Skip to content

fix(deps): update dependency send to v0.19.0 [security]#1498

Open
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/npm-send-vulnerability
Open

fix(deps): update dependency send to v0.19.0 [security]#1498
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/npm-send-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Sep 17, 2024

This PR contains the following updates:

Package Change Age Confidence
send 0.18.00.19.0 age confidence

send vulnerable to template injection that can lead to XSS

CVE-2024-43799 / GHSA-m6fv-jmcg-4jfg

More information

Details

Impact

passing untrusted user input - even after sanitizing it - to SendStream.redirect() may execute untrusted code

Patches

this issue is patched in send 0.19.0

Workarounds

users are encouraged to upgrade to the patched version of express, but otherwise can workaround this issue by making sure any untrusted inputs are safe, ideally by validating them against an explicit allowlist

Details

successful exploitation of this vector requires the following:

  1. The attacker MUST control the input to response.redirect()
  2. express MUST NOT redirect before the template appears
  3. the browser MUST NOT complete redirection before:
  4. the user MUST click on the link in the template

Severity

  • CVSS Score: 2.3 / 10 (Low)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

pillarjs/send (send)

v0.19.0

Compare Source

===================

  • Remove link renderization in html while redirecting

Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@cloudflare-workers-and-pages
Copy link
Copy Markdown

cloudflare-workers-and-pages Bot commented Sep 17, 2024

Deploying node-js-server with  Cloudflare Pages  Cloudflare Pages

Latest commit: 57b58c0
Status: ✅  Deploy successful!
Preview URL: https://f81834d1.node-js-server.pages.dev
Branch Preview URL: https://renovate-npm-send-vulnerabil.node-js-server.pages.dev

View logs

@renovate renovate Bot changed the title fix(deps): update dependency send to v0.19.0 [security] fix(deps): update dependency send to v0.19.0 [security] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
@renovate renovate Bot deleted the renovate/npm-send-vulnerability branch March 27, 2026 01:48
@renovate renovate Bot changed the title fix(deps): update dependency send to v0.19.0 [security] - autoclosed fix(deps): update dependency send to v0.19.0 [security] Mar 30, 2026
@renovate renovate Bot reopened this Mar 30, 2026
@renovate renovate Bot force-pushed the renovate/npm-send-vulnerability branch 2 times, most recently from 6db1672 to fccf164 Compare March 30, 2026 21:27
@renovate renovate Bot changed the title fix(deps): update dependency send to v0.19.0 [security] fix(deps): update dependency send to v0.19.0 [security] - autoclosed Apr 27, 2026
@renovate renovate Bot closed this Apr 27, 2026
@renovate renovate Bot changed the title fix(deps): update dependency send to v0.19.0 [security] - autoclosed fix(deps): update dependency send to v0.19.0 [security] Apr 27, 2026
@renovate renovate Bot reopened this Apr 27, 2026
@renovate renovate Bot force-pushed the renovate/npm-send-vulnerability branch 2 times, most recently from fccf164 to 57b58c0 Compare April 27, 2026 20:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants