XMLBuilder, a popular Node.js library for programmatically constructing XML documents, saw a minor version update from 2.6.1 to 2.6.2 in March 2015. While both versions share the same core functionality as an XML builder and maintain the MIT license, repository, and author information, the key difference lies in their dependency on the lodash utility library. Version 2.6.1 relies on lodash version "~3.3.0", while version 2.6.2 updates this dependency to "~3.5.0".
For developers using XMLBuilder, this seemingly small change signifies potential improvements and bug fixes within the lodash library itself. Lodash is instrumental for XMLBuilder; because it is a dependency, any enhancement to lodash directly affects XMLBuilder’s performance and stability. Users are encouraged to upgrade to version 2.6.2 to leverage these underlying improvements, as lodash updates often address edge cases and refine existing functions, even without major XMLBuilder code changes.
Both versions are lightweight, given the focused dependency list—essentially lodash alongside development dependencies for testing (mocha) and CoffeeScript compilation. This tight footprint makes XMLBuilder attractive for projects prioritizing minimal dependencies and efficient XML generation directly through Javascript.
All the vulnerabilities related to the version 2.6.2 of the package
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
Prototype Pollution in lodash
Versions of lodash
before 4.17.11 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.11 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of Object
via __proto__
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.5 or later.
Prototype Pollution in lodash
Versions of lodash
before 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep
allows a malicious user to modify the prototype of Object
via {constructor: {prototype: {...}}}
causing the addition or modification of an existing property that will exist on all objects.
Update to version 4.17.12 or later.