chore(deps): update dependency @sveltejs/kit to v2.8.3 [security] #91
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.0.0
->2.8.3
GitHub Vulnerability Alerts
CVE-2024-23641
Summary
In SvelteKit 2 sending a GET request with a body eg
{}
to a SvelteKit app in preview or withadapter-node
throwsRequest with GET/HEAD method cannot have body.
and crashes the app.TRACE
requests will also cause the app to crash. Prerendered pages and SvelteKit 1 apps are not affected.PoC
First do a fresh install of SvelteKit 2 with the example app. Typescript.
npm run build
npm run preview
Impact
Denial of Service for apps using
adapter-node
CVE-2024-53262
Summary
The static error.html template for errors contains placeholders that are replaced without escaping the content first.
Details
From https://kit.svelte.dev/docs/errors:
This leads to possible injection if an app explicitly creates an error with a message that contains user controlled content that ends up being something like this inside a server handle function:
Uncaught errors cannot be exploited like this, as they always render the message "Internal error".
Escaping the message string in the function that creates the html output can be done to improve safety for applications that are using custom errors on the server.
PoC
None provided
Impact
Only applications where user provided input is used in the
Error
message will be vulnerable, so the vast majority of applications will not be vulnerableCVE-2024-53261
Summary
"Unsanitized input from the request URL flows into
end
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS)."Details
Source of potentially tainted data is in
packages/kit/src/exports/vite/dev/index.js
, line 437. This potentially tainted data is passed through a number of steps (which I could detail if you'd like) all the way down to line 91 inpackages/kit/src/exports/vite/utils.js
, which performs an operation that Snyk believes an attacker shouldn't be allowed to manipulate.Another source of potentially tainted data (according to Snyk) comes from
packages/kit/src/exports/vite/utils.js
, line 30, col 30 (i.e., theurl
property ofreq
). This potentially tainted data is passed through a number of steps (which I could detail if you'd like) all the way down line 91 inpackages/kit/src/exports/vite/utils.js
, which performs an operation that Snyk believes an attacker shouldn't be allowed to manipulate.PoC
Not provided
Impact
Little to none. The Vite development is not exposed to the network by default. And even if someone were able to trick a developer into executing an XSS against themselves, a development database should not have any sensitive data.
Release Notes
sveltejs/kit (@sveltejs/kit)
v2.8.3
Compare Source
Patch Changes
fix: ensure error messages are escaped (#13050)
fix: escape values included in dev 404 page (#13039)
v2.8.2
Compare Source
Patch Changes
fix: prevent duplicate fetch request when using Request with load function's fetch (#13023)
fix: do not override default cookie decoder to allow users to override the
cookie
library version (#13037)v2.8.1
Compare Source
Patch Changes
fix: only add nonce to
script-src-elem
,style-src-attr
andstyle-src-elem
CSP directives whenunsafe-inline
is not present (#11613)fix: support HTTP/2 in dev and production. Revert the changes from #12907 to downgrade HTTP/2 to TLS as now being unnecessary (#12989)
v2.8.0
Compare Source
Minor Changes
ActionFailure
objects (#12878)v2.7.7
Compare Source
Patch Changes
v2.7.6
Compare Source
Patch Changes
v2.7.5
Compare Source
Patch Changes
fix: warn on invalid cookie name characters (#12806)
fix: when using
@vitejs/plugin-basic-ssl
, set a no-op proxy config to downgrade from HTTP/2 to TLS sinceundici
does not yet enable HTTP/2 by default (#12907)v2.7.4
Compare Source
Patch Changes
fix: ensure element is focused after subsequent clicks of the same hash link (#12866)
