PDavid commented on PR #6:
URL: https://github.com/apache/phoenix-site/pull/6#issuecomment-4125066973

   Hi @yuriipalam,
   
   Thanks for this, looks nice already.
   
   I found some links in the generated PDF 
(https://phoenix-beta.staged.apache.org/books/apache-phoenix-reference-guide.pdf)
 whihc points to localhost (for example Download, Issues, Source but also link 
to FAQs, etc):
   
   <img width="2103" height="1657" alt="image" 
src="https://github.com/user-attachments/assets/9de1b84e-d34f-4335-bd35-2d25672d55a7";
 />
   
   Can you please check these?
   
   Besides npm audit reports quite some vulnerable dependencies.
   
   ```
   npm audit
   # npm audit report
   
   ajv  <6.14.0 || >=7.0.0-alpha.0 <8.18.0
   Severity: moderate
   ajv has ReDoS when using `$data` option - 
https://github.com/advisories/GHSA-2g4f-4pwh-qvx6
   ajv has ReDoS when using `$data` option - 
https://github.com/advisories/GHSA-2g4f-4pwh-qvx6
   fix available via `npm audit fix`
   node_modules/ajv
   node_modules/serve/node_modules/ajv
     serve  7.0.0 - 14.2.5
     Depends on vulnerable versions of ajv
     Depends on vulnerable versions of serve-handler
     node_modules/serve
   
   flatted  <=3.4.1
   Severity: high
   flatted vulnerable to unbounded recursion DoS in parse() revive phase - 
https://github.com/advisories/GHSA-25h7-pfq9-p65f
   Prototype Pollution via parse() in NodeJS flatted - 
https://github.com/advisories/GHSA-rf6f-7fwh-wjgh
   fix available via `npm audit fix`
   node_modules/flatted
   
   minimatch  <=3.1.3 || 9.0.0 - 9.0.6
   Severity: high
   minimatch has a ReDoS via repeated wildcards with non-matching literal in 
pattern - https://github.com/advisories/GHSA-3ppc-4f35-3m26
   minimatch has a ReDoS via repeated wildcards with non-matching literal in 
pattern - https://github.com/advisories/GHSA-3ppc-4f35-3m26
   minimatch has ReDoS: matchOne() combinatorial backtracking via multiple 
non-adjacent GLOBSTAR segments - 
https://github.com/advisories/GHSA-7r86-cg39-jmmj
   minimatch has ReDoS: matchOne() combinatorial backtracking via multiple 
non-adjacent GLOBSTAR segments - 
https://github.com/advisories/GHSA-7r86-cg39-jmmj
   minimatch ReDoS: nested *() extglobs generate catastrophically backtracking 
regular expressions - https://github.com/advisories/GHSA-23c5-xmqv-rm74
   minimatch ReDoS: nested *() extglobs generate catastrophically backtracking 
regular expressions - https://github.com/advisories/GHSA-23c5-xmqv-rm74
   fix available via `npm audit fix`
   node_modules/@typescript-eslint/typescript-estree/node_modules/minimatch
   node_modules/minimatch
     serve-handler  1.1.0 - 6.1.6
     Depends on vulnerable versions of minimatch
     node_modules/serve-handler
   
   rollup  4.0.0 - 4.58.0
   Severity: high
   Rollup 4 has Arbitrary File Write via Path Traversal - 
https://github.com/advisories/GHSA-mw96-cpmx-2vgc
   fix available via `npm audit fix`
   node_modules/rollup
   
   tar  <=7.5.10
   Severity: high
   tar has Hardlink Path Traversal via Drive-Relative Linkpath - 
https://github.com/advisories/GHSA-qffp-2rhf-9h96
   node-tar Symlink Path Traversal via Drive-Relative Linkpath - 
https://github.com/advisories/GHSA-9ppj-qmqm-q256
   fix available via `npm audit fix`
   node_modules/tar
   
   7 vulnerabilities (1 moderate, 6 high)
   
   To address all issues, run:
     npm audit fix
   ```
   
   It can be reduced with `npm audit fix` to one moderate.
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to