chore(deps): update dependency serialize-javascript to v7 [security]#499
chore(deps): update dependency serialize-javascript to v7 [security]#499renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
|
There was a problem hiding this comment.
Important
Looks good to me! 👍
Reviewed everything up to e1c899b in 8 seconds. Click for details.
- Reviewed
13lines of code in1files - Skipped
1files when reviewing. - Skipped posting
0draft comments. View those below. - Modify your settings and rules to customize what types of comments Ellipsis leaves. And don't forget to react with 👍 or 👎 to teach Ellipsis.
Workflow ID: wflow_XnDO2vXslntf5xOv
You can customize by changing your verbosity settings, reacting with 👍 or 👎, replying to comments, or adding code review rules.
|
This pull request is automatically built and testable in CodeSandbox. To see build info of the built libraries, click here or the icon next to each commit SHA. |
|
Review the following changes in direct dependencies. Learn more about Socket for GitHub.
|
prettier-plugin-autocorrect
prettier-plugin-pkg
prettier-plugin-sh
prettier-plugin-sql
prettier-plugin-toml
commit: |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #499 +/- ##
=======================================
Coverage 86.69% 86.69%
=======================================
Files 10 10
Lines 203 203
Branches 57 57
=======================================
Hits 176 176
Misses 26 26
Partials 1 1 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
size-limit report 📦
|
e1c899b to
bb29e64
Compare
|



This PR contains the following updates:
^6.0.2→^7.0.0GitHub Vulnerability Alerts
GHSA-5c6j-r48x-rmvq
Impact
The serialize-javascript npm package (versions <= 7.0.2) contains a code injection vulnerability. It is an incomplete fix for CVE-2020-7660.
While
RegExp.sourceis sanitized,RegExp.flagsis interpolated directly into the generated output without escaping. A similar issue exists inDate.prototype.toISOString().If an attacker can control the input object passed to
serialize(), they can inject malicious JavaScript via the flags property of a RegExp object. When the serialized string is later evaluated (viaeval,new Function, or<script>tags), the injected code executes.Patches
The fix has been published in version 7.0.3. https://github.com/yahoo/serialize-javascript/releases/tag/v7.0.3
Release Notes
yahoo/serialize-javascript (serialize-javascript)
v7.0.3Compare Source
2e609d042b7cdbv7.0.2Compare Source
What's Changed
Full Changelog: yahoo/serialize-javascript@v7.0.1...v7.0.2
v7.0.1Compare Source
What's Changed
New Contributors
Full Changelog: yahoo/serialize-javascript@v7.0.0...v7.0.1
v7.0.0Compare Source
Breaking Changes
What's Changed
New Contributors
Full Changelog: yahoo/serialize-javascript@v6.0.2...v7.0.0
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.