Shared security patch analysis results
AI Used: DEEPSEEK deepseek-chat--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/peggy-loader/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/peggy-loader/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/peggy-loader",- "version": "0.31.25",+ "version": "0.31.26", "description": "Peggy loader for webpack", "keywords": [ "peggy",
Based on the provided code diff, I'll analyze it for security fixes: 1. Vulnerability Existed: not sure [Dependency Update] [packages/peggy-loader/package.json] [Lines 2] [Old Code] "version": "0.31.25", [Fixed Code] "version": "0.31.26", Additional Details: - The diff shows only a version bump in the package.json file - No direct security vulnerability is evident from this change alone - Version bumps often include security fixes, but without seeing the changelog or commit messages, we can't be certain - The change could be related to security fixes in the underlying peggy-loader dependency, but we'd need more information to confirm Note: To properly assess if this was a security fix, we would need: 1. The changelog for peggy-loader between versions 0.31.25 and 0.31.26 2. The commit messages associated with this change 3. Any security advisories related to the previous version
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/gazzodown/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/gazzodown/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/gazzodown",- "version": "10.0.0",+ "version": "10.0.1", "private": true, "devDependencies": { "@babel/core": "~7.22.20",@@ -64,15 +64,17 @@ "@rocket.chat/css-in-js": "*", "@rocket.chat/fuselage": "*", "@rocket.chat/fuselage-tokens": "*",- "@rocket.chat/message-parser": "0.31.29",+ "@rocket.chat/message-parser": "0.31.30", "@rocket.chat/styled": "*",- "@rocket.chat/ui-client": "10.0.0",- "@rocket.chat/ui-contexts": "10.0.0",+ "@rocket.chat/ui-client": "10.0.1",+ "@rocket.chat/ui-contexts": "10.0.1", "katex": "*", "react": "*" }, "dependencies": {+ "@types/dompurify": "^3.0.5", "date-fns": "^3.3.1",+ "dompurify": "^3.1.6", "highlight.js": "^11.5.1", "react-error-boundary": "^3.1.4" },
Here's the analysis of the provided code diff for security fixes: 1. Vulnerability Existed: not sure Dependency Version Update [File] packages/gazzodown/package.json [Lines] 64, 66-67 [Old Code] `"@rocket.chat/message-parser": "0.31.29",` `"@rocket.chat/ui-client": "10.0.0",` `"@rocket.chat/ui-contexts": "10.0.0",` [Fixed Code] `"@rocket.chat/message-parser": "0.31.30",` `"@rocket.chat/ui-client": "10.0.1",` `"@rocket.chat/ui-contexts": "10.0.1",` [Additional Details] While version updates could indicate security fixes, we can't confirm without changelogs. 2. Vulnerability Existed: yes Missing DOM Purification [File] packages/gazzodown/package.json [Lines] 72-73 [Old Code] (No dompurify dependency) [Fixed Code] `"@types/dompurify": "^3.0.5",` `"dompurify": "^3.1.6",` [Additional Details] The addition of DOMPurify suggests protection against XSS vulnerabilities. 3. Vulnerability Existed: not sure General Dependency Updates [File] packages/gazzodown/package.json [Lines] 1 [Old Code] `"version": "10.0.0",` [Fixed Code] `"version": "10.0.1",` [Additional Details] Version bump might include security fixes but we can't confirm without more context. Note: The most significant security-related change appears to be the addition of DOMPurify, which is commonly used to prevent XSS attacks by sanitizing HTML content. The other version updates might include security fixes, but we'd need access to the projects' changelogs to confirm.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/ui-contexts/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/ui-contexts/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/ui-contexts",- "version": "10.0.0",+ "version": "10.0.1", "private": true, "devDependencies": { "@rocket.chat/core-typings": "workspace:^",
Based on the provided code diff, I'll analyze it for security vulnerabilities: 1. Vulnerability Existed: no Version Update [File] packages/ui-contexts/package.json [Lines 1-6] Old Code: "version": "10.0.0", Fixed Code: "version": "10.0.1", Additional Details: - The diff only shows a version number update from 10.0.0 to 10.0.1 - No dependency changes or security-related modifications are visible in this diff - Version updates alone don't necessarily indicate security fixes unless accompanied by changelog notes (which aren't provided) - The devDependencies section remains unchanged Since this is just a version bump with no other changes visible in the diff, there's no clear evidence of a security vulnerability being fixed. The version update could be for various reasons including non-security related bug fixes or feature improvements. Note: To make a more accurate assessment, we would need to see: 1. The complete package.json file (to check all dependencies) 2. The changelog or commit message associated with this version change 3. Any other files that might have been modified in this version update
