@@ -1254,5 +1254,7 @@ /* | ||
| content += "__WEBPACK_REEXPORT_OBJECT__[__WEBPACK_IMPORT_KEY__] = "; | ||
| content += runtimeTemplate.supportsArrowFunction() | ||
| ? `() => ${importVar}[__WEBPACK_IMPORT_KEY__]` | ||
| : `function(key) { return ${importVar}[key]; }.bind(0, __WEBPACK_IMPORT_KEY__)`; | ||
| content += | ||
| runtimeTemplate.supportsArrowFunction() && | ||
| runtimeTemplate.supportsConst() | ||
| ? `() => ${importVar}[__WEBPACK_IMPORT_KEY__]` | ||
| : `function(key) { return ${importVar}[key]; }.bind(0, __WEBPACK_IMPORT_KEY__)`; | ||
@@ -1259,0 +1261,0 @@ runtimeRequirements.add(RuntimeGlobals.exports); |
@@ -956,8 +956,24 @@ /* | ||
| const isAllowed = (uri) => { | ||
| let parsedUri; | ||
| try { | ||
| // Parse the URI to prevent userinfo bypass attacks | ||
| // (e.g., http://allowed@malicious/path where @malicious is the actual host) | ||
| parsedUri = new URL(uri); | ||
| } catch (_err) { | ||
| return false; | ||
| } | ||
| for (const allowed of allowedUris) { | ||
| if (typeof allowed === "string") { | ||
| if (uri.startsWith(allowed)) return true; | ||
| let parsedAllowed; | ||
| try { | ||
| parsedAllowed = new URL(allowed); | ||
| } catch (_err) { | ||
| continue; | ||
| } | ||
| if (parsedUri.href.startsWith(parsedAllowed.href)) { | ||
| return true; | ||
| } | ||
| } else if (typeof allowed === "function") { | ||
| if (allowed(uri)) return true; | ||
| } else if (allowed.test(uri)) { | ||
| if (allowed(parsedUri.href)) return true; | ||
| } else if (allowed.test(parsedUri.href)) { | ||
| return true; | ||
@@ -964,0 +980,0 @@ } |
@@ -9,3 +9,3 @@ /* | ||
| /** | ||
| * @param {number} size the size in bytes | ||
| * @param {number=} size the size in bytes | ||
| * @returns {string} the formatted size | ||
@@ -12,0 +12,0 @@ */ |
+3
-2
| { | ||
| "name": "webpack", | ||
| "version": "5.104.0", | ||
| "version": "5.104.1", | ||
| "description": "Packs ECMAScript/CommonJs/AMD modules for the browser. Allows you to split your codebase into multiple bundles, which can be loaded on demand. Supports loaders to preprocess files, i.e. json, jsx, es7, css, less, ... and your custom stuff.", | ||
@@ -35,3 +35,3 @@ "homepage": "https://github.com/webpack/webpack", | ||
| "prelint": "yarn setup", | ||
| "lint": "yarn lint:code && yarn lint:special && yarn lint:types && yarn lint:types-test && yarn lint:types-module-test && yarn lint:types-hot && yarn lint:yarn && yarn fmt:check && yarn lint:spellcheck", | ||
| "lint": "yarn lint:code && yarn lint:special && yarn lint:types && yarn lint:types-test && yarn lint:types-benchmark && yarn lint:types-module-test && yarn lint:types-hot && yarn lint:yarn && yarn fmt:check && yarn lint:spellcheck", | ||
| "lint:code": "node node_modules/eslint/bin/eslint.js --cache .", | ||
@@ -41,2 +41,3 @@ "lint:special": "node node_modules/tooling/lockfile-lint && node node_modules/tooling/schemas-lint && node node_modules/tooling/inherit-types && node node_modules/tooling/format-schemas && node tooling/generate-runtime-code.js && node tooling/generate-wasm-code.js && node node_modules/tooling/compile-to-definitions && node node_modules/tooling/precompile-schemas && node node_modules/tooling/generate-types --no-template-literals", | ||
| "lint:types-test": "tsc -p tsconfig.types.test.json", | ||
| "lint:types-benchmark": "tsc -p tsconfig.types.benchmark.json", | ||
| "lint:types-hot": "tsc -p tsconfig.hot.json", | ||
@@ -43,0 +44,0 @@ "lint:types-module-test": "tsc -p tsconfig.module.test.json", |
Sorry, the diff of this file is too big to display
Network access
Supply chain riskThis module accesses the network.
Found 4 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 3 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 4 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 3 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
5693712
0.01%163267
0.01%