Xmlbuilder is a Node.js package designed to simplify the creation of XML documents programmatically. Comparing versions 2.6.1 and 2.6.0, the key difference lies in the dependency on the lodash library. Version 2.6.1 updates this dependency to ~3.3.0 from ~3.2.0 in version 2.6.0. This generally indicates a minor update bringing bug fixes or performance improvements from Lodash, potentially affecting the XML building process if the library is directly called.
For developers considering using xmlbuilder, this subtle change means ensuring compatibility with your existing project's Lodash version, especially if you are importing Lodash separately. Both versions are licensed under the MIT license, offering flexibility in commercial and personal projects. The package is maintained actively, with both version being released on the same day, just hours apart, suggesting a quick fix or refinement was necessary. The package's core functionality for building XML documents remains consistent between the two versions, therefore, the update doesn't drastically change its usage, still a good tool for generating XML strings or streams. Check your project's dependencies to avoid potential conflicts. The repository field points to the project's GitHub page, where you can find comprehensive documentation, example code, and contribution guidelines to effectively integrate xmlbuilder into your workflow.
All the vulnerabilities related to the version 2.6.1 of the package
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Prototype Pollution in lodash
Versions of lodash
before 4.17.11 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.11 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via __proto__
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.5 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep
allows a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.12 or later.