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/apps/meteor/ee/server/services/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/apps/meteor/ee/server/services/package.json@@ -1,7 +1,7 @@ { "name": "rocketchat-services", "private": true,- "version": "1.3.3",+ "version": "1.3.4", "description": "Rocket.Chat Authorization service", "main": "index.js", "scripts": {
Analysis of the provided code diff: 1. Vulnerability Existed: not sure [Version Update] [apps/meteor/ee/server/services/package.json] [Lines 3] [Old Code] "version": "1.3.3", [Fixed Code] "version": "1.3.4", Additional Details: - The diff only shows a version number update from 1.3.3 to 1.3.4 in the package.json file - Without seeing the actual changes in the code or the changelog, we cannot determine if this version bump includes security fixes - Version updates often include security patches, but they can also include feature additions or bug fixes - No specific vulnerability can be identified from this limited information - The file being modified is related to Rocket.Chat's authorization service, which is security-sensitive, but we can't confirm any vulnerabilities were fixed based solely on the version change
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/fuselage-ui-kit/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/fuselage-ui-kit/CHANGELOG.md@@ -1,4 +1,17 @@ # Change Log++## 10.0.1++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 10.0.0
Analysis of the provided code diff: 1. Vulnerability Existed: no No specific vulnerability found in CHANGELOG.md File: packages/fuselage-ui-kit/CHANGELOG.md Lines: 1-17 Old Code: Basic changelog structure Fixed Code: Added dependency updates section This appears to be a routine update to the changelog file documenting dependency version updates. The changelog itself doesn't contain any code changes that would indicate security fixes. The updates to dependencies might include security fixes, but we can't determine that from just the changelog content. Note: While the changelog mentions updated dependencies, we cannot confirm if these updates include security fixes without examining the actual dependency changes or their respective changelogs.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/ee/apps/ddp-streamer/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/ee/apps/ddp-streamer/CHANGELOG.md@@ -1,4 +1,18 @@ # @rocket.chat/ddp-streamer++## 0.3.7++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.3.6
Based on the provided diff content, which only shows changes to a CHANGELOG.md file, I can analyze this as follows: Vulnerability Existed: no [No vulnerability found] [ee/apps/ddp-streamer/CHANGELOG.md] [Lines 1-18] [Old changelog content] [Updated changelog with dependency information] Additional Details: - The diff only shows version updates and dependency changes in a changelog file - No actual code changes are present that could indicate security fixes - Changelog updates typically don't contain vulnerability fixes themselves, though they may reference them - Without seeing the actual dependency updates or code changes, we cannot identify specific vulnerabilities from this changelog alone Note: While dependency updates might include security fixes, we cannot determine that from just the changelog content shown. The changelog itself doesn't reveal any security vulnerabilities.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/ee/packages/pdf-worker/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/ee/packages/pdf-worker/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/pdf-worker++## 0.2.4++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 0.2.3
Based on the provided diff, which only shows changes to a CHANGELOG.md file, I can analyze it as follows: Vulnerability Existed: no No vulnerability found [ee/packages/pdf-worker/CHANGELOG.md] [Lines 1-13] [Old changelog content] [Updated changelog with dependency information] Additional notes: 1. This is simply a changelog update showing a dependency version bump 2. No actual code changes are shown in the diff 3. The dependency update might be related to security fixes, but we can't determine that from just the changelog 4. Without seeing the actual code changes or more context about the dependency update, we can't identify any specific vulnerabilities
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/apps/meteor/tests/data/livechat/rooms.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/apps/meteor/tests/data/livechat/rooms.ts@@ -33,10 +33,10 @@ return response.body.room; };-export const createVisitor = (department?: string, visitorName?: string): Promise<ILivechatVisitor> =>+export const createVisitor = (department?: string, visitorName?: string, customEmail?: string): Promise<ILivechatVisitor> => new Promise((resolve, reject) => { const token = getRandomVisitorToken();- const email = `${token}@${token}.com`;+ const email = customEmail || `${token}@${token}.com`; const phone = `${Math.floor(Math.random() * 10000000000)}`; void request.get(api(`livechat/visitor/${token}`)).end((err: Error, res: DummyResponse<ILivechatVisitor>) => { if (!err && res && res.body && res.body.visitor) {
