Update dependency papaparse to v5.2.0 [SECURITY] - autoclosed #416
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
5.1.0
->5.2.0
GitHub Vulnerability Alerts
GHSA-qvjc-g5vr-mfgr
Versions of
papaparse
prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). Theparse
function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.Recommendation
Upgrade to version 5.2.0 or later.
Release Notes
mholt/PapaParse
v5.2.0
Compare Source
We are happy to announce version 5.2.0.
This version contains a new feature that allows to perform post request when downloading files.
It also fixes a ReDOS vulnerability issue. See mholt/PapaParse#777 for more details.
v5.1.1
Compare Source
Configuration
📅 Schedule: "" (UTC).
🚦 Automerge: Disabled due to failing status checks.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.