Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade uglify-js from 3.4.7 to 3.13.4 #39

Closed

Conversation

snyk-bot
Copy link

@snyk-bot snyk-bot commented May 3, 2021

Snyk has created this PR to upgrade uglify-js from 3.4.7 to 3.13.4.

merge advice
ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 70 versions ahead of your current version.
  • The recommended version was released 22 days ago, on 2021-04-12.
Release notes
Package name: uglify-js
  • 3.13.4 - 2021-04-12

    Features

    • improve compression on class definition (aed758e)
    • mangle class field and method (10fbf8e)

    Bug Fixes

  • 3.13.3 - 2021-03-28

    Features

    Bug Fixes

  • 3.13.2 - 2021-03-21

    Features

    • support exponentiation assignment operator (01aa078)
    • flexible handling of __PURE__ through new annotations option (3b5d501)
    • retain class names via keep_fnames (997d09b)
    • better formatting of comments under beautify (7d595e2)
    • import/export { foo as foo }; ➡️ import/export { foo }; (2411132)
    • var f = async function*() { ... }; ➡️ async function* f() { ... } (b244b4e)

    Bug Fixes

  • 3.13.1 - 2021-03-12

     

  • 3.13.0 - 2021-03-01

     

  • 3.12.8 - 2021-02-13

     

  • 3.12.7 - 2021-02-06

     

  • 3.12.6 - 2021-01-31

     

  • 3.12.5 - 2021-01-19

     

  • 3.12.4 - 2021-01-01

     

  • 3.12.3 - 2020-12-22
  • 3.12.2 - 2020-12-16
  • 3.12.1 - 2020-11-30
  • 3.12.0 - 2020-11-22
  • 3.11.6 - 2020-11-14
  • 3.11.5 - 2020-11-03
  • 3.11.4 - 2020-10-26
  • 3.11.3 - 2020-10-19
  • 3.11.2 - 2020-10-11
  • 3.11.1 - 2020-10-04
  • 3.11.0 - 2020-09-27
  • 3.10.4 - 2020-09-06
  • 3.10.3 - 2020-08-30
  • 3.10.2 - 2020-08-23
  • 3.10.1 - 2020-08-02
  • 3.10.0 - 2020-06-21
  • 3.9.4 - 2020-05-27
  • 3.9.3 - 2020-05-13
  • 3.9.2 - 2020-05-03
  • 3.9.1 - 2020-04-15
  • 3.9.0 - 2020-04-13
  • 3.8.1 - 2020-03-28
  • 3.8.0 - 2020-02-18
  • 3.7.7 - 2020-02-03
  • 3.7.6 - 2020-01-21
  • 3.7.5 - 2020-01-12
  • 3.7.4 - 2020-01-07
  • 3.7.3 - 2019-12-27
  • 3.7.2 - 2019-12-08
  • 3.7.1 - 2019-11-30
  • 3.7.0 - 2019-11-25
  • 3.6.9 - 2019-11-12
  • 3.6.8 - 2019-11-06
  • 3.6.7 - 2019-11-02
  • 3.6.6 - 2019-11-01
  • 3.6.5 - 2019-10-29
  • 3.6.4 - 2019-10-23
  • 3.6.3 - 2019-10-19
  • 3.6.2 - 2019-10-15
  • 3.6.1 - 2019-10-08
  • 3.6.0 - 2019-05-30
  • 3.5.15 - 2019-05-21
  • 3.5.14 - 2019-05-20
  • 3.5.13 - 2019-05-17
  • 3.5.12 - 2019-05-12
  • 3.5.11 - 2019-05-06
  • 3.5.10 - 2019-05-01
  • 3.5.9 - 2019-04-27
  • 3.5.8 - 2019-04-25
  • 3.5.7 - 2019-04-24
  • 3.5.6 - 2019-04-21
  • 3.5.5 - 2019-04-19
  • 3.5.4 - 2019-04-10
  • 3.5.3 - 2019-04-01
  • 3.5.2 - 2019-03-23
  • 3.5.1 - 2019-03-21
  • 3.5.0 - 2019-03-20
  • 3.4.10 - 2019-03-15
  • 3.4.9 - 2018-08-31
  • 3.4.8 - 2018-08-23
  • 3.4.7 - 2018-08-09
from uglify-js GitHub release notes
Commit messages
Package name: uglify-js

Compare


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

@mistaken-pull-closer
Copy link

Thanks for your submission.

