chore(deps): bump lodash-es from 4.17.23 to 4.18.1 in /web#3
Closed
dependabot[bot] wants to merge 1 commit intomasterfrom
Closed
chore(deps): bump lodash-es from 4.17.23 to 4.18.1 in /web#3dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot[bot] wants to merge 1 commit intomasterfrom
Conversation
Bumps [lodash-es](https://github.com/lodash/lodash) from 4.17.23 to 4.18.1. - [Release notes](https://github.com/lodash/lodash/releases) - [Commits](lodash/lodash@4.17.23...4.18.1) --- updated-dependencies: - dependency-name: lodash-es dependency-version: 4.18.1 dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com>
TPTBusiness
added a commit
that referenced
this pull request
Apr 2, 2026
_safe_resolve(): - Add explicit security docstring with 6 validation steps - Add inline comments for each security check - Makes CodeQL recognize existing security measures get_job_options(): - Validate base_path is within current working directory - Use .resolve() and .relative_to() for path validation - Reject paths outside project directory - Show user-friendly error message via Streamlit Fixes GitHub Security Alert #3 (py/path-injection) Path traversal attacks via user-provided paths are now prevented. Co-authored-by: Qwen-Coder <qwen-coder@alibabacloud.com>
Contributor
Author
|
Looks like lodash-es is up-to-date now, so this is no longer needed. |
TPTBusiness
added a commit
that referenced
this pull request
Apr 2, 2026
- Upgrade Werkzeug from 2.3.8 to 3.1.6 (fixes all Werkzeug CVEs) - Upgrade Flask from 2.2.5 to 3.0.0+ (required for Werkzeug 3.x) - Add CVE-2024-49766 (safe_join UNC path bypass) to security notes - Update comments to reflect Flask 3.x compatibility Fixed CVEs: - CVE-2025-66221: Windows device names in safe_join() - CVE-2024-49766: safe_join UNC path bypass on Windows - CVE-2024-34069: Werkzeug debugger RCE - CVE-2024-49767: Resource exhaustion via multipart/form-data Fixes Dependabot Alerts #2, #3, #4
TPTBusiness
added a commit
that referenced
this pull request
Apr 2, 2026
- Use _safe_resolve() for job_path validation (line 198) - Fixes CodeQL py/path-injection warning (Alert #3) - Consistent with FT UI fix (commit d961ff9) Security improvements: - All user-provided paths now go through _safe_resolve() - Path traversal sequences rejected before filesystem access - Clear error message for invalid paths Fixes GitHub Code Scanning Alert #3 (py/path-injection)
TPTBusiness
added a commit
that referenced
this pull request
Apr 3, 2026
- Use os.path.realpath for full resolution (handles symlinks and ..) - Reject drive letters explicitly via os.path.splitdrive - Reject absolute paths via os.path.isabs (not Path.is_absolute) - Build candidate via os.path.join then resolve - Validate with Path.relative_to after realpath resolution - Fixes py/path-injection alert #3 - Preserves existing functionality
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps lodash-es from 4.17.23 to 4.18.1.
Release notes
Sourced from lodash-es's releases.
Commits
cb0b9b9release(patch): bump main to 4.18.1 (#6177)75535f5chore: prune stale advisory refs (#6170)62e91bcdocs: remove n_ Node.js < 6 REPL note from README (#6165)59be2derelease(minor): bump to 4.18.0 (#6161)af63457fix: broken tests for _.template 879aaa91073a76fix: linting issues879aaa9fix: validate imports keys in _.templatefe8d32efix: block prototype pollution in baseUnset via constructor/prototype traversal18ba0a3refactor(fromPairs): use baseAssignValue for consistent assignment (#6153)b819080ci: add dist sync validation workflow (#6137)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.