fix: avoid preload if event default was prevented for
touchstart
andmousedown
events (#12887)fix: avoid reloading behaviour for hash links with data-sveltekit-reload if the hash is on the same page (#12866)
v2.7.3
Compare Source
Patch Changes
fix: include importer in illegal import error message (#12820)
fix: don't try reading assets directly that aren't present (#12876)
fix: decode non-latin characters when previewing prerendered pages (#12874)
fix: better error message when a
Result
is returned from a form action (#12829)docs: update URLs for new svelte.dev site (#12857)
v2.7.2
Compare Source
Patch Changes
v2.7.1
Compare Source
Patch Changes
chore: upgrade to sirv 3.0 (#12796)
fix: warn when form action responses are lost because SSR is off (#12063)
v2.7.0
Compare Source
Minor Changes
Patch Changes
fix: correctly handle relative paths when fetching assets on the server (#12113)
fix: decode non ASCII anchor hashes when scrolling into view (#12699)
fix: page response missing CSP and Link headers when return promise in
load
(#12418)v2.6.4
Compare Source
Patch Changes
fix: only preload links that have a different URL than the current page (#12773)
fix: revert change to replace version in generateBundle (#12779)
fix: catch stack trace fixing errors thrown in web containers (#12775)
fix: use absolute links in JSDoc comments (#12772)
v2.6.3
Compare Source
Patch Changes
fix: ensure a changing
version
doesn't affect the hashes for chunks without any actual code changes (#12700)fix: prevent crash when logging URL search params in a server load function (#12763)
chore: revert update dependency cookie to ^0.7.0 (#12767)
v2.6.2
Compare Source
Patch Changes
v2.6.1
Compare Source
Patch Changes
v2.6.0
Compare Source
Minor Changes
load
functions (#12716)Patch Changes
<form target="_blank">
and ` submissions (#11936)v2.5.28
Compare Source
Patch Changes
node:process
instead of using globals (#12641)v2.5.27
Compare Source
Patch Changes
fix: asynchronously instantiate components when using Svelte 5 (#12613)
fix: use
{@​render ...}
tag when generating default fallback page for svelte 5 apps (#12653)fix: emulate
event.platform
even when the route does not exist (#12513)v2.5.26
Compare Source
Patch Changes
v2.5.25
Compare Source
Patch Changes
6056ba30e29ac5747c356fbf1a42dd71f2c4aa1f
)v2.5.24
Compare Source
Patch Changes
v2.5.23
Compare Source
Patch Changes
root.svelte
instead ofsvelte:component
for svelte 5 (#12584)v2.5.22
Compare Source
Patch Changes
v2.5.21
Compare Source
Patch Changes
v2.5.20
Compare Source
Patch Changes
v2.5.19
Compare Source
Patch Changes
binding_non_reactive
warning in generated root component (you also need to update to[email protected]
) (#12524)v2.5.18
Compare Source
Patch Changes
fix: respect HTML attributes
enctype
andformenctype
for forms withuse:enhance
(#12198)fix: prevent client import error when a
hooks.server
file imports a private environment variable (#12195)fix: set default
Content-Type
header toapplication/x-www-form-urlencoded
forPOST
form submissions withuse:enhance
to align with native form behaviour (#12198)v2.5.17
Compare Source
Patch Changes
v2.5.16
Compare Source
Patch Changes
v2.5.15
Compare Source
Patch Changes
v2.5.14
Compare Source
Patch Changes
v2.5.13
Compare Source
Patch Changes
v2.5.12
Compare Source
Patch Changes
v2.5.11
Compare Source
Patch Changes
fix: hrefs that start with
config.prerender.origin
are now crawled (#12277)chore: add keywords for discovery in npm search (#12330)
fix: handle whitespace in HTTP Accept header (#12292)
v2.5.10
Compare Source
Patch Changes
fix: exclude server files from optimizeDeps.entries (#12242)
fix: bump import-meta-resolve to remove deprecation warnings (#12240)
v2.5.9
Compare Source
Patch Changes
fix: yield main thread before navigating (#12225)
fix: correctly handle aliases to files in the
.svelte-kit
directory (#12220)v2.5.8
Compare Source
