fix(security): bump follow-redirects 1.15.x → 1.16.0 in examples/js (ENG-14502)#152
Conversation
…ENG-14502) GHSA-r4q5-vmmm-2653 — follow-redirects leaks custom auth headers to cross-domain redirect targets. Fix: >=1.16.0. Added npm override in examples/js/package.json; transitive dep via axios. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
|
Warning Rate limit exceeded
Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 4 minutes and 57 seconds. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: ⛔ Files ignored due to path filters (1)
📒 Files selected for processing (1)
✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
|
@KateZhang98 — SPOC review request. Reviewer assignment API returned empty (team-access-only repo). Please review and approve when ready. |
Vulnerability Fixed
Linear: ENG-14502
Root Cause
follow-redirects <=1.15.11only stripsauthorization,proxy-authorization, andcookieheaders on cross-domain redirects. Custom auth headers (e.g.X-API-Key,X-Auth-Token) are forwarded verbatim to the redirect target. Fix:>=1.16.0.follow-redirectsis a transitive dependency viaaxiosinexamples/js/.Fix
Added
"follow-redirects": "^1.16.0"tooverridesinexamples/js/package.json. Regeneratedpackage-lock.json— resolves to1.16.0.Changelog impact summary