It appears that you've created a pull request using one of our repository's branches. Since this is
almost always a mistake, we're going to go ahead and close this. If it was intentional, please
let us know what you were intending and we can see about reopening it.

Thanks again!

@mistaken-pull-closer mistaken-pull-closer bot added the invalid This doesn't seem right label May 3, 2021
@pull-dog
Copy link

pull-dog bot commented May 3, 2021

*Ruff* 🐶 I wasn't able to find any Docker Compose files in your repository at any of the given paths in the pull-dog.json configuration file, or the default docker-compose.yml file 😩 Make sure the given paths are correct.

Files checked:

  • docker-compose.yml
What is this?

Pull Dog is a GitHub app that makes test environments for your pull requests using Docker, from a docker-compose.yml file you specify. It takes 19 seconds to set up (we counted!) and there's a free plan available.

Visit our website to learn more.

Commands
  • @pull-dog up to reprovision or provision the server.
  • @pull-dog down to delete the provisioned server.
Troubleshooting

Need help? Don't hesitate to file an issue in our repository

Configuration

{
  "isLazy": false,
  "dockerComposeYmlFilePaths": [
    "docker-compose.yml"
  ],
  "expiry": "00:00:00",
  "conversationMode": "singleComment"
}

Trace ID
766d5de0-ac67-11eb-8301-a6e32a965f77

@guardrails
Copy link

guardrails bot commented May 3, 2021

⚠️ We detected 118 security issues in this pull request:

Mode: paranoid | Total findings: 118 | Considered vulnerability: 0

Hard-Coded Secrets (2)
Docs Details
💡 Title: Hard-coded Secrets
$child.trigger( { "type": "foo", "secret": "boo!" } );
💡 Title: Hard-coded Secrets
assert.equal( jQuery.escapeSelector( "a0123456789b" ), "a0123456789b",

More info on how to fix Hard-Coded Secrets in General.


Insecure File Management (41)
Docs Details
💡 Title: Use of non-literal fs filename
fs.readFileSync( filepath, { encoding: "utf8" } )
💡 Title: Use of non-literal fs filename
var contents = fs.readFileSync( filepath, "utf8" );
💡 Title: Use of non-literal fs filename
fs.writeFileSync( filepath, contents, "utf8" );
💡 Title: Use of non-literal fs filename
text = fs.readFileSync( builtFile, "utf8" )
💡 Title: Use of non-literal fs filename
fs.writeFileSync( releaseFile, text );
💡 Title: Use of non-literal fs filename
output = fs.createWriteStream(
💡 Title: Use of non-literal fs filename
fs.writeFileSync( md5file, sum );
💡 Title: Use of non-literal fs filename
archiver.append( fs.createReadStream( file ),
💡 Title: Use of non-literal require
const pkg = require( `${ Release.dir.repo }/package.json` );
💡 Title: Use of non-literal fs filename
const readme = await fs.readFile(
💡 Title: Use of non-literal fs filename
await fs.writeFile( `${ Release.dir.dist }/bower.json`, generateBower() );
💡 Title: Use of non-literal fs filename
await fs.writeFile( `${ Release.dir.dist }/README.md`,
💡 Title: Use of non-literal fs filename
fs.readdirSync( `${ srcFolder }/${ prepend }${ module }` ),
💡 Title: Use of non-literal fs filename
fs.readdirSync( `${ srcFolder }/${ module }` ),
💡 Title: Use of non-literal fs filename
text = fs.readFileSync( filename, "utf8" );
💡 Title: Use of non-literal fs filename
fs.readdirSync( testsDir )
💡 Title: Use of non-literal fs filename
fs.statSync( testsDir + testFilePath ).isFile() &&
💡 Title: Use of non-literal fs filename
fs.writeFileSync(
💡 Title: Use of non-literal fs filename
var text = fs.readFileSync( minLoc, "utf8" )
💡 Title: Use of non-literal fs filename
fs.writeFileSync( minLoc, text );
💡 Title: Use of non-literal fs filename
xhr.open(
💡 Title: Use of non-literal fs filename
xhr.open( s.type, s.url, s.async, s.username, s.password );
💡 Title: Use of non-literal fs filename
xhr.open( s.type, s.url, s.async );
💡 Title: Use of non-literal require
require( [ parentUrl + "test/data/testrunner.js" ], function() {
💡 Title: Use of non-literal require
require( [ parentUrl + "test/" + dep ], loadDep );
💡 Title: Use of non-literal require
require( [ "http://swarm.jquery.org/js/inject.js?" + ( new Date() ).getTime() ],
💡 Title: Use of non-literal require
require( [ src ], loadTests );
💡 Title: Use of non-literal require
require( [ src ] );
💡 Title: Use of non-literal fs filename
var body = fs.readFileSync( __dirname + "/data/with_fries.xml" ).toString();
💡 Title: Use of non-literal fs filename
var body = fs.readFileSync( __dirname + "/data/test.include.html" ).toString();
💡 Title: Use of non-literal fs filename
var body = fs.readFileSync( __dirname + "/data/csp.include.html" ).toString();
💡 Title: Use of non-literal fs filename
var body = fs.readFileSync(
💡 Title: Use of non-literal fs filename
var body = fs.readFileSync(
💡 Title: FileSystem function with dynamic input
$text = json_encode( file_get_contents( __DIR__ . '/with_fries.xml' ) );
💡 Title: FileSystem function with dynamic input
$html = file_get_contents( __DIR__ . '/test.include.html' );
💡 Title: FileSystem function with dynamic input
echo file_get_contents( __DIR__ . '/csp.include.html' );
💡 Title: FileSystem function with dynamic input
echo file_get_contents( __DIR__ . '/csp-nonce' . $test . '.html' );
💡 Title: FileSystem function with dynamic input
echo file_get_contents( __DIR__ . '/csp-ajax-script.html' );
💡 Title: FileSystem function with dynamic input
file_put_contents( $this->cspFile, 'error' );
💡 Title: FileSystem function with dynamic input
file_put_contents( $this->cspFile, '' );
💡 Title: FileSystem function with dynamic input
unlink( $this->cspFile );