Analyzing the provided code diff, here's the security analysis: Vulnerability Existed: yes Insecure Default Email Generation [File] apps/meteor/tests/data/livechat/rooms.ts [Lines 33-40] [Old Code] export const createVisitor = (department?: string, visitorName?: string): Promise<ILivechatVisitor> => new Promise((resolve, reject) => { const token = getRandomVisitorToken(); const email = `${token}@${token}.com`; [Fixed Code] export const createVisitor = (department?: string, visitorName?: string, customEmail?: string): Promise<ILivechatVisitor> => new Promise((resolve, reject) => { const token = getRandomVisitorToken(); const email = customEmail || `${token}@${token}.com`; Additional Details: The vulnerability was related to hardcoded email generation which could lead to predictable patterns and potential security issues. The fix allows for custom email input while maintaining backward compatibility with the random generation as a fallback. This makes the system more flexible and secure by removing the predictable email pattern when needed.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/ui-client/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/ui-client/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/ui-client++## 10.0.1++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 10.0.0
Based on the provided diff, I'll analyze it for security fixes: Vulnerability Existed: no No specific vulnerability [packages/ui-client/CHANGELOG.md] [Lines 1-4] Old Code: # @rocket.chat/ui-client Fixed Code: # @rocket.chat/ui-client Additional Details: The diff only shows version updates and dependency changes in the changelog file. There are no code changes that would indicate security fixes. The update from 10.0.0 to 10.0.1 appears to be a routine dependency update without any security-related context provided in the changelog. Note: Changelog files typically document changes but don't contain the actual code fixes. To properly identify security vulnerabilities, we would need to see the actual code changes in the dependency updates rather than just the changelog entries.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/ee/apps/authorization-service/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/ee/apps/authorization-service/CHANGELOG.md@@ -1,4 +1,17 @@ # @rocket.chat/authorization-service++## 0.4.7++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.4.6
Based on the provided diff content, which only shows changes to a CHANGELOG.md file (a version history/documentation file), I can analyze that: Vulnerability Existed: no [No vulnerability found in changelog update] [ee/apps/authorization-service/CHANGELOG.md] [Lines 1-17] [Previous changelog content] [Updated changelog with dependency information] Additional details: - The diff only shows version history updates and dependency version bumps - No actual code changes are present in this diff - Changelog files typically don't contain vulnerabilities themselves - The update appears to be routine dependency version tracking Since this is purely documentation/version history update, there are no security fixes or vulnerabilities to analyze in this particular diff.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/ee/packages/omnichannel-services/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/ee/packages/omnichannel-services/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/omnichannel-services",- "version": "0.3.3",+ "version": "0.3.4", "private": true, "devDependencies": { "@rocket.chat/eslint-config": "workspace:^",
Let me analyze the provided code diff for security fixes. Vulnerability Existed: not sure [Dependency Version Update] [ee/packages/omnichannel-services/package.json] [Lines 2] [Old Code] "version": "0.3.3", [Fixed Code] "version": "0.3.4", Additional Details: - The diff shows only a version bump from 0.3.3 to 0.3.4 in the package.json file - Without seeing the changelog or commit messages, we can't be certain if this version change includes security fixes - Version bumps could include security fixes, but could also be for feature additions or bug fixes - No direct vulnerability indicators are visible in this limited diff - No dependency changes are shown in the visible portion of the diff Note: To make a more definitive assessment, we would need to see: 1. The full package.json file (to check all dependencies) 2. The changelog for version 0.3.4 3. Any associated commit messages explaining the version bump
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/ee/apps/presence-service/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/ee/apps/presence-service/CHANGELOG.md@@ -1,4 +1,17 @@ # @rocket.chat/presence-service++## 0.4.7++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.4.6
