Update critters-webpack-plugin to 3.x to address CVE-2021-20066#1707
Update critters-webpack-plugin to 3.x to address CVE-2021-20066#1707nocive wants to merge 1 commit intopreactjs:masterfrom nocive:update-critters-CVE-2021-20066
Conversation
|
|
@preactjs/cli can someone please approve the workflow so that the tests can run? 🙏 |
|
Sorry, can't do.
Bumping #1608 already handles this, though it can't be released into |
|
@rschristian thanks for the context, wasn't aware of any of that. Just for my own reference though, you're saying we can only count on this being patched in a future preact-cli 4.x version? |
|
Unless Critters wants to release a patch for their 2.x line, yes. Regardless, this vulnerability doesn't look like it actually matters? Critters is build-time only. It shouldn't affect anything.
Yeah this is totally irrelevant. There's no runtime to Critters or it's deps. |
|
Just to clarify a bit, the "malicious web app" from that text would have to be your own. So the vulnerability here is that you could write your app to maliciously manipulate your files at build time only. I have many problems with the current state of JS security warnings, and this is why. |
What kind of change does this PR introduce?
Updates
critters-webpack-plugindependency to 3.x.Did you add tests for your changes?
No.
Summary
The critters-webpack-plugin depends on jsdom which has a known CVE vulnerability in versions <16.5.0.
The latest version of critters-webpack-plugin (3.x) no longer depends on jsdom and therefore solves this issue.
See GHSA-f4c9-cqv8-9v98 for more information on the CVE.
Does this PR introduce a breaking change?
Looking at the critters-webpack-plugin changelog, none that I'm aware of.