Yargs 10.0.1 represents a minor update to the popular command-line argument parsing library, building upon the solid foundation established by version 10.0.0. While seemingly small, this patch release, deployed on October 19, 2017, one day after version 10.0.0, subtly refines the developer experience. Crucially, both versions share identical core dependencies, including y18n for internationalization, cliui for building command-line user interfaces, and yargs-parser which does the heavy lifting of parsing the arguments. The development dependencies also remain consistent, ensuring that the testing and building infrastructure is the same.
Given that both packages have the same dependencies and devDependencies, the update might contain minor bug fixes, performance enhancements, or documentation improvements not explicitly detailed in the metadata. Developers upgrading from earlier versions will benefit from the robust argument parsing, flexible command definition, and user-friendly help message generation offered by the yargs library. If you're already using yargs 10.0.0, upgrading to 10.0.1 is recommended, but the similar dependency lists suggest that the changes are only quality of life updates. The core functionality remains the same, so a switch would not be required. The MIT license continues to grant developers broad usage rights, and the project remains actively maintained on GitHub.
All the vulnerabilities related to the version 10.0.1 of the package
Regular Expression Denial of Service (ReDoS) in cross-spawn
Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
Denial of Service in mem
Versions of mem
prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its maxAge
property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging.
Upgrade to version 4.0.0 or later.
yargs-parser Vulnerable to Prototype Pollution
Affected versions of yargs-parser
are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object
, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument --foo.__proto__.bar baz'
adds a bar
property with value baz
to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser
.
Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.