Based on the provided diff, this is a changelog update showing dependency updates. There's no actual code change shown, only version updates in the changelog file. Analysis: Vulnerability Existed: no No code vulnerability [ee/apps/presence-service/CHANGELOG.md] [Lines 1-17] [Old changelog content] [Updated changelog with dependency versions] Additional notes: - The diff only shows version updates in a changelog file - No actual code changes are present that could indicate security fixes - Dependency updates might include security fixes, but we can't determine that from just the changelog - Without seeing the actual dependency changes or code modifications, we can't identify specific vulnerabilities
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/ddp-client/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/ddp-client/CHANGELOG.md@@ -1,4 +1,15 @@ # @rocket.chat/ddp-client++## 0.3.7++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.3.6
Analysis of the provided code diff: 1. Vulnerability Existed: no This is a changelog update showing dependency version bumps. No code changes or security fixes are visible in this diff. The diff only shows updates to dependency versions in the changelog file (CHANGELOG.md). There are no actual code changes shown that would indicate security fixes or vulnerabilities being addressed. The changes are purely documentation updates reflecting version bumps of dependencies. Since this is just a changelog update with no code changes, there are no vulnerabilities to analyze in this diff. The format is maintained for consistency, but no vulnerability information can be extracted from this particular diff.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/ee/apps/presence-service/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/ee/apps/presence-service/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/presence-service", "private": true,- "version": "0.4.6",+ "version": "0.4.7", "description": "Rocket.Chat Presence service", "scripts": { "build": "tsc -p tsconfig.json",
Based on the provided diff, I'll analyze it for security fixes: Vulnerability Existed: not sure [Potential Dependency Update] [ee/apps/presence-service/package.json] [Lines 1-7] [Old Code] { "name": "@rocket.chat/presence-service", "private": true, "version": "0.4.6", "description": "Rocket.Chat Presence service", "scripts": { [Fixed Code] { "name": "@rocket.chat/presence-service", "private": true, "version": "0.4.7", "description": "Rocket.Chat Presence service", "scripts": { Additional Details: - The only change is a version bump from 0.4.6 to 0.4.7 - Without seeing the changelog or commit messages, we can't be certain if this includes security fixes - Version bumps often include security fixes, but could also be for feature additions or bug fixes - The package.json doesn't show any dependency changes which would be more indicative of security fixes
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/instance-status/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/instance-status/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/instance-status++## 0.1.7++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 0.1.6
Based on the provided diff content, which only shows changes to a CHANGELOG.md file (a documentation file), there are no code changes that could indicate security fixes. The changes only reflect dependency updates. Answer: Vulnerability Existed: no No code changes - only changelog update [packages/instance-status/CHANGELOG.md] [Lines 1-13] [Old changelog content] [Updated changelog with dependency information] Additional Notes: - The diff only shows documentation updates, not actual code changes - While dependency updates might sometimes indicate security fixes, the changelog doesn't specify security-related changes - Without seeing the actual dependency changes or code modifications, we can't determine if there were security fixes in the updated dependencies
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/api-client/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/api-client/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/api-client",- "version": "0.2.6",+ "version": "0.2.7", "devDependencies": { "@rocket.chat/jest-presets": "workspace:~", "@types/jest": "~29.5.12",
Based on the provided code diff, I'll analyze it for security fixes: 1. Vulnerability Existed: not sure [Dependency Update] [packages/api-client/package.json] [Lines 1-3] [Old Code] "version": "0.2.6", [Fixed Code] "version": "0.2.7", Additional Details: - The diff shows only a version bump from 0.2.6 to 0.2.7 in the package.json file - No actual dependency changes or security-related modifications are visible in this diff - Version bumps often include security fixes, but without seeing the changelog or commit messages, we can't be certain - No specific vulnerability name can be identified from this limited information Note: To properly assess security fixes, we would need either: 1. The full changelog for version 0.2.7 2. The complete diff including dependency updates 3. Commit messages explaining the version bump
