Skip to content

Commit e4c1d5b

Browse files
authored
CHANGE (CodeAnalyzer): @W-15295547@: Prep for v4.0.0 release. (#1419)
1 parent 63a13a4 commit e4c1d5b

File tree

2 files changed

+122
-1
lines changed

2 files changed

+122
-1
lines changed

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "@salesforce/sfdx-scanner",
33
"description": "Static code scanner that applies quality and security rules to Apex code, and provides feedback.",
4-
"version": "3.22.0",
4+
"version": "4.0.0",
55
"author": "Salesforce Code Analyzer Team",
66
"bugs": "https://github.com/forcedotcom/sfdx-scanner/issues",
77
"dependencies": {

retire-js/RetireJsVulns.json

Lines changed: 121 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -438,6 +438,20 @@
438438
"https://github.com/advisories/GHSA-ffmh-x56j-9rc3",
439439
"https://github.com/jquery-validation/jquery-validation/commit/5bbd80d27fc6b607d2f7f106c89522051a9fb0dd"
440440
]
441+
},
442+
{
443+
"below": "1.20.0",
444+
"severity": "medium",
445+
"cwe": [
446+
"CWE-79"
447+
],
448+
"identifiers": {
449+
"summary": "Potential XSS via showLabel",
450+
"PR": "2462"
451+
},
452+
"info": [
453+
"https://github.com/jquery-validation/jquery-validation/blob/master/changelog.md#1200--2023-10-10"
454+
]
441455
}
442456
],
443457
"extractors": {
@@ -5654,6 +5668,20 @@
56545668
"https://github.com/axios/axios/releases/tag/v1.6.0",
56555669
"https://security.snyk.io/vuln/SNYK-JS-AXIOS-6032459"
56565670
]
5671+
},
5672+
{
5673+
"below": "1.6.8",
5674+
"severity": "medium",
5675+
"cwe": [
5676+
"CWE-200"
5677+
],
5678+
"identifiers": {
5679+
"summary": "Versions before 1.6.8 depends on follow-redirects before 1.15.6 which could leak the proxy authentication credentials",
5680+
"PR": "6300"
5681+
},
5682+
"info": [
5683+
"https://github.com/axios/axios/pull/6300"
5684+
]
56575685
}
56585686
],
56595687
"extractors": {
@@ -5755,6 +5783,21 @@
57555783
"https://nvd.nist.gov/vuln/detail/CVE-2022-21670",
57565784
"https://security.snyk.io/vuln/SNYK-JS-MARKDOWNIT-2331914"
57575785
]
5786+
},
5787+
{
5788+
"below": "13.0.2",
5789+
"severity": "medium",
5790+
"cwe": [
5791+
"CWE-400"
5792+
],
5793+
"identifiers": {
5794+
"summary": "Fixed crash/infinite loop caused by linkify inline rule",
5795+
"issue": "957"
5796+
},
5797+
"info": [
5798+
"https://github.com/markdown-it/markdown-it/issues/957",
5799+
"https://github.com/markdown-it/markdown-it/compare/13.0.1...13.0.2"
5800+
]
57585801
}
57595802
],
57605803
"extractors": {
@@ -6379,6 +6422,25 @@
63796422
"info": [
63806423
"https://github.com/froala/wysiwyg-editor/releases/tag/v4.0.11"
63816424
]
6425+
},
6426+
{
6427+
"below": "4.1.4",
6428+
"atOrAbove": "4.0.1",
6429+
"severity": "medium",
6430+
"cwe": [
6431+
"CWE-79"
6432+
],
6433+
"identifiers": {
6434+
"summary": "Froala Editor v4.0.1 to v4.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability.",
6435+
"CVE": [
6436+
"CVE-2023-41592"
6437+
],
6438+
"githubID": "GHSA-hvpq-7vcc-5hj5"
6439+
},
6440+
"info": [
6441+
"https://froala.com/wysiwyg-editor/changelog/#4.1.4",
6442+
"https://github.com/advisories/GHSA-hvpq-7vcc-5hj5"
6443+
]
63826444
}
63836445
],
63846446
"extractors": {
@@ -7037,6 +7099,65 @@
70377099
]
70387100
}
70397101
},
7102+
"mathjax": {
7103+
"vulnerabilities": [
7104+
{
7105+
"atOrAbove": "0",
7106+
"below": "2.7.4",
7107+
"cwe": [
7108+
"CWE-79"
7109+
],
7110+
"severity": "medium",
7111+
"identifiers": {
7112+
"summary": "Macro in MathJax running untrusted Javascript within a web browser",
7113+
"CVE": [
7114+
"CVE-2018-1999024"
7115+
],
7116+
"githubID": "GHSA-3c48-6pcv-88rm"
7117+
},
7118+
"info": [
7119+
"https://github.com/advisories/GHSA-3c48-6pcv-88rm",
7120+
"https://nvd.nist.gov/vuln/detail/CVE-2018-1999024",
7121+
"https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1",
7122+
"https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html",
7123+
"https://github.com/advisories/GHSA-3c48-6pcv-88rm",
7124+
"https://github.com/mathjax/MathJax"
7125+
]
7126+
},
7127+
{
7128+
"atOrAbove": "0",
7129+
"below": "999",
7130+
"cwe": [
7131+
"CWE-1333"
7132+
],
7133+
"severity": "high",
7134+
"identifiers": {
7135+
"summary": "MathJax Regular expression Denial of Service (ReDoS)",
7136+
"CVE": [
7137+
"CVE-2023-39663"
7138+
],
7139+
"githubID": "GHSA-v638-q856-grg8"
7140+
},
7141+
"info": [
7142+
"https://github.com/advisories/GHSA-v638-q856-grg8",
7143+
"https://nvd.nist.gov/vuln/detail/CVE-2023-39663",
7144+
"https://github.com/mathjax/MathJax/issues/3074"
7145+
]
7146+
}
7147+
],
7148+
"extractors": {
7149+
"uri": [
7150+
"/mathjax@(§§version§§)/",
7151+
"/mathjax/(§§version§§)/"
7152+
],
7153+
"filecontent": [
7154+
"\\.MathJax\\.config\\.startup;{10,100}.\\.VERSION=\"(§§version§§)\"",
7155+
"\\.MathJax=\\{version:\"(§§version§§)\"",
7156+
"MathJax.{0,100}.\\.VERSION=void 0,.\\.VERSION=\"(§§version§§)\"",
7157+
"MathJax\\.version=\"(§§version§§)\";"
7158+
]
7159+
}
7160+
},
70407161
"dont check": {
70417162
"vulnerabilities": [],
70427163
"extractors": {

0 commit comments

Comments
 (0)