This repository has been archived by the owner on Apr 2, 2024. It is now read-only.
fix(deps): update dependency @koa/cors to v5 [security] #121
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.1.0
->5.0.0
GitHub Vulnerability Alerts
CVE-2023-49803
Currently, the middleware operates in a way that if an allowed origin is not provided, it will return an
Access-Control-Allow-Origin
header with the value of the origin from the request. This behavior completely disables one of the most crucial elements of browsers - the Same Origin Policy (SOP), this could cause a very serious security threat to the users of this middleware.If such behavior is expected, for instance, when middleware is used exclusively for prototypes and not for production applications, it should be heavily emphasized in the documentation along with an indication of the risks associated with such behavior, as many users may not be aware of it.
Release Notes
koajs/cors (@koa/cors)
v5.0.0
Compare Source
==================
others
f31dac9
] - Merge pull request from GHSA-qxrj-hx23-xp82 (fengmk2 <suqian.yf@antgroup.com>)v4.0.0
Compare Source
==================
fixes
7358ab3
] - fix: Calling all options even if origin header is not present (#87) (Cleber Rossi <cleberjoserossi@gmail.com>)others
d19090f
] - refactor: [BREAKING] drop node 8, 10, 12 support (#88) (fengmk2 <<fengmk2@gmail.com>>)v3.4.3
Compare Source
==================
others
208b86c
] - Revert "fix: Calling all options even if origin header is not present (#87)" (fengmk2 <<fengmk2@gmail.com>>)v3.4.2
Compare Source
==================
fixes
2e8da5b
] - fix: Calling all options even if origin header is not present (#87) (Cleber Rossi <cleberjoserossi@gmail.com>)v3.4.1
Compare Source
==================
fixes
1205356
] - fix: must specify an origin value instead of "*" wildcard (#85) (Tyreal Hu <tyrealhu.fe@gmail.com>)v3.4.0
Compare Source
==================
others
2cd4789
] - 🤖 TEST: Run test on Node.js 18 (#86) (fengmk2 <<fengmk2@gmail.com>>)ae56e05
] - Create codeql-analysis.yml (fengmk2 <<fengmk2@gmail.com>>)c4b5d21
] - refactor: use friendlier promise checking (#84) (Swain Molster <swain.molster@gmail.com>)fbe33bc
] - 📖 DOC: Add privateNetworkAccess js to README (fengmk2 <<fengmk2@gmail.com>>)v3.3.0
Compare Source
==================
features
c279fc3
] - feat: Add support for "Private Network Access" (#83) (Chi Ma <55783048+cma-skedulo@users.noreply.github.com>)others
97d9220
] - chore: credentials jsdoc (#80) (Jing Yi Wang <jyw@live.de>)v3.2.0
Compare Source
==================
features
134ec9b
] - feat: support secure context headers (Levi Tomes <levi@userdevice.net>)others
bcadb55
] - test: run test on github action (fengmk2 <<fengmk2@gmail.com>>)Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Paris, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.