chore(deps): update devdependency codecov to v3.7.1 [security]#45
chore(deps): update devdependency codecov to v3.7.1 [security]#45renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
dbca704 to
7904258
Compare
Codecov Report
@@ Coverage Diff @@
## master #45 +/- ##
=========================================
Coverage 100.00% 100.00%
=========================================
Files 1 1
Lines 27 27
Branches 11 11
=========================================
Hits 27 27 Continue to review full report at Codecov.
|
7904258 to
20eba6a
Compare
20eba6a to
9d53bb1
Compare
9d53bb1 to
227b30c
Compare
Codecov Report
@@ Coverage Diff @@
## master #45 +/- ##
=========================================
Coverage 100.00% 100.00%
=========================================
Files 1 1
Lines 27 27
Branches 11 11
=========================================
Hits 27 27 Continue to review full report at Codecov.
|
227b30c to
621cff5
Compare
621cff5 to
cbbefe6
Compare
Codecov Report
@@ Coverage Diff @@
## master #45 +/- ##
=============================================
+ Coverage 0 100.00% +100.00%
=============================================
Files 0 1 +1
Lines 0 28 +28
Branches 0 11 +11
=============================================
+ Hits 0 28 +28
Continue to review full report at Codecov.
|
cbbefe6 to
5a0d19d
Compare
5a0d19d to
0668d08
Compare
0668d08 to
ea17f4e
Compare
Codecov Report
@@ Coverage Diff @@
## master #45 +/- ##
=============================================
+ Coverage 0 100.00% +100.00%
=============================================
Files 0 1 +1
Lines 0 36 +36
Branches 0 18 +18
=============================================
+ Hits 0 36 +36
Continue to review full report at Codecov.
|
ea17f4e to
f401e56
Compare
f401e56 to
26280a4
Compare
26280a4 to
fa6868c
Compare
fa6868c to
0dab2ad
Compare
0dab2ad to
781fe60
Compare
⚠ Artifact update problemRenovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is. ♻ Renovate will retry this branch, including artifacts, only when one of the following happens:
The artifact failure details are included below: File name: yarn.lock |
781fe60 to
73f3a16
Compare
73f3a16 to
2bd7da0
Compare
2bd7da0 to
87d5556
Compare
87d5556 to
4f03fd2
Compare
4f03fd2 to
ea0a704
Compare
ea0a704 to
7c68d1e
Compare
7c68d1e to
8335987
Compare
8335987 to
9b8cb15
Compare
This PR contains the following updates:
3.2.0→3.7.1codecov NPM module allows remote attackers to execute arbitrary commands
CVE-2020-7597 / GHSA-5q88-cjfq-g2mh
More information
Details
codecov-node npm module before 3.6.5 allows remote attackers to execute arbitrary commands.The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Command injection in codecov (npm package)
CVE-2020-15123 / GHSA-xp63-6vf5-xf3v
More information
Details
Impact
The
uploadmethod has a command injection vulnerability. Clients of thecodecov-nodelibrary are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.A similar CVE was issued: CVE-2020-7597, but the fix was incomplete. It only blocked
&, and command injection is still possible using backticks instead to bypass the sanitizer.We have written a CodeQL query, which automatically detects this vulnerability. You can see the results of the query on the
codecov-nodeproject here.Patches
This has been patched in version 3.7.1
Workarounds
None, however, the attack surface is low in this case. Particularly in the standard use of codecov, where the module is used directly in a build pipeline, not built against as a library in another application that may supply malicious input and perform command injection.
References
For more information
If you have any questions or comments about this advisory:
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Improper Neutralization of Special Elements in Output Used by a Downstream Component in Codecov
CVE-2020-7596 / GHSA-mh2h-6j8q-x246
More information
Details
Codecov npm module before 3.6.2 allows remote attackers to execute arbitrary commands via the "gcov-args" argument.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
codecov/codecov-node (codecov)
v3.7.1Compare Source
v3.7.0Compare Source
v3.6.5Compare Source
v3.6.4Compare Source
v3.6.3Compare Source
v3.6.2Compare Source
v3.6.1Compare Source
v3.6.0Compare Source
v3.5.0Compare Source
v3.4.0Compare Source
v3.3.0Compare Source
--pipe,-lConfiguration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.