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/gazzodown/src/katex/KatexBlock.tsx+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/gazzodown/src/katex/KatexBlock.tsx@@ -15,6 +15,7 @@ macros: { '\\href': '\\@secondoftwo', },+ maxSize: 100, }), [code], );
Here's the analysis following your requested format: Vulnerability Existed: yes Cross-Site Scripting (XSS) via KaTeX rendering [packages/gazzodown/src/katex/KatexBlock.tsx] [Lines around 15] [Old Code] macros: { '\\href': '\\@secondoftwo', }, [Fixed Code] macros: { '\\href': '\\@secondoftwo', }, maxSize: 100, Additional Details: 1. The vulnerability appears to be related to KaTeX rendering without size limitations, which could potentially be exploited for XSS attacks or denial of service by rendering extremely large equations. 2. The fix adds a `maxSize: 100` parameter to limit the maximum size of rendered equations, which helps mitigate potential XSS vectors and resource exhaustion attacks. 3. While not explicitly stated in the diff, this appears to be a security hardening measure against potential XSS via mathematical expression rendering. Note: The exact vulnerability name might be slightly different as this is a specific case of XSS prevention in mathematical rendering contexts. The change clearly indicates a security-conscious decision to limit rendering capabilities.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/apps/meteor/server/startup/migrations/xrun.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/apps/meteor/server/startup/migrations/xrun.ts@@ -2,6 +2,7 @@ import type { UpdateResult } from 'mongodb'; import { upsertPermissions } from '../../../app/authorization/server/functions/upsertPermissions';+import { settings } from '../../../app/settings/server'; import { migrateDatabase, onServerVersionChange } from '../../lib/migrations'; import { ensureCloudWorkspaceRegistered } from '../cloudRegistration';@@ -23,9 +24,12 @@ { _id: { $in: Array.from(maxAgeSettingMap.keys()) }, value: { $ne: -1 } }, { projection: { _id: 1, value: 1 } }, ).forEach(({ _id, value }) => {- if (!maxAgeSettingMap.has(_id)) {+ const newSettingId = maxAgeSettingMap.get(_id);+ if (!newSettingId) { throw new Error(`moveRetentionSetting - Setting ${_id} equivalent does not exist`); }++ const newValue = convertDaysToMs(Number(value)); promises.push( Settings.updateOne(@@ -34,11 +38,17 @@ }, { $set: {- value: convertDaysToMs(Number(value)),+ value: newValue, }, }, ), );++ const currentCache = settings.getSetting(newSettingId);+ if (!currentCache) {+ return;+ }+ settings.set({ ...currentCache, value: newValue }); }); await Promise.all(promises);
I'll analyze the code diff and provide the security assessment following the required format. Vulnerability Existed: not sure Potential Cache Inconsistency Issue [apps/meteor/server/startup/migrations/xrun.ts] [Lines 23-38] [Old Code] promises.push( Settings.updateOne( { _id: maxAgeSettingMap.get(_id), }, { $set: { value: convertDaysToMs(Number(value)), }, }, ), ); [Fixed Code] const newValue = convertDaysToMs(Number(value)); promises.push( Settings.updateOne( { _id: newSettingId, }, { $set: { value: newValue, }, }, ), ); const currentCache = settings.getSetting(newSettingId); if (!currentCache) { return; } settings.set({ ...currentCache, value: newValue }); Additional Details: The changes appear to address a potential cache inconsistency issue where database updates weren't properly reflected in the settings cache. The fix: 1. Extracts the value conversion to a separate variable for consistency 2. Adds explicit cache updates after database modifications 3. Adds null checks for the cache 4. Uses the cached value more carefully with proper spreading While this doesn't appear to be fixing a specific named vulnerability, it improves the reliability of settings updates which could prevent potential race conditions or inconsistencies between database and cached values. The changes make the system more robust against potential desynchronization issues. No clear security vulnerability is being fixed here, but the changes do improve the overall reliability of the system which could have security implications in edge cases.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/core-services/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/core-services/CHANGELOG.md@@ -1,4 +1,16 @@ # @rocket.chat/core-services++## 0.6.1++### Patch Changes++- <details><summary>Updated dependencies [3cbb9f6252]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.6.0
