Skip to content

Commit e1c892c

Browse files
rmohan20jag-j
authored andcommitted
CHANGE (CodeAnalyzer): @W-15634578@ Version update and RetireJS changes for v4.1.0 release. (#1448)
1 parent e2eba1b commit e1c892c

File tree

2 files changed

+67
-14
lines changed

2 files changed

+67
-14
lines changed

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "@salesforce/sfdx-scanner",
33
"description": "Static code scanner that applies quality and security rules to Apex code, and provides feedback.",
4-
"version": "4.0.0",
4+
"version": "4.1.0",
55
"author": "Salesforce Code Analyzer Team",
66
"bugs": "https://github.com/forcedotcom/sfdx-scanner/issues",
77
"dependencies": {

retire-js/RetireJsVulns.json

Lines changed: 66 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -982,39 +982,39 @@
982982
]
983983
},
984984
{
985-
"below": "2.3.1",
985+
"below": "2.3.0",
986986
"severity": "medium",
987987
"cwe": [
988988
"CWE-79"
989989
],
990990
"identifiers": {
991-
"summary": "XSS vulnerability in actionscript/Jplayer.as in the Flash SWF component",
991+
"summary": "XSS vulnerabilities in actionscript/Jplayer.as in the Flash SWF component",
992992
"CVE": [
993-
"CVE-2013-2023"
993+
"CVE-2013-2022"
994994
],
995-
"release": "2.3.1"
995+
"githubID": "GHSA-3jcq-cwr7-6332"
996996
},
997997
"info": [
998998
"http://jplayer.org/latest/release-notes/",
999-
"https://nvd.nist.gov/vuln/detail/CVE-2013-2023"
999+
"https://nvd.nist.gov/vuln/detail/CVE-2013-2022"
10001000
]
10011001
},
10021002
{
1003-
"below": "2.3.23",
1003+
"below": "2.3.1",
10041004
"severity": "medium",
10051005
"cwe": [
10061006
"CWE-79"
10071007
],
10081008
"identifiers": {
1009-
"summary": "XSS vulnerabilities in actionscript/Jplayer.as in the Flash SWF component",
1009+
"summary": "XSS vulnerability in actionscript/Jplayer.as in the Flash SWF component",
10101010
"CVE": [
1011-
"CVE-2013-2022"
1011+
"CVE-2013-2023"
10121012
],
1013-
"release": "2.3.23"
1013+
"release": "2.3.1"
10141014
},
10151015
"info": [
10161016
"http://jplayer.org/latest/release-notes/",
1017-
"https://nvd.nist.gov/vuln/detail/CVE-2013-2022"
1017+
"https://nvd.nist.gov/vuln/detail/CVE-2013-2023"
10181018
]
10191019
}
10201020
],
@@ -1615,6 +1615,54 @@
16151615
"https://tiny.cloud/docs/release-notes/release-notes5109/",
16161616
"https://tiny.cloud/docs/tinymce/6/6.7.3-release-notes/"
16171617
]
1618+
},
1619+
{
1620+
"atOrAbove": "0",
1621+
"below": "6.8.1",
1622+
"cwe": [
1623+
"CWE-79"
1624+
],
1625+
"severity": "medium",
1626+
"identifiers": {
1627+
"summary": "TinyMCE Cross-Site Scripting (XSS) vulnerability in handling iframes",
1628+
"CVE": [
1629+
"CVE-2024-29203"
1630+
],
1631+
"githubID": "GHSA-438c-3975-5x3f"
1632+
},
1633+
"info": [
1634+
"https://github.com/advisories/GHSA-438c-3975-5x3f",
1635+
"https://github.com/tinymce/tinymce/security/advisories/GHSA-438c-3975-5x3f",
1636+
"https://nvd.nist.gov/vuln/detail/CVE-2024-29203",
1637+
"https://github.com/tinymce/tinymce/commit/bcdea2ad14e3c2cea40743fb48c63bba067ae6d1",
1638+
"https://github.com/tinymce/tinymce",
1639+
"https://www.tiny.cloud/docs/tinymce/6/6.8.1-release-notes/#new-convert_unsafe_embeds-option-that-controls-whether-object-and-embed-elements-will-be-converted-to-more-restrictive-alternatives-namely-img-for-image-mime-types-video-for-video-mime-types-audio-audio-mime-types-or-iframe-for-other-or-unspecified-mime-types",
1640+
"https://www.tiny.cloud/docs/tinymce/7/7.0-release-notes/#sandbox_iframes-editor-option-is-now-defaulted-to-true"
1641+
]
1642+
},
1643+
{
1644+
"atOrAbove": "0",
1645+
"below": "7.0.0",
1646+
"cwe": [
1647+
"CWE-79"
1648+
],
1649+
"severity": "medium",
1650+
"identifiers": {
1651+
"summary": "TinyMCE Cross-Site Scripting (XSS) vulnerability in handling external SVG files through Object or Embed elements",
1652+
"CVE": [
1653+
"CVE-2024-29881"
1654+
],
1655+
"githubID": "GHSA-5359-pvf2-pw78"
1656+
},
1657+
"info": [
1658+
"https://github.com/advisories/GHSA-5359-pvf2-pw78",
1659+
"https://github.com/tinymce/tinymce/security/advisories/GHSA-5359-pvf2-pw78",
1660+
"https://nvd.nist.gov/vuln/detail/CVE-2024-29881",
1661+
"https://github.com/tinymce/tinymce/commit/bcdea2ad14e3c2cea40743fb48c63bba067ae6d1",
1662+
"https://github.com/tinymce/tinymce",
1663+
"https://www.tiny.cloud/docs/tinymce/6/6.8.1-release-notes/#new-convert_unsafe_embeds-option-that-controls-whether-object-and-embed-elements-will-be-converted-to-more-restrictive-alternatives-namely-img-for-image-mime-types-video-for-video-mime-types-audio-audio-mime-types-or-iframe-for-other-or-unspecified-mime-types",
1664+
"https://www.tiny.cloud/docs/tinymce/7/7.0-release-notes/#convert_unsafe_embeds-editor-option-is-now-defaulted-to-true"
1665+
]
16181666
}
16191667
],
16201668
"extractors": {
@@ -5692,7 +5740,10 @@
56925740
"axios-(§§version§§)(\\.min)?\\.js"
56935741
],
56945742
"filecontent": [
5695-
"/\\* *axios v(§§version§§) "
5743+
"/\\* *axios v(§§version§§) ",
5744+
"// Axios v(§§version§§) C",
5745+
"return\"\\[Axios v(§§version§§)\\] Transitional",
5746+
"\\\"axios\\\",\\\"version\\\":\\\"(§§version§§)\\\""
56965747
]
56975748
}
56985749
},
@@ -6669,9 +6720,10 @@
66696720
{
66706721
"below": "4.17.5",
66716722
"cwe": [
6672-
"CWE-471"
6723+
"CWE-471",
6724+
"CWE-1321"
66736725
],
6674-
"severity": "low",
6726+
"severity": "medium",
66756727
"identifiers": {
66766728
"summary": "Prototype Pollution in lodash",
66776729
"CVE": [
@@ -6738,6 +6790,7 @@
67386790
{
67396791
"below": "4.17.12",
67406792
"cwe": [
6793+
"CWE-1321",
67416794
"CWE-20"
67426795
],
67436796
"severity": "high",

0 commit comments

Comments
 (0)