Patch Changes
v2.5.7
Compare Source
Patch Changes
v2.5.6
Compare Source
Patch Changes
fetch
(#11904)v2.5.5
Compare Source
Patch Changes
v2.5.4
Compare Source
Patch Changes
data-sveltekit-preload-data
fails to fetch due to network error (#11944)v2.5.3
Compare Source
Patch Changes
fix: revert tsconfig change that includes svelte.config.js (#11908)
fix: exclude server worker from tsconfig again (#11727)
v2.5.2
Compare Source
Patch Changes
v2.5.1
Compare Source
Patch Changes
fix: prevent stale values after invalidation (#11870)
fix: prevent false positive
history.pushState
andhistory.replaceState
warnings (#11858)fix: relax status code types (#11781)
fix:
popstate
navigations takepushState
navigations into account (#11765)v2.5.0
Compare Source
Minor Changes
Patch Changes
/@​fs
prefix correctly on Windows when invokingread()
in dev mode (#11728)v2.4.3
Compare Source
Patch Changes
v2.4.2
Compare Source
Patch Changes
v2.4.1
Compare Source
Patch Changes
fix: use Vite's default value for
build.target
and respect override supplied by user (#11688)fix: properly decode base64 strings inside
read
(#11682)fix: default route config to
{}
for feature checking (#11685)fix: handle
onNavigate
callbacks correctly (#11678)v2.4.0
Compare Source
Minor Changes
$app/server
module withread
function for reading assets from filesystem (#11649)v2.3.5
Compare Source
Patch Changes
v2.3.4
Compare Source
Patch Changes
history
methods so other libs can monkeypatch it (#11657)v2.3.3
Compare Source
Patch Changes
__sveltekit/
module declarations from types (#11620)v2.3.2
Compare Source
Patch Changes
fix: return plaintext 404 for anything under appDir (#11597)
fix: populate dynamic public env without using top-level await, which fails in Safari (#11601)
v2.3.1
Compare Source
Patch Changes
fix: amend onNavigate type (#11599)
fix: better error message when peer dependency cannot be found (#11598)
v2.3.0
Compare Source
Minor Changes
reroute
hook (#11537)v2.2.2
Compare Source
Patch Changes
style-src
CSP directive whenunsafe-inline
is not present (#11575)v2.2.1
Compare Source
Patch Changes
feat: add CSP support for style-src-elem (#11562)
fix: address CSP conflicts with sha/nonce during dev (#11562)
v2.2.0
Compare Source
Minor Changes
$env/static/public
in service workers (#10994)Patch Changes
document.URL
contains credentials (#11179)v2.1.2
Compare Source
Patch Changes
v2.1.1
Compare Source
Patch Changes
fix: respect the trailing slash option when navigating from the basepath root page (#11388)
chore: shrink error messages shipped to client (#11551)
v2.1.0
Compare Source
Minor Changes
Patch Changes
v2.0.8
Compare Source
Patch Changes
fix: always scroll to top when clicking a # or #top link (
099608c428a49504785eab3afe3b2e76a9317bdf
)fix: add nonce or hash to "script-src-elem", "style-src-attr" and "style-src-elem" if defined in CSP config (#11485)
fix: decode server data with
stream: true
during client-side navigation (#11409)fix: capture scroll position when using
pushState
(#11540)chore: use peer dependencies when linked (#11433)
v2.0.7
Compare Source
Patch Changes
v2.0.6
Compare Source
Patch Changes
v2.0.5
Compare Source
Patch Changes
fix: render SPA shell when SSR is turned off and there is no server data (#11405)
fix: upgrade
sirv
andmrmime
to modernize javascript mime type (#11419)v2.0.4
Compare Source
Patch Changes
chore: update primary branch from master to main (
47779436c5f6c4d50011d0ef8b2709a07c0fec5d
)fix: adjust missing inner content warning (#11394)
fix: prevent esbuild adding phantom exports to service worker (#11400)
fix: goto type include state (#11398)
fix: ensure assets are served gzip in preview (#11377)
v2.0.3
Compare Source
Patch Changes
v2.0.2
Compare Source
Patch Changes
v2.0.1
Compare Source
Patch Changes
Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Prague, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.