Based on the provided diff content, which only shows changes to a CHANGELOG.md file (a version history/documentation file), I can analyze this as follows: Vulnerability Existed: no No security vulnerability [packages/core-services/CHANGELOG.md] [Lines 1-16] [Old version history content] [Updated version history with new dependencies] Additional notes: 1. This appears to be a routine dependency version update in a changelog file 2. The diff doesn't show any actual code changes that could introduce or fix vulnerabilities 3. While dependency updates might include security fixes, the changelog itself doesn't indicate any security-related changes 4. Without seeing the actual dependency changes or code modifications, we can't assess any potential vulnerabilities that might have been fixed in those dependencies The changes shown are purely documentation updates reflecting version bumps in dependencies, with no evidence of security fixes in this particular file.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.0/Rocket.Chat-6.12.0/packages/message-parser/src/utils.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/6.12.1/Rocket.Chat-6.12.1/packages/message-parser/src/utils.ts@@ -198,21 +198,19 @@ export const reducePlainTexts = ( values: Paragraph['value'] ): Paragraph['value'] =>- values- .flatMap((item) => item)- .reduce((result, item, index, values) => {- const next = values[index + 1];- const current = joinEmoji(item, values[index - 1], next);- const previous: Inlines = result[result.length - 1];-- if (previous) {- if (current.type === 'PLAIN_TEXT' && current.type === previous.type) {- previous.value += current.value;- return result;- }+ values.flat().reduce((result, item, index, values) => {+ const next = values[index + 1];+ const current = joinEmoji(item, values[index - 1], next);+ const previous: Inlines = result[result.length - 1];++ if (previous) {+ if (current.type === 'PLAIN_TEXT' && current.type === previous.type) {+ previous.value += current.value;+ return result; }- return [...result, current];- }, [] as Paragraph['value']);+ }+ return [...result, current];+ }, [] as Paragraph['value']); export const lineBreak = (): LineBreak => ({ type: 'LINE_BREAK', value: undefined,@@ -249,3 +247,13 @@ fallback: plain(`<t:${value}:${type || 't'}>`), }; };++export const extractFirstResult = (+ value: Types[keyof Types]['value']+): Types[keyof Types]['value'] => {+ if (typeof value !== 'object' || !Array.isArray(value)) {+ return value;+ }++ return value.filter((item) => item).shift() as Types[keyof Types]['value'];+};
Let me analyze the code diff for security fixes: 1. Vulnerability Existed: not sure [Potential Array Handling Issue] [packages/message-parser/src/utils.ts] [Lines 198-219] [Old Code] values .flatMap((item) => item) .reduce((result, item, index, values) => { const next = values[index + 1]; const current = joinEmoji(item, values[index - 1], next); const previous: Inlines = result[result.length - 1]; if (previous) { if (current.type === 'PLAIN_TEXT' && current.type === previous.type) { previous.value += current.value; return result; } } return [...result, current]; }, [] as Paragraph['value']); [Fixed Code] values.flat().reduce((result, item, index, values) => { const next = values[index + 1]; const current = joinEmoji(item, values[index - 1], next); const previous: Inlines = result[result.length - 1]; if (previous) { if (current.type === 'PLAIN_TEXT' && current.type === previous.type) { previous.value += current.value; return result; } } return [...result, current]; }, [] as Paragraph['value']); 2. Vulnerability Existed: not sure [Potential Null Reference Issue] [packages/message-parser/src/utils.ts] [Lines 249-257] [Old Code] (No previous code - this is a new function) [Fixed Code] export const extractFirstResult = ( value: Types[keyof Types]['value'] ): Types[keyof Types]['value'] => { if (typeof value !== 'object' || !Array.isArray(value)) { return value; } return value.filter((item) => item).shift() as Types[keyof Types]['value']; }; The changes appear to be primarily code optimizations and additions rather than direct security fixes. The first change simplifies the array flattening operation, while the second adds a new utility function for safely extracting the first non-null item from an array. Neither change clearly addresses a known vulnerability, but they might help prevent potential edge cases in array handling.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and before is vulnerable to a message forgery / impersonation issue. Attackers can abuse the UpdateOTRAck method to send ephemeral messages as if they were any other user they choose.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to denial of service (DoS). Attackers who craft messages with specific characters may crash the workspace due to an issue in the message parser.
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier is vulnerable to DOM-based Cross-site Scripting (XSS). Attackers may be able to abuse the UpdateOTRAck method to forge a message that contains an XSS payload.