React-dev-utils is a valuable collection of utilities, specifically designed to enhance the development experience when building React applications with Webpack, particularly those created with Create React App. Examining versions 0.4.1 and 0.4.2, we see minimal changes on the surface. Both share identical dependencies – opn, chalk, ansi-html, strip-ansi, html-entities, sockjs-client, and escape-string-regexp—indicating the core functionality and external library reliance remained consistent between releases. This means developers upgrading from 0.4.1 to 0.4.2 wouldn't encounter breaking changes related to dependency updates, allowing for a smooth transition.
However, the key distinction lies in the repository field. Version 0.4.1 used git+https://github.com/facebookincubator/create-react-app.git while version 0.4.2 uses https://github.com/facebookincubator/create-react-app. While seemingly minor, this difference can affect how Git clients interact with the repository, potentially related to protocol handling or compatibility. Also release date difference between the two versions, with version 0.4.2 being released on December 11, 2016, a few days after version 0.4.1 released on December 7, 2016, hints at a quick patch or minor update. If you're using Create React App or heavily rely on these utilities and experience repository-related issues in version 0.4.1, upgrading to 0.4.2 might resolve them. Essentially, while the core functionality remained the same, behind-the-scenes repository changes could impact certain development workflows. Developers looking for stability and relying on standard Git practices will appreciate these incremental refinements.
All the vulnerabilities related to the version 0.4.2 of the package
react-dev-utils OS Command Injection in function getProcessForPort
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort
, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
Uncontrolled Resource Consumption in ansi-html
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
Exposure of Sensitive Information in eventsource
When fetching an url with a link to an external site (Redirect), the users Cookies & Autorisation headers are leaked to the third party application. According to the same-origin-policy, the header should be "sanitized."