Brace expansion is a lightweight npm package providing brace expansion functionality, mirroring the behavior found in shells like sh and bash. Version 1.1.2 introduces a notable update in its dependencies, specifically upgrading balanced-match from version ^0.2.0 to ^0.3.0. This dependency update likely incorporates bug fixes, performance improvements, or new features within the balanced-match package, potentially enhancing the reliability and capabilities of brace expansion itself. Furthermore, tape, the dev dependency, was bumped from ^3.0.3 to 4.2.2, indicating advancements in testing and quality assurance practices around the package.
While the core functionality of brace expansion remains consistent between versions 1.1.1 and 1.1.2, developers should consider the updated dependencies when upgrading. Verify that the changes in balanced-match are compatible with your existing usage patterns. If your project relies heavily on the nuanced behavior of brace expansion, thoroughly test the new version after upgrading to ensure a seamless transition. The MIT license provides developers with the flexibility to integrate brace expansion into various projects, both open-source and commercial. The package remains by Julian Gruber, a long time open source maintainer. The upgrade showcases active maintenance and a commitment to keeping dependencies up-to-date, contributing to the overall robustness and security of the brace-expansion package.
All the vulnerabilities related to the version 1.1.2 of the package
ReDoS in brace-expansion
Affected versions of brace-expansion
are vulnerable to a regular expression denial of service condition.
var expand = require('brace-expansion');
expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}');
Update to version 1.1.7 or later.
brace-expansion Regular Expression Denial of Service vulnerability
A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5
. It is recommended to upgrade the affected component.