Yargs version 8.0.2 represents a minor update over its predecessor, 8.0.1, within the popular command-line argument parsing library. Both versions share the core functionality, providing a robust and pirate-themed approach to building interactive command-line interfaces. The dependencies remain consistent, encompassing essential modules like y18n for internationalization, cliui for creating well-structured command-line output, and yargs-parser for the underlying argument parsing logic. Developers can expect the same level of support for features like argument definition, parsing, and validation in both versions.
The primary distinctions lie in the realm of development dependencies. Specifically, standard-version sees an upgrade from version 4.0.0 in 8.0.1 to version 4.2.0 in 8.0.2. While this typically doesn't impact end-user functionality directly, it signifies improvements in the release and versioning process for the Yargs maintainers. This upgrade likely incorporates enhancements to the automated changelog generation, version bumping, and tagging procedures. Developers contributing to the Yargs project itself would find this change relevant, streamlining their workflow. This update suggests an ongoing commitment to refining the development and maintenance practices surrounding the Yargs library. The release date also indicates a maintenance release for bug fixes. For developers using Yargs, the jump from 8.0.1 to 8.0.2 should be seamless, offering identical core functionality with potential indirect benefits derived from refined development processes.
All the vulnerabilities related to the version 8.0.2 of the package
Regular Expression Denial of Service (ReDoS) in cross-spawn
Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
Denial of Service in mem
Versions of mem
prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its maxAge
property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging.
Upgrade to version 4.0.0 or later.
yargs-parser Vulnerable to Prototype Pollution
Affected versions of yargs-parser
are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object
, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument --foo.__proto__.bar baz'
adds a bar
property with value baz
to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser
.
Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.