Ant Design evolved from version 0.8.0 to 0.9.0, showcasing notable refinements valuable for developers. Core UI components received updates, with rc-steps progressing from version 1.1.4 to 1.2.3 and rc-table advancing from 3.1.0 to 3.2.0, potentially introducing new features or bug fixes. rc-calendar went from 3.15.0 to 3.16.1. A significant change involves dependency management: version 0.8.0 relied on xhr2 and reqwest, while version 0.9.0 transitioned to reqwest-without-xhr2, indicating a shift in handling HTTP requests and potentially reducing bundle size by externalizing xhr2.
On the development tooling front, both versions maintain similar setups with less, babel, webpack, and eslint but subtle changes appear in packages like eslint-plugin-react which goes from ~3.2.2 to ~3.3.1. Developers integrating Ant Design should particularly note the change in the request dependency and review component-specific updates for potential breaking changes or new functionalities introduced between these versions. The presence of webpack-dev-middleware and extract-text-webpack-plugin highlights a commitment to efficient development workflows and optimized asset delivery, critical for modern web applications. These incremental updates demonstrate Ant Design's continuous improvement, making it a reliable choice for building robust and visually appealing user interfaces.
All the vulnerabilities related to the version 0.9.0 of the package
superagent vulnerable to zip bomb attacks
Affected versions of superagent
do not check the post-decompression size of ZIP compressed HTTP responses prior to decompressing. This results in the package being vulnerable to a ZIP bomb attack, where an extremely small ZIP file becomes many orders of magnitude larger when decompressed.
This may result in unrestrained CPU/Memory/Disk consumption, causing a denial of service condition.
Update to version 3.7.0 or later.
Prototype Pollution Protection Bypass in qs
Affected version of qs
are vulnerable to Prototype Pollution because it is possible to bypass the protection. The qs.parse
function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing [
or ]
may bypass the prototype pollution protection and alter the Object prototype. This allows attackers to override properties that will exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
Upgrade to 6.0.4, 6.1.2, 6.2.3, 6.3.2 or later.
qs vulnerable to Prototype Pollution
qs before 6.10.3 allows attackers to cause a Node process hang because an __ proto__
key can be used. In many typical web framework use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000
. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4.
mime Regular Expression Denial of Service when MIME lookup performed on untrusted user input
Affected versions of mime
are vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
Update to version 2.0.3 or later.
Prototype Pollution in extend
Versions of extend
prior to 3.0.2 (for 3.x) and 2.0.2 (for 2.x) are vulnerable to Prototype Pollution. The extend()
function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
If you're using extend
3.x upgrade to 3.0.2 or later.
If you're using extend
2.x upgrade to 2.0.2 or later.
cookiejar Regular Expression Denial of Service via Cookie.parse function
Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse
function and other aspects of the API, which use an insecure regular expression for parsing cookie values. Applications could be stalled for extended periods of time if untrusted input is passed to cookie values or attempted to parse from request headers.
Proof of concept:
ts\nconst { CookieJar } = require("cookiejar");
const jar = new CookieJar();
const start = performance.now();
const attack = "a" + "t".repeat(50_000);
jar.setCookie(attack);
console.log(`CookieJar.setCookie(): ${performance.now() - start}ms`);
CookieJar.setCookie(): 2963.214399999939ms