mirror of
https://github.com/expressjs/expressjs.com.git
synced 2026-02-21 19:41:33 +00:00
docs: update security updates documentation for Express (#1800)
This commit is contained in:
committed by
GitHub
parent
7f9b0d89b0
commit
f3b92d9015
@@ -15,11 +15,29 @@ Node.js vulnerabilities directly affect Express. Therefore, [keep a watch on Nod
|
||||
|
||||
The list below enumerates the Express vulnerabilities that were fixed in the specified version update.
|
||||
|
||||
**NOTE**: If you believe you have discovered a security vulnerability in Express, please see
|
||||
|
||||
{% capture security-policy %}
|
||||
If you believe you have discovered a security vulnerability in Express, please see
|
||||
[Security Policies and Procedures](/{{page.lang}}/resources/contributing.html#security-policies-and-procedures).
|
||||
{% endcapture %}
|
||||
|
||||
{% include admonitions/note.html content=security-policy %}
|
||||
|
||||
## 4.x
|
||||
|
||||
* 4.21.2
|
||||
* The dependency `path-to-regexp` has been updated to address a [vulnerability](https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w).
|
||||
* 4.21.1
|
||||
* The dependency `cookie` has been updated to address a [vulnerability](https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x), This may affect your application if you use `res.cookie`.
|
||||
* 4.20.0
|
||||
* Fixed XSS vulnerability in `res.redirect` ([advisory](https://github.com/expressjs/express/security/advisories/GHSA-qw6h-vgh9-j6wx), [CVE-2024-43796](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43796)).
|
||||
* The dependency `serve-static` has been updated to address a [vulnerability](https://github.com/advisories/GHSA-cm22-4g7w-348p).
|
||||
* The dependency `send` has been updated to address a [vulnerability](https://github.com/advisories/GHSA-m6fv-jmcg-4jfg).
|
||||
* The dependency `path-to-regexp` has been updated to address a [vulnerability](https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598j).
|
||||
* The dependency `body-parser` has been updated to addres a [vulnerability](https://github.com/advisories/GHSA-qwcr-r2fm-qrc7), This may affect your application if you had url enconding activated.
|
||||
* 4.19.0, 4.19.1
|
||||
* Fixed open redirect vulnerability in `res.location` and `res.redirect` ([advisory](https://github.com/expressjs/express/security/advisories/GHSA-rv95-896h-c2vc), [CVE-2024-29041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29041)).
|
||||
* 4.17.3
|
||||
* The dependency `qs` has been updated to address a [vulnerability](https://github.com/advisories/GHSA-hrpp-h998-j3pp). This may affect your application if the following APIs are used: `req.query`, `req.body`, `req.param`.
|
||||
* 4.16.0
|
||||
* The dependency `forwarded` has been updated to address a [vulnerability](https://npmjs.com/advisories/527). This may affect your application if the following APIs are used: `req.host`, `req.hostname`, `req.ip`, `req.ips`, `req.protocol`.
|
||||
* The dependency `mime` has been updated to address a [vulnerability](https://npmjs.com/advisories/535), but this issue does not impact Express.
|
||||
|
||||
Reference in New Issue
Block a user