More info on how to fix Insecure File Management in JavaScript and PHP.


Insecure Use of Regular Expressions (48)
Docs Details
💡 Title: Regex DOS (ReDOS)
.split( /[\x20\t]*\/\/ @CODE\n(?:[\x20\t]*\/\/[^\n]+\n)*/ );
💡 Title: Regex DOS (ReDOS)
export default new RegExp( "^(" + pnum + ")(?!px)[a-z%]+$", "i" );
💡 Title: Regex DOS (ReDOS)
new RegExp( "(^|\\.)" + namespaces.join( "\\.(?:.*\\.|)" ) + "(\\.|$)" );
💡 Title: Regex DOS (ReDOS)
new RegExp( "(^|\\.)" + namespaces.join( "\\.(?:.*\\.|)" ) + "(\\.|$)" ) :
💡 Title: Regex DOS (ReDOS)
rwhitespace = new RegExp( whitespace + "+", "g" ),
💡 Title: Regex DOS (ReDOS)
rtrim = new RegExp( "^" + whitespace + "+|((?:^|[^\\\\])(?:\\\\.)*)" + whitespace + "+$", "g" ),
💡 Title: Regex DOS (ReDOS)
rcomma = new RegExp( "^" + whitespace + "*," + whitespace + "*" ),
💡 Title: Regex DOS (ReDOS)
rcombinators = new RegExp( "^" + whitespace + "*([>+~]|" + whitespace + ")" +
💡 Title: Regex DOS (ReDOS)
rdescend = new RegExp( whitespace + "|>" ),
💡 Title: Regex DOS (ReDOS)
rpseudo = new RegExp( pseudos ),
💡 Title: Regex DOS (ReDOS)
ridentifier = new RegExp( "^" + identifier + "$" ),
💡 Title: Regex DOS (ReDOS)
ID: new RegExp( "^#(" + identifier + ")" ),
💡 Title: Regex DOS (ReDOS)
CLASS: new RegExp( "^\\.(" + identifier + ")" ),
💡 Title: Regex DOS (ReDOS)
TAG: new RegExp( "^(" + identifier + "|[*])" ),
💡 Title: Regex DOS (ReDOS)
ATTR: new RegExp( "^" + attributes ),
💡 Title: Regex DOS (ReDOS)
PSEUDO: new RegExp( "^" + pseudos ),
💡 Title: Regex DOS (ReDOS)
CHILD: new RegExp(
💡 Title: Regex DOS (ReDOS)
bool: new RegExp( "^(?:" + booleans + ")$", "i" ),
💡 Title: Regex DOS (ReDOS)
needsContext: new RegExp( "^" + whitespace +
💡 Title: Regex DOS (ReDOS)
runescape = new RegExp( "\\\\[\\da-fA-F]{1,6}" + whitespace +
💡 Title: Regex DOS (ReDOS)
( pattern = new RegExp( "(^|" + whitespace + ")" + className +
💡 Title: Regex DOS (ReDOS)
var rbuggyQSA = isIE && new RegExp(
💡 Title: Regex DOS (ReDOS)
export default new RegExp( "^(?:([+-])=|)(" + pnum + ")([a-z%]*)$", "i" );
💡 Title: Regex DOS (ReDOS)
rvalidbraces = /(?:^|:|,)(?:\s*\[)+/g,
💡 Title: Regex DOS (ReDOS)
tmp = tmp[ 2 ] && new RegExp( "(^|\\.)" + namespaces.join( "\\.(?:.*\\.|)" ) + "(\\.|$)" );
