Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Bug] Prototype Pollution in JSON5 via Parse Method #2628

Closed
apalski opened this issue Dec 30, 2022 · 3 comments
Closed

[Bug] Prototype Pollution in JSON5 via Parse Method #2628

apalski opened this issue Dec 30, 2022 · 3 comments

Comments

@apalski
Copy link

apalski commented Dec 30, 2022

Could be bump the tsconfig-paths version to fix the json5 vulnerability please
https://security.snyk.io/vuln/SNYK-JS-JSON5-3182856

@ljharb
Copy link
Member

ljharb commented Dec 30, 2022

It's not a bug, and it's not a vulnerability.

This has been discussed in #2447 - tsconfig-paths can not be upgraded, because it's a breaking change.

Also, it's not actually vulnerable, and this is also a duplicate of #2625, and a duplicate of #2626, and a duplicate of #2627.

@ljharb ljharb closed this as not planned Won't fix, can't repro, duplicate, stale Dec 30, 2022
@apalski
Copy link
Author

apalski commented Dec 30, 2022 via email

@import-js import-js deleted a comment from air2 Dec 30, 2022
@ljharb
Copy link
Member

ljharb commented Dec 30, 2022

json5 v1.0.2 is published, so update your lockfiles and you're all set. No need to do anything.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

2 participants