Update vimeo/psalm requirement from 4.7.2 to 4.10.0#12
Closed
dependabot[bot] wants to merge 1 commit intomasterfrom
Closed
Update vimeo/psalm requirement from 4.7.2 to 4.10.0#12dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot[bot] wants to merge 1 commit intomasterfrom
Conversation
Updates the requirements on [vimeo/psalm](https://github.com/vimeo/psalm) to permit the latest version. - [Release notes](https://github.com/vimeo/psalm/releases) - [Commits](vimeo/psalm@4.7.2...4.10.0) --- updated-dependencies: - dependency-name: vimeo/psalm dependency-type: direct:development ... Signed-off-by: dependabot[bot] <support@github.com>
Author
|
Superseded by #18. |
lchrusciel
pushed a commit
that referenced
this pull request
Mar 14, 2022
This PR was merged into the 1.9 branch. Discussion ---------- | Q | A | --------------- | ----- | Branch? | 1.9 <!-- see the comment below --> | Bug fix? | yes | New feature? | no | BC breaks? | no | Deprecations? | no <!-- don't forget to update the UPGRADE-*.md file --> | Related tickets | GHSA-4qrp-27r3-66fj | License | MIT There is a possibility to upload an SVG file containing XSS code in the admin panel. In order to perform an XSS attack, the file itself has to be open in a new card (or loaded outside of the IMG tag). The problem applies both to the files opened on the admin panel and shop pages. <!-- - Bug fixes must be submitted against the 1.10 or 1.11 branch(the lowest possible) - Features and deprecations must be submitted against the master branch - Make sure that the correct base branch is set To be sure you are not breaking any Backward Compatibilities, check the documentation: https://docs.sylius.com/en/latest/book/organization/backward-compatibility-promise.html --> Commits ------- 46ed54b [Security] XSS - SVG file upload vulnerability fixed
lchrusciel
pushed a commit
that referenced
this pull request
Mar 15, 2022
… in users and clickjacking (ernestWarwas, lchrusciel, GSadee, Zales0123, Rafikooo) This PR was merged into the 1.9 branch. Discussion ---------- | Q | A | --------------- | ----- | Branch? | 1.9 | Bug fix? | yes | New feature? | no | BC breaks? | no | Deprecations? | no | Related tickets | | License | MIT This PR aims to solve 3 issues: 1. Possibility to inject SVGs with scripts (https://rietta.com/blog/svg-xss-injection-attacks/) 2. Possibility to check admin pages with back button after logging out due to wrong cache'ing configuration 3. Clickjacking while rendering Sylius in iframe (https://portswigger.net/web-security/clickjacking) <!-- - Bug fixes must be submitted against the 1.10 or 1.11 branch(the lowest possible) - Features and deprecations must be submitted against the master branch - Make sure that the correct base branch is set To be sure you are not breaking any Backward Compatibilities, check the documentation: https://docs.sylius.com/en/latest/book/organization/backward-compatibility-promise.html --> Commits ------- 0886078 listener added to finish response with X-Frame-Options sameorigin header c236431 suggested review changes 67de9e8 bug #14 [Security] Clickjacking vulnerability fixed (ernestWarwas) 4b6a77a [UI] Force no-store cache directives for admin and customer account section 691b700 [Maintenace] Test existence of new cache headers 08d0f5a Remove type declarations for properties due to supporting PHP 7.3 94366fd Minor fixes for specs and unit tests of cache control subscribers 5dee3dc [Behat] Add scenarios for securing access to account and dashboard after logging out d4bf36c [Behat] Extract browser element and context afa04e3 Replace str_contains with strpos method to support PHP 7 b00eb51 [PHPUnit] Move subscribers tests to main directory 253f66b bug #11 [Security] Set cache control directives to fix security leak after logging out and using back button (lchrusciel, GSadee) 46ed54b [Security] XSS - SVG file upload vulnerability fixed 6ccc2d6 bug #12 [Security] XSS - SVG file upload vulnerability fixed (Rafikooo)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Updates the requirements on vimeo/psalm to permit the latest version.
Release notes
Sourced from vimeo/psalm's releases.
Commits
916b098Merge pull request #6421 from weirdan/ftp-resource-to-objects08155dcAddedFTP\Connectionclass36dfeedConverted ftp functions to use link object instead of a resource5dfd157Merge pull request #6420 from orklah/ternary-override-typeb710aabMerge pull request #6419 from TysonAndre/in_array-fix3a3fde3Merge pull request #6392 from orklah/control-action-testde4b344Merge pull request #6400 from craigfrancis/taint-limitse2b5948fix test0825f22allow ternary to override previous type when reassigning2e9a3cbMerge pull request #6409 from weirdan/document-callmapsDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)