💡 Title: Regex DOS (ReDOS)
new RegExp( "(^|\\.)" + namespaces.join( "\\.(?:.*\\.|)" ) + "(\\.|$)" ) :
💡 Title: Regex DOS (ReDOS)
rtrim = new RegExp( "^" + whitespace + "+|((?:^|[^\\\\])(?:\\\\.)*)" + whitespace + "+$", "g" ),
💡 Title: Regex DOS (ReDOS)
rcomma = new RegExp( "^" + whitespace + "*," + whitespace + "*" ),
💡 Title: Regex DOS (ReDOS)
rcombinators = new RegExp( "^" + whitespace + "*([\\x20\\t\\r\\n\\f>+~])" + whitespace + "*" ),
💡 Title: Regex DOS (ReDOS)
rpseudo = new RegExp( pseudos ),
💡 Title: Regex DOS (ReDOS)
ridentifier = new RegExp( "^" + identifier + "$" ),
💡 Title: Regex DOS (ReDOS)
"ID": new RegExp( "^#(" + characterEncoding + ")" ),
💡 Title: Regex DOS (ReDOS)
"CLASS": new RegExp( "^\\.(" + characterEncoding + ")" ),
💡 Title: Regex DOS (ReDOS)
"NAME": new RegExp( "^\\[name=['\"]?(" + characterEncoding + ")['\"]?\\]" ),
💡 Title: Regex DOS (ReDOS)
"TAG": new RegExp( "^(" + characterEncoding.replace( "w", "w*" ) + ")" ),
💡 Title: Regex DOS (ReDOS)
"ATTR": new RegExp( "^" + attributes ),
💡 Title: Regex DOS (ReDOS)
"PSEUDO": new RegExp( "^" + pseudos ),
💡 Title: Regex DOS (ReDOS)
"CHILD": new RegExp( "^:(only|first|last|nth|nth-last)-(child|of-type)(?:\\(" + whitespace +
💡 Title: Regex DOS (ReDOS)
"needsContext": new RegExp( "^" + whitespace + "*[>+~]|:(even|odd|eq|gt|lt|nth|first|last)(?:\\(" +
💡 Title: Regex DOS (ReDOS)
rbuggyQSA = new RegExp( rbuggyQSA.join( "|" ) );
💡 Title: Regex DOS (ReDOS)
rbuggyMatches = new RegExp( rbuggyMatches.join( "|" ) );
💡 Title: Regex DOS (ReDOS)
( pattern = new RegExp( "(^|" + whitespace + ")" + className + "(" + whitespace + "|$)" ) ) &&
💡 Title: Regex DOS (ReDOS)
rnoshimcache = new RegExp( "<(?:" + nodeNames + ")[\\s/>]", "i" ),
💡 Title: Regex DOS (ReDOS)
rnumsplit = new RegExp( "^(" + core_pnum + ")(.*)$", "i" ),
💡 Title: Regex DOS (ReDOS)
rnumnonpx = new RegExp( "^(" + core_pnum + ")(?!px)[a-z%]+$", "i" ),
💡 Title: Regex DOS (ReDOS)
rrelNum = new RegExp( "^([+-])=(" + core_pnum + ")", "i" ),
💡 Title: Regex DOS (ReDOS)
rfxnum = new RegExp( "^(?:([+-])=|)(" + core_pnum + ")([a-z%]*)$", "i" ),
💡 Title: Regex DOS (ReDOS)
} else if ( /\b\d+(\.\d+)+ safari/i.test( userAgent ) ) {

