-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Update dependency prismjs to v1.27.0 [SECURITY] #390
Conversation
depcheck ResultList up libraries that are defined in dependencies and devDependencies in package.json but not used in your codes.
|
Deploy path: /home/runner/work/portfolio/portfolio/public Logs: https://app.netlify.com/sites/sleepy-neumann-6a84c0/deploys/6247b26335b225332f9adbb4 If everything looks good on your draft URL, deploy it to your main site URL with the --prod flag. |
71bfc5f
to
f153b49
Compare
depcheck ResultList up libraries that are defined in dependencies and devDependencies in package.json but not used in your codes.
|
Deploy path: /home/runner/work/portfolio/portfolio/public Logs: https://app.netlify.com/sites/sleepy-neumann-6a84c0/deploys/6249381f20abb64175c117d4 If everything looks good on your draft URL, deploy it to your main site URL with the --prod flag. |
f153b49
to
5f9acee
Compare
depcheck ResultList up libraries that are defined in dependencies and devDependencies in package.json but not used in your codes.
|
Deploy path: /home/runner/work/portfolio/portfolio/public Logs: https://app.netlify.com/sites/sleepy-neumann-6a84c0/deploys/6249b58235b2255a609add3e If everything looks good on your draft URL, deploy it to your main site URL with the --prod flag. |
This PR contains the following updates:
1.26.0
->1.27.0
GitHub Vulnerability Alerts
CVE-2022-23647
Impact
Prism's Command line plugin can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code.
Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted.
Patches
This bug has been fixed in v1.27.0.
Workarounds
Do not use the Command line plugin on untrusted inputs, or sanitized all code blocks (remove all HTML code text) from all code blocks that use the Command line plugin.
References
Release Notes
PrismJS/prism
v1.27.0
Compare Source
New components
3f8cc5a0
Updated components
bcb2e2c8
section
fromkeyword
toselector
(#3305)e46501b9
header
forsection
(#3304)deb3a97f
8458c41f
$
(#3320)d6c53726
441a1422
operator
forpunctuation
(#3306)2eb89e15
Updated plugins
e002e78c
1784b175
82d0ca15
Other
2cc4660b
Configuration
📅 Schedule: "" in timezone Asia/Tokyo.
🚦 Automerge: Disabled due to failing status checks.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.