[Snyk] Security upgrade axios from 1.6.2 to 1.6.3 #1308

Closed
opened 2026-04-05 16:26:43 +02:00 by MrUnknownDE · 0 comments
Owner

Originally created by @simlarsen on 12/27/2023

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • CommonServer/package.json
    • CommonServer/package-lock.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
medium severity 658/1000
Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JS-AXIOS-6124857
No Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: axios The new version differs by 5 commits.

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Regular Expression Denial of Service (ReDoS)

*Originally created by @simlarsen on 12/27/2023* <p>This PR was automatically created by Snyk using the credentials of a real user.</p><br /><h3>Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.</h3> #### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - CommonServer/package.json - CommonServer/package-lock.json #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **658/1000** <br/> **Why?** Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 5.3 | Regular Expression Denial of Service (ReDoS) <br/>[SNYK-JS-AXIOS-6124857](https://snyk.io/vuln/SNYK-JS-AXIOS-6124857) | No | Proof of Concept (*) Note that the real score may have changed since the PR was raised. <details> <summary><b>Commit messages</b></summary> </br> <details> <summary>Package name: <b>axios</b></summary> The new version differs by 5 commits.</br> <ul> <li><a href="https://snyk.io/redirect/github/axios/axios/commit/b15b918d179900e7d47a08f4e96efc89e16d8a7b">b15b918</a> chore(release): v1.6.3 (#6151)</li> <li><a href="https://snyk.io/redirect/github/axios/axios/commit/b76cce0e0f67c0597c748f8b0eb5245277fa6dc7">b76cce0</a> chore(ci): added branches filter for notify action; (#6084)</li> <li><a href="https://snyk.io/redirect/github/axios/axios/commit/5e7ad38fb0f819fceb19fb2ee5d5d38f56aa837d">5e7ad38</a> fix: Regular Expression Denial of Service (ReDoS) (#6132)</li> <li><a href="https://snyk.io/redirect/github/axios/axios/commit/8befb86efb101ef9dc1d1c16d77d2bf42600727f">8befb86</a> docs: update alloy link (#6145)</li> <li><a href="https://snyk.io/redirect/github/axios/axios/commit/d18f40d89af9f86275a24b4ade68bc60eff97214">d18f40d</a> docs: add headline sponsors</li> </ul> <a href="https://snyk.io/redirect/github/axios/axios/compare/b3be36585884ba1e237fdd0eacf55f678aefc396...b15b918d179900e7d47a08f4e96efc89e16d8a7b">See the full diff</a> </details> </details> Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiJjNWMzZjUxMy1jMDI0LTRlMmMtYmY1Zi1jOWY4ODhhOTRlOGMiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6ImM1YzNmNTEzLWMwMjQtNGUyYy1iZjVmLWM5Zjg4OGE5NGU4YyJ9fQ==" width="0" height="0"/> 🧐 [View latest project report](https://app.snyk.io/org/oneuptime-RsC2nshvQ2Vnr35jHvMnMP/project/a2fb4fe1-f25f-4ff9-a58c-e78277b0a7fa?utm_source&#x3D;github&amp;utm_medium&#x3D;referral&amp;page&#x3D;fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/oneuptime-RsC2nshvQ2Vnr35jHvMnMP/project/a2fb4fe1-f25f-4ff9-a58c-e78277b0a7fa?utm_source&#x3D;github&amp;utm_medium&#x3D;referral&amp;page&#x3D;fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"c5c3f513-c024-4e2c-bf5f-c9f888a94e8c","prPublicId":"c5c3f513-c024-4e2c-bf5f-c9f888a94e8c","dependencies":[{"name":"axios","from":"1.6.2","to":"1.6.3"}],"packageManager":"npm","projectPublicId":"a2fb4fe1-f25f-4ff9-a58c-e78277b0a7fa","projectUrl":"https://app.snyk.io/org/oneuptime-RsC2nshvQ2Vnr35jHvMnMP/project/a2fb4fe1-f25f-4ff9-a58c-e78277b0a7fa?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JS-AXIOS-6124857"],"upgrade":["SNYK-JS-AXIOS-6124857"],"isBreakingChange":false,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[658],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Regular Expression Denial of Service (ReDoS)](https://learn.snyk.io/lesson/redos/?loc&#x3D;fix-pr)
Sign in to join this conversation.
No Label
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github/oneuptime#1308