More info on how to fix Insecure Use of Regular Expressions in JavaScript.


Insecure Use of Dangerous Function (2)
Docs Details
💡 Title: Use of child process and non-literal exec()
var spawn = require( "child_process" ).spawn;
💡 Title: Use of variable in eval
eval( dynamicImportSource );

More info on how to fix Insecure Use of Dangerous Function in JavaScript.


Information Disclosure (1)
Docs Details
💡 Title: Dynamic Placeholder Rule
{ "data": {"lang": "en", "length": 25} }

More info on how to fix Information Disclosure in JavaScript.


Vulnerable Libraries (1)
Severity Details
Medium jquery@1.9.1 upgrade to >3.5.0

More info on how to fix Vulnerable Libraries in JavaScript.


Insecure Processing of Data (21)
Docs Details
💡 Title: Potential Cross-Site Scripting
echo $req->query['response'];
💡 Title: Potential Cross-Site Scripting
echo $req->query['callback'] . "(" . json_encode( [ 'headers' => $headers ] ) . ")";
💡 Title: Potential Cross-Site Scripting
echo $callback . '([ {"name": "John", "age": 21}, {"name": "Peter", "age": 25 } ])';
💡 Title: Potential Cross-Site Scripting
echo $callback . '({ "data": {"lang": "en", "length": 25} })';
💡 Title: Potential Cross-Site Scripting
echo "$callback($text)\n";
💡 Title: Potential Cross-Site Scripting
echo "$key: " . $req->headers[ strtoupper( $key ) ] . "\n";
💡 Title: Potential Cross-Site Scripting
echo file_get_contents('php://input');
💡 Title: Cross-Site Scripting with user input
echo $_SERVER['QUERY_STRING'];
💡 Title: Potential Cross-Site Scripting
echo $req->method;
💡 Title: Potential Cross-Site Scripting
echo '<div id="method">' . $req->method . '</div>';
💡 Title: Potential Cross-Site Scripting
echo '<div id="query">' . $_SERVER['QUERY_STRING'] . '</div>';
💡 Title: Potential Cross-Site Scripting
echo '<div id="data">' . file_get_contents('php://input') . '</div>';
💡 Title: Potential Cross-Site Scripting
echo "ETag: $etag\n";
💡 Title: Potential Cross-Site Scripting
echo "If-None-Match: $ifNoneMatch\n";
💡 Title: Potential Cross-Site Scripting
echo "Last-Modified: $ts\n";
💡 Title: Potential Cross-Site Scripting
echo "If-Modified-Since: $ims\n";
💡 Title: Potential Cross-Site Scripting
echo $html;
💡 Title: Potential Cross-Site Scripting
echo file_get_contents( __DIR__ . '/csp.include.html' );
💡 Title: Potential Cross-Site Scripting
echo file_get_contents( __DIR__ . '/csp-nonce' . $test . '.html' );
💡 Title: Potential Cross-Site Scripting
echo file_get_contents( __DIR__ . '/csp-ajax-script.html' );
💡 Title: Potential Cross-Site Scripting
echo $callback . '( {"status": 404, "msg": "Not Found"} )';

More info on how to fix Insecure Processing of Data in PHP.


Insecure Use of Language/Framework API (1)
Docs Details
💡 Title: Function allowing arbitrary callback
array_map( 'strtolower', array_keys( $req->headers ) ),

More info on how to fix Insecure Use of Language/Framework API in PHP.


Insecure Use of Crypto (1)
Docs Details
💡 Title: Use of OPENSSL_PKCS1_PADDING
$hash = md5( $req->query['ts'] );

More info on how to fix Insecure Use of Crypto in PHP.


👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
invalid This doesn't seem right
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant