
257d5e4
Compare
257d5e4
to
b07a50d
Compare
50f9796
to
e7fe6af
Compare
4936938
to
1a62011
Compare
1a62011
to
bae4ad6
Compare
bae4ad6
to
d578a26
Compare
d578a26
to
80d5fa7
Compare
80d5fa7
to
24209f8
Compare
24209f8
to
daa875a
Compare
556022f
to
d8d2faa
Compare
d8d2faa
to
b343b02
Compare
b343b02
to
df69bf4
Compare
df69bf4
to
8aeacb0
Compare
8aeacb0
to
21dd79b
Compare
21dd79b
to
165da14
Compare
165da14
to
376d591
Compare
376d591
to
cb86d00
Compare
cb86d00
to
fe7e03e
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
6.2.10
->6.13.6
GitHub Vulnerability Alerts
CVE-2022-2564
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()
function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.CVE-2023-3696
Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.3, 6.11.3, and 5.13.20.
CVE-2022-24304
Description
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment.
Affected versions of this package are vulnerable to Prototype Pollution. The
Schema.path()
function is vulnerable to prototype pollution when setting theschema
object. This vulnerability allows modification of the Object prototype and could be manipulated into a Denial of Service (DoS) attack.Proof of Concept
Impact
This vulnerability can be manipulated to exploit other types of attacks, such as Denial of service (DoS), Remote Code Execution, or Property Injection.
CVE-2024-53900
Mongoose versions prior to 8.8.3, 7.8.3, and 6.13.5 are vulnerable to improper use of the $where operator. This vulnerability arises from the ability of the $where clause to execute arbitrary JavaScript code in MongoDB queries, potentially leading to code injection attacks and unauthorized access or manipulation of database data.
CVE-2025-23061
Mongoose versions prior to 8.9.5, 7.8.4, and 6.13.6 are vulnerable to improper use of the
$where
operator. This vulnerability arises from the ability of the$where
clause to execute arbitrary JavaScript code in MongoDB queries, potentially leading to code injection attacks and unauthorized access or manipulation of database data.NOTE: this issue exists because of an incomplete fix for CVE-2024-53900.
Release Notes
Automattic/mongoose (mongoose)
v6.13.6
Compare Source
===================
v6.13.5
Compare Source
v6.13.4
Compare Source
v6.13.3
Compare Source
v6.13.2
Compare Source
===================
v6.13.1
Compare Source
v6.13.0
Compare Source
v6.12.9
Compare Source
v6.12.8
Compare Source
===================
value
property rather than boolean #14418v6.12.7
Compare Source
v6.12.6
Compare Source
v6.12.5
Compare Source
v6.12.4
Compare Source
v6.12.3
Compare Source
v6.12.2
Compare Source
v6.12.1
Compare Source
v6.12.0
Compare Source
===================
v6.11.6
Compare Source
===================
v6.11.5
Compare Source
===================
v6.11.4
Compare Source
===================
7.3.4 / 2023-07-12
v6.11.3
Compare Source
===================
v6.11.2
Compare Source
===================
v6.11.1
Compare Source
===================
v6.11.0
Compare Source
===================
v6.10.5
Compare Source
===================
v6.10.4
Compare Source
===================
v6.10.3
Compare Source
===================
v6.10.2
Compare Source
===================
engines
inpackage.json
#13124 lorand-horvathv6.10.1
Compare Source
===================
$and
and$or
#13086 #12898Model.populate()
#13070v6.10.0
Compare Source
===================
v6.9.3
Compare Source
==================
autoCreate
andautoIndex
until after initial connection established #13007 #12940 lpizzinidevv6.9.2
Compare Source
==================
v6.9.1
Compare Source
==================
v6.9.0
Compare Source
==================
$or
conditions after strict applied #12898 0x0a0dv6.8.4
Compare Source
==================
v6.8.3
Compare Source
==================
v6.8.2
Compare Source
==================
v6.8.1
Compare Source
==================
$locals
parameters to getters/setters tutorial #12814 #12550 IslandRhythmsv6.8.0
Compare Source
==================
localField
andforeignField
for virtual populate #12657 #6963 IslandRhythmsv6.7.5
Compare Source
==================
v6.7.4
Compare Source
==================
v6.7.3
Compare Source
v6.7.2
Compare Source
v6.7.1
Compare Source
==================
v6.7.0
Compare Source
v6.6.7
Compare Source
==================
v6.6.6
Compare Source
==================
v6.6.5
Compare Source
v6.6.4
Compare Source
v6.6.3
Compare Source
==================
v6.6.2
Compare Source
v6.6.1
Compare Source
==================
v6.6.0
Compare Source
==================
v6.5.5
Compare Source
==================
v6.5.4
Compare Source
==================
v6.5.3
Compare Source
==================
discriminator()
generic #10349Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.