Mocha, a flexible and feature-rich JavaScript testing framework, released version 6.2.2 as a minor update following version 6.2.1. Both versions maintain the core dependencies crucial for testing, such as he, ms, diff, glob, and debug, ensuring consistent functionality for users relying on these utilities. Developers using Mocha continue to benefit from its capabilities for unit testing, integration testing, and browser testing.
The primary changes between the two versions appear within the devDependencies section, which lists tools used for development, testing, and building Mocha itself. Version 6.2.2 updates jsdoc to version 3.6.3, while version 6.2.1 uses version 3.6.2. The @mocha/docdash dev dependency was also bumped up from 2.1.1 to 2.1.2. While seemingly minor, such updates within the development environment can include vital bug fixes, performance improvements, or new features for generating documentation. Specifically, jsdoc updates might address issues in documentation generation, potentially improving the clarity and accuracy of the documentation produced for Mocha itself. The @mocha/docdash is a JSDoc template, so its update can change the documentation esthetics.
Furthermore, the unpacked size of the package differs slightly between the two releases, with version 6.2.2 registering at 993172 bytes compared to version 6.2.1 at 991571 bytes. This difference, although small, could be attributed to bug fixes, enhanced documentation, or miniscule changes in the build process and its dependencies. Also the releaseDate is different with roughly one month of difference.
All the vulnerabilities related to the version 6.2.2 of the package
Regular Expression Denial of Service in debug
Affected versions of debug
are vulnerable to regular expression denial of service when untrusted user input is passed into the o
formatter.
As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.
This was later re-introduced in version v3.2.0, and then repatched in versions 3.2.7 and 4.3.1.
Version 2.x.x: Update to version 2.6.9 or later. Version 3.1.x: Update to version 3.1.0 or later. Version 3.2.x: Update to version 3.2.7 or later. Version 4.x.x: Update to version 4.3.1 or later.
Prototype Pollution in minimist
Affected versions of minimist
are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object
, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument --__proto__.y=Polluted
adds a y
property with value Polluted
to all objects. The argument --__proto__=Polluted
raises and uncaught error and crashes the application.
This is exploitable if attackers have control over the arguments being passed to minimist
.
Upgrade to versions 0.2.1, 1.2.3 or later.
Prototype Pollution in minimist
Minimist prior to 1.2.6 and 0.2.4 is vulnerable to Prototype Pollution via file index.js
, function setKey()
(lines 69-95).
minimatch ReDoS vulnerability
A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
yargs-parser Vulnerable to Prototype Pollution
Affected versions of yargs-parser
are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object
, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument --foo.__proto__.bar baz'
adds a bar
property with value baz
to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser
.
Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.
flat vulnerable to Prototype Pollution
flat helps flatten/unflatten nested Javascript objects. A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 can address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability.