🚨 [security] Upgrade jsonwebtoken: 8.5.1 → 9.0.0 (major) #375
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🚨 Your current dependencies have known security vulnerabilities 🚨
This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!
Here is everything you need to know about this upgrade. Please take a good look at what changed and the test results before merging this pull request.
What changed?
✳️ jsonwebtoken (8.5.1 → 9.0.0) · Repo · Changelog
Security Advisories 🚨
🚨 jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC
🚨 jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()
🚨 jsonwebtoken unrestricted key type could lead to legacy keys usage
🚨 jsonwebtoken has insecure input validation in jwt.verify function
Commits
See the full diff on Github. The new version differs by 17 commits:
Merge pull request from GHSA-8cf7-32gw-wr33
chore(ci): remove github test actions job (#861)
chore(ci): configure Github Actions jobs for Tests & Security Scanning (#856)
fix!: Prevent accidental use of insecure key sizes & misconfiguration of secrets (#852)
fix(sign&verify)!: Remove default `none` support from `sign` and `verify` methods, and require it to be explicitly configured (#851)
Upload OpsLevel YAML (#849)
docs: update references vercel/ms references (#770)
docs: document "invalid token" error
docs: fix spelling in README.md: Peak -> Peek (#754)
docs: make decode impossible to discover before verify
refactor: make decode non-enumerable
docs: add jwtid to options of jwt.verify (#704)
Replace tilde-indexOf with includes (#647)
Adds not to README on decoded payload validation (#646)
docs: fix tiny style change in readme (#622)
style: add missing semicolon (#641)
ci: use circleci (#589)
Depfu will automatically keep this PR conflict-free, as long as you don't add any commits to this branch yourself. You can also trigger a rebase manually by commenting with
@depfu rebase
.All Depfu comment commands