Skip to content

Conversation

@ajesse11x
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade git-url-parse from 8.3.1 to 14.0.0.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


Warning: This is a major version upgrade, and may be a breaking change.

  • The recommended version is 23 versions ahead of your current version.
  • The recommended version was released 4 months ago, on 2024-01-02.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Authorization Bypass Through User-Controlled Key
SNYK-JS-PARSEPATH-2936439
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-UNSETVALUE-2400660
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
No Known Exploit
Improper Input Validation
SNYK-JS-PARSEURL-3024398
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept
Server-side Request Forgery (SSRF)
SNYK-JS-REQUEST-3361831
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept
Open Redirect
SNYK-JS-GOT-2932019
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JS-HTTPCACHESEMANTICS-3248783
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept
Reverse Tabnabbing
SNYK-JS-ISTANBULREPORTS-2328088
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
No Known Exploit
Cross-site Scripting (XSS)
SNYK-JS-PARSEURL-2935944
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept
Information Exposure
SNYK-JS-PARSEURL-2935947
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept
Server-side Request Forgery (SSRF)
SNYK-JS-PARSEURL-2936249
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept
Cross-site Scripting (XSS)
SNYK-JS-PARSEURL-2942134
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept
Server-side Request Forgery (SSRF)
SNYK-JS-PARSEURL-3023021
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept
Prototype Pollution
SNYK-JS-TOUGHCOOKIE-5672873
686/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.3
Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Release notes
Package name: git-url-parse
  • 14.0.0 - 2024-01-02

    Reencode owner and repo names -- thanks @ lfcyja 🍰

  • 13.1.1 - 2023-10-19

    fixed name and organization issue when parsing on the issue URL

  • 13.1.0 - 2022-09-16

    Add edit filetype support /cc #146 -- thanks @ ggdaltoso! 🍰

  • 13.0.0 - 2022-08-30

    git-url-parse@13.0.0

    There are breaking changes due to the update to parse-url@^8.0.0. ✨

  • 12.0.0 - 2022-06-27

    git-url-parse 12.0.0

    This is a major release fixing several issues and improving the security of the project.

    Breaking changes

    • VSTS SSH URLs may give unexpected results — I left a TODO in the tests to remind us to fix it.
    • For shorthand urls use the href property instead of pathname.
    • The user and password properties are now parsed separately.

    For other potential breaking changes, you may want to check out the release of git-up.

    Issues Fixed

    • Fixes #102 — Support GitHub usernames with numbers (only numbers).
    • Fixes #130 — Update git-up
    • Fixes #135

    If you have any suggestions and questions let me know. 😊

  • 11.6.0 - 2021-09-06

    Fix parsing Bitbucket Server urls with files located in subfolders -- thanks @ goober! 🍰

  • 11.5.0 - 2021-06-29

    Add support for Bitbucket Server repository root and commit endpoints /cc #128 -- thanks @ goober 🍰

  • 11.4.4 - 2021-01-27

    Add Azure DevOps parsing git branch /cc #124 Thanks @ n2ygk! 🍰

  • 11.4.3 - 2020-12-15

    11.4.3

  • 11.4.1 - 2020-12-15

    Fix BitBucket url parsing /cc #18 thanks @ lykims 🍰

  • 11.4.0 - 2020-10-22
  • 11.3.0 - 2020-09-30
  • 11.2.0 - 2020-09-04
  • 11.1.3 - 2020-08-09
  • 11.1.2 - 2019-01-03
  • 11.1.1 - 2018-11-06
  • 11.1.0 - 2018-11-06
  • 11.0.1 - 2018-10-28
  • 11.0.0 - 2018-10-28
  • 10.1.0 - 2018-10-15
  • 10.0.1 - 2018-07-16
  • 9.0.1 - 2018-05-28
  • 9.0.0 - 2018-04-12
  • 8.3.1 - 2018-04-03
from git-url-parse GitHub release notes
Commit messages
Package name: git-url-parse
  • 2882854 Updated docs
  • e810584 Merge branch 'fix-name-organization-on-issueURL' of github.com:msivasubramaniaan/git-url-parse into new-version
  • 4c01a68 Merge branch 'bugfix/reencode-owner-and-repo-names' of github.com:lfcyja/git-url-parse into new-version
  • 638bcf4 ⬆️ 14.0.0 🎉
  • 9a923cb ⬆️ 13.2.0 🎉
  • 9873728 Updated docs
  • 207e0d4 ⬆️ 13.1.1 🎉
  • 2c26c51 fixed name and organization issue when parsing on the issue url
  • 85d4d30 re-encode owner and repository in stringify
  • 4f0dd57 Updated docs
  • 1ca18e9 Merge branch 'master' of github.com:ggdaltoso/git-url-parse into new-version
  • be9b6d4 ⬆️ 13.1.0 🎉
  • 129677c Updated docs
  • 26cc5fe Fix shorthand urls
  • 4e3b1cc Merge branch 'custom-ssh-user-tests' of github.com:privatenumber/git-url-parse into new-version
  • 32ed275 ⬆️ 13.0.0 🎉
  • 7ee8abd test: update unit test
  • c256dfd feat: add `edit` filepathtype support
  • 7cce252 refactor: remove enterpriseSsh
  • c674528 test: failing test for custom SSH user
  • f4ea05e wip
  • 6c0ca07 Updated docs
  • 9746972 ⬆️ 12.0.0 🎉
  • 60011fb Update dependencies

Compare


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants