Csvtojson version 0.5.13 represents a minor update to the popular Node.js package designed for converting CSV data into JSON format. Comparing it to the previous stable version, 0.5.12, reveals a key enhancement: the addition of minimist as a dependency. This suggests that version 0.5.13 likely introduces improved command-line argument parsing capabilities, potentially offering users more flexibility in how they configure and execute CSV-to-JSON conversions directly from the command line. Developers who prefer scripting their data transformations will find this particularly beneficial. Both versions share the core functionality of providing a customized parser for tailored conversions, with async handling asynchronous operations effectively. The development dependencies, including Grunt for task automation, Browserify for bundling, and Mocha for testing, remain consistent, indicating a focus on maintaining code quality and a robust development workflow. While minimist is the primary change, users upgrading should consider improved command-line options and potential refinements to argument handling. This update reinforces csvtojson as a versatile tool for developers seeking efficient and configurable CSV-to-JSON conversion solutions within Node.js environments; especially those who value flexibility in scripting data transformations. Existing users should verify the new command-line behaviour and integrate the new options in their workflow.
All the vulnerabilities related to the version 0.5.13 of the package
CSVTOJSON has a prototype pollution vulnerability
The csvtojson package, a tool for converting CSV data to JSON with customizable parsing capabilities, contains a prototype pollution vulnerability in versions prior to 2.0.10. This issue arises due to insufficient sanitization of nested header names during the parsing process in the parser_jsonarray component. When processing CSV input containing specially crafted header fields that reference prototype chains (e.g., using proto syntax), the application may unintentionally modify properties of the base Object prototype. This vulnerability can lead to denial of service conditions or unexpected behavior in applications relying on unmodified prototype chains, particularly when untrusted CSV data is processed. The flaw does not require user interaction beyond providing a maliciously constructed CSV file.