Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency sinatra to v4 [security] #746

Closed
wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jan 9, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
sinatra (source, changelog) "~> 3.0" -> "~> 4.1" age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-21510

Versions of the package sinatra from 0.0.0 are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the X-Forwarded-Host (XFH) header. When making a request to a method with redirect applied, it is possible to trigger an Open Redirect Attack by inserting an arbitrary address into this header. If used for caching purposes, such as with servers like Nginx, or as a reverse proxy, without handling the X-Forwarded-Host header, attackers can potentially exploit Cache Poisoning or Routing-based SSRF.


Release Notes

sinatra/sinatra (sinatra)

v4.1.0

Compare Source

  • New: Add host_authorization setting (#​2053)
    • Defaults to .localhost, .test and any IP address in development mode.
    • Security: addresses CVE-2024-21510.
  • Fix: Return an instance of Sinatra::IndifferentHash when calling #except (#​2044)
  • Fix: Address warning from URI for Ruby 3.4 (#​2060)
  • Fix: rackup no longer depends on WEBrick, recommend Puma instead (4a558503)
  • Fix: Zeitwerk 2.7.0+ compatibility (#​2050)
  • Fix: Address warning about Hash construction for Ruby 3.4 (#​2028)
  • Fix: Declare missing dependencies for Ruby 3.5 (#​2032)
  • Fix: Compatibility with --enable-frozen-string-literal (#​2033)
  • Fix: Rack 3.1 compatibility (#​2035)
    • Don't depend on Rack::Logger
    • Don't delete content-length header when Rack::Files is used

v4.0.0

Compare Source

  • New: Add support for Rack 3 (#​1857)

  • Require Ruby 2.7.8 as minimum Ruby version (#​1993)

  • Breaking change: Drop support for Rack 2 (#​1857)

    • Note: when using Sinatra to start the web server, you now need the rackup gem installed
  • Breaking change: Remove the IndifferentHash initializer (#​1982)

  • Breaking change: Disable session_hijacking protection by default (#​1984)

  • Breaking change: Remove Rack::Protection::EncryptedCookie (#​1989)

    • Note: cookies are still encrypted (by [Rack::Session::Cookie][Rack::Session::Cookie])

v3.2.0

Compare Source

  • New: Add #except method to Sinatra::IndifferentHash (#​1940)

  • New: Use Exception#detailed_message to show backtrace (#​1952)

  • New: Add Sinatra::HamlHelpers to sinatra-contrib (#​1960)

  • Fix: Add base64 to rack-protection runtime dependencies (#​1946)

  • Fix: Avoid open-ended dependencies for sinatra-contrib and rack-protection (#​1949)

  • Fix: Helpful message when Sinatra::Runner times out (#​1975)

  • Fix: Ruby 3.3 + Bundler 2.5 compatibility (#​1975)

v3.1.0

Compare Source

  • New: Add sass support via sass-embedded #​1911 by なつき

  • New: Add start and stop callbacks #​1913 by Jevin Sew

  • New: Warn on dropping sessions #​1900 by Jonathan del Strother

  • New: Make Puma the default server #​1924 by Patrik Ragnarsson

  • Fix: Remove use of Tilt::Cache #​1922 by Jeremy Evans (allows use of Tilt 2.2.0 without deprecation warning)

  • Fix: rack-protection: specify rack version requirement #​1932 by Patrik Ragnarsson

v3.0.6

Compare Source

  • Fix: Add support to keep open streaming connections with Puma #​1858 by Jordan Owens

  • Fix: Avoid crash in uri helper on Integer input #​1890 by Patrik Ragnarsson

  • Fix: Rescue RuntimeError when trying to use SecureRandom #​1888 by Stefan Sundin

v3.0.5

Compare Source

  • Fix: Add Zeitwerk compatibility. #​1831 by Dawid Janczak

  • Fix: Allow CALLERS_TO_IGNORE to be overridden

v3.0.4

Compare Source

  • Fix: Escape filename in the Content-Disposition header. #​1841 by Kunpei Sakai

v3.0.3

Compare Source

v3.0.2

Compare Source

  • New: Add Haml 6 support. #​1820 by Jordan Owens

v3.0.1

Compare Source

  • Fix: Revert removal of rack-protection.rb. #​1814 by Olle Jonsson

  • Fix: Revert change to server start and stop messaging by using Kernel#warn. Renamed internal warn method warn_for_deprecation. #​1818 by Jordan Owens


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/rubygems-sinatra-vulnerability branch from 9afa1f1 to eedc443 Compare January 9, 2025 23:54
@impurist
Copy link
Contributor

We cannot upgraded Sinatra until we migrate to Rack 3.
This is primarily blocked by lack of support for Rack 3 in webmachine-ruby

@impurist impurist closed this Jan 10, 2025
Copy link
Contributor Author

renovate bot commented Jan 10, 2025

Renovate Ignore Notification

Because you closed this PR without merging, Renovate will ignore this update. You will not get PRs for any future 4.x releases. But if you manually upgrade to 4.x then Renovate will re-enable minor and patch updates automatically.

If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR.

@renovate renovate bot deleted the renovate/rubygems-sinatra-vulnerability branch January 10, 2025 00:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant