Code Monkey home page Code Monkey logo

ant-design-pro's Introduction

English | ็ฎ€ไฝ“ไธญๆ–‡ | ะ ัƒััะบะธะน | Tรผrkรงe | ๆ—ฅๆœฌ่ชž | Franรงais | Portuguรชs

Ant Design Pro

An out-of-box UI solution for enterprise applications as a React boilerplate.

Build With Umi Build Status Dependencies DevDependencies Gitter Join the chat at https://gitter.im/ant-design/ant-design-pro Github Action

4.0 Released Now! ๐ŸŽ‰๐ŸŽ‰๐ŸŽ‰

Announcing Ant Design Pro 4.0.0

Translation Recruitment ๐Ÿ“ข

We need your help: ant-design#120

Features

  • ๐Ÿ’ก TypeScript: A language for application-scale JavaScript
  • ๐Ÿ“œ Blocks: Build page with block template
  • ๐Ÿ’Ž Neat Design: Follow Ant Design specification
  • ๐Ÿ“ Common Templates: Typical templates for enterprise applications
  • ๐Ÿš€ State of The Art Development: Newest development stack of React/umi/dva/antd
  • ๐Ÿ“ฑ Responsive: Designed for variable screen sizes
  • ๐ŸŽจ Theming: Customizable theme with simple config
  • ๐ŸŒ International: Built-in i18n solution
  • โš™๏ธ Best Practices: Solid workflow to make your code healthy
  • ๐Ÿ”ข Mock development: Easy to use mock development solution
  • โœ… UI Test: Fly safely with unit and e2e tests

Templates

- Dashboard
  - Analytic
  - Monitor
  - Workspace
- Form
  - Basic Form
  - Step Form
  - Advanced From
- List
  - Standard Table
  - Standard List
  - Card List
  - Search List (Project/Applications/Article)
- Profile
  - Simple Profile
  - Advanced Profile
- Account
  - Account Center
  - Account Settings
- Result
  - Success
  - Failed
- Exception
  - 403
  - 404
  - 500
- User
  - Login
  - Register
  - Register Result

Usage

Use bash

$ mkdir <your-project-name>
$ cd <your-project-name>
$ yarn create umi  # or npm create umi

# Choose ant-design-pro:
 Select the boilerplate type (Use arrow keys)
โฏ ant-design-pro  - Create project with an layout-only ant-design-pro boilerplate, use together with umi block.
  app             - Create project with a simple boilerplate, support typescript.
  block           - Create a umi block.
  library         - Create a library with umi.
  plugin          - Create a umi plugin.

$ git init
$ npm install
$ npm start         # visit http://localhost:8000

Use Gitpod

Open the project in Gitpod (free online dev environment for GitHub) and start coding immediately.

Open in Gitpod

More instructions at documentation.

Browsers support

Modern browsers and IE11.

IE / Edge
IE / Edge
Firefox
Firefox
Chrome
Chrome
Safari
Safari
Opera
Opera
IE11, Edge last 2 versions last 2 versions last 2 versions last 2 versions

Contributing

Any type of contribution is welcome, here are some examples of how you may contribute to this project:

  • Use Ant Design Pro in your daily work.
  • Submit issues to report bugs or ask questions.
  • Propose pull requests to improve our code.

ant-design-pro's People

Contributors

afc163 avatar anderson-liu avatar andriijas avatar chenshuai2144 avatar ddcat1115 avatar dependabot-preview[bot] avatar depfu[bot] avatar flutterbest avatar guowenfh avatar happier2 avatar hhking avatar hzsrc avatar imhele avatar jaredleechn avatar kaoding avatar kennylbj avatar kjlmfe avatar m4jing avatar nikogu avatar puuuudding avatar rayronvictor avatar sorrycc avatar valleykid avatar whatakitty avatar xiaohuoni avatar yesmeck avatar yoyo837 avatar yutingzhao1991 avatar zhongjiewu avatar zombiej avatar

Watchers

 avatar

ant-design-pro's Issues

CVE-2015-9251 (Medium) detected in multiple libraries

CVE-2015-9251 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.8.1.min.js, jquery-1.7.1.min.js, jquery-1.9.1.js

jquery-1.8.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Path to vulnerable library: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Dependency Hierarchy:

  • โŒ jquery-1.8.1.min.js (Vulnerable Library)
jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html

Path to vulnerable library: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/hapi/html/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/echo/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/multiplex/index.html

Dependency Hierarchy:

  • โŒ jquery-1.7.1.min.js (Vulnerable Library)
jquery-1.9.1.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.js

Path to dependency file: ant-design-pro/node_modules/tinycolor2/test/index.html

Path to vulnerable library: ant-design-pro/node_modules/tinycolor2/test/../demo/jquery-1.9.1.js,ant-design-pro/node_modules/tinycolor2/demo/jquery-1.9.1.js

Dependency Hierarchy:

  • โŒ jquery-1.9.1.js (Vulnerable Library)

Found in HEAD commit: c26250972afd973e8d94cd8930dab408216291ce

Vulnerability Details

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

Publish Date: 2018-01-18

URL: CVE-2015-9251

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-9251

Release Date: 2018-01-18

Fix Resolution: jQuery - v3.0.0

CVE-2020-13822 (High) detected in elliptic-6.5.2.tgz

CVE-2020-13822 - High Severity Vulnerability

Vulnerable Library - elliptic-6.5.2.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.2.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/elliptic/package.json

Dependency Hierarchy:

  • umi-3.1.1.tgz (Root Library)
    • preset-built-in-3.1.1.tgz
      • bundler-webpack-3.1.1.tgz
        • webpack-4.42.1.tgz
          • node-libs-browser-2.2.1.tgz
            • crypto-browserify-3.12.0.tgz
              • browserify-sign-4.0.4.tgz
                • โŒ elliptic-6.5.2.tgz (Vulnerable Library)

Vulnerability Details

The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.

Publish Date: 2020-06-04

URL: CVE-2020-13822

CVSS 3 Score Details (7.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/indutny/elliptic/tree/v6.5.3

Release Date: 2020-06-04

Fix Resolution: v6.5.3

CVE-2020-7693 (Medium) detected in sockjs-0.3.19.tgz

CVE-2020-7693 - Medium Severity Vulnerability

Vulnerable Library - sockjs-0.3.19.tgz

SockJS-node is a server counterpart of SockJS-client a JavaScript library that provides a WebSocket-like object in the browser. SockJS gives you a coherent, cross-browser, Javascript API which creates a low latency, full duplex, cross-domain communication

Library home page: https://registry.npmjs.org/sockjs/-/sockjs-0.3.19.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/package.json

Dependency Hierarchy:

  • preset-ui-2.1.13.tgz (Root Library)
    • ui-2.1.7.tgz
      • โŒ sockjs-0.3.19.tgz (Vulnerable Library)

Vulnerability Details

Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.

Publish Date: 2020-07-09

URL: CVE-2020-7693

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: sockjs/sockjs-node#265

Release Date: 2020-07-09

Fix Resolution: sockjs - 0.3.20

CVE-2017-16137 (Medium) detected in debug-0.7.4.tgz

CVE-2017-16137 - Medium Severity Vulnerability

Vulnerable Library - debug-0.7.4.tgz

small debugging utility

Library home page: https://registry.npmjs.org/debug/-/debug-0.7.4.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/streamroller/node_modules/debug/package.json

Dependency Hierarchy:

  • pro-cli-1.0.20.tgz (Root Library)
    • blink-diff-1.0.13.tgz
      • preceptor-core-0.10.1.tgz
        • log4js-1.1.1.tgz
          • streamroller-0.4.1.tgz
            • โŒ debug-0.7.4.tgz (Vulnerable Library)

Found in HEAD commit: c26250972afd973e8d94cd8930dab408216291ce

Vulnerability Details

The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.

Publish Date: 2018-06-07

URL: CVE-2017-16137

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137

Release Date: 2018-06-07

Fix Resolution: 2.6.9

CVE-2020-7608 (Medium) detected in yargs-parser-16.1.0.tgz, yargs-parser-10.1.0.tgz

CVE-2020-7608 - Medium Severity Vulnerability

Vulnerable Libraries - yargs-parser-16.1.0.tgz, yargs-parser-10.1.0.tgz

yargs-parser-16.1.0.tgz

the mighty option parser used by yargs

Library home page: https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/@ant-design/pro-cli/node_modules/yargs-parser/package.json

Dependency Hierarchy:

  • pro-cli-1.0.20.tgz (Root Library)
    • โŒ yargs-parser-16.1.0.tgz (Vulnerable Library)
yargs-parser-10.1.0.tgz

the mighty option parser used by yargs

Library home page: https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/umi-uni18n/node_modules/meow/node_modules/yargs-parser/package.json

Dependency Hierarchy:

  • fabric-2.0.8.tgz (Root Library)
    • stylelint-config-rational-order-0.1.2.tgz
      • stylelint-9.10.1.tgz
        • meow-5.0.0.tgz
          • โŒ yargs-parser-10.1.0.tgz (Vulnerable Library)

Found in HEAD commit: c26250972afd973e8d94cd8930dab408216291ce

Vulnerability Details

yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "proto" payload.

Publish Date: 2020-03-16

URL: CVE-2020-7608

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608

Release Date: 2020-03-16

Fix Resolution: v18.1.1;13.1.2;15.0.1

WS-2019-0424 (Medium) detected in elliptic-6.5.2.tgz

WS-2019-0424 - Medium Severity Vulnerability

Vulnerable Library - elliptic-6.5.2.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.2.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/elliptic/package.json

Dependency Hierarchy:

  • umi-3.1.1.tgz (Root Library)
    • preset-built-in-3.1.1.tgz
      • bundler-webpack-3.1.1.tgz
        • webpack-4.42.1.tgz
          • node-libs-browser-2.2.1.tgz
            • crypto-browserify-3.12.0.tgz
              • browserify-sign-4.0.4.tgz
                • โŒ elliptic-6.5.2.tgz (Vulnerable Library)

Vulnerability Details

all versions of elliptic are vulnerable to Timing Attack through side-channels.

Publish Date: 2019-11-13

URL: WS-2019-0424

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Adjacent
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

WS-2020-0070 (High) detected in lodash-4.17.15.tgz

WS-2020-0070 - High Severity Vulnerability

Vulnerable Library - lodash-4.17.15.tgz

Lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz

Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json

Path to vulnerable library: /ant-design-pro/node_modules/lodash/package.json

Dependency Hierarchy:

  • โŒ lodash-4.17.15.tgz (Vulnerable Library)

Vulnerability Details

a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype

Publish Date: 2020-04-28

URL: WS-2020-0070

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2019-11358 (Medium) detected in jquery-1.9.1.js

CVE-2019-11358 - Medium Severity Vulnerability

Vulnerable Library - jquery-1.9.1.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.js

Path to dependency file: ant-design-pro/node_modules/tinycolor2/test/index.html

Path to vulnerable library: ant-design-pro/node_modules/tinycolor2/test/../demo/jquery-1.9.1.js,ant-design-pro/node_modules/tinycolor2/demo/jquery-1.9.1.js

Dependency Hierarchy:

  • โŒ jquery-1.9.1.js (Vulnerable Library)

Found in HEAD commit: c26250972afd973e8d94cd8930dab408216291ce

Vulnerability Details

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable proto property, it could extend the native Object.prototype.

Publish Date: 2019-04-20

URL: CVE-2019-11358

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358

Release Date: 2019-04-20

Fix Resolution: 3.4.0

CVE-2020-7789 (Medium) detected in node-notifier-6.0.0.tgz

CVE-2020-7789 - Medium Severity Vulnerability

Vulnerable Library - node-notifier-6.0.0.tgz

A Node.js module for sending notifications on native Mac, Windows (post and pre 8) and Linux (or Growl as fallback)

Library home page: https://registry.npmjs.org/node-notifier/-/node-notifier-6.0.0.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/node-notifier/package.json

Dependency Hierarchy:

  • preset-react-1.4.18.tgz (Root Library)
    • plugin-test-1.0.0.tgz
      • test-3.1.1.tgz
        • jest-cli-25.4.0.tgz
          • core-25.4.0.tgz
            • reporters-25.4.0.tgz
              • โŒ node-notifier-6.0.0.tgz (Vulnerable Library)

Vulnerability Details

This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

Publish Date: 2020-12-11

URL: CVE-2020-7789

CVSS 3 Score Details (5.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7789

Release Date: 2020-12-11

Fix Resolution: 9.0.0

CVE-2020-15168 (Medium) detected in node-fetch-2.6.0.tgz, node-fetch-1.7.3.tgz

CVE-2020-15168 - Medium Severity Vulnerability

Vulnerable Libraries - node-fetch-2.6.0.tgz, node-fetch-1.7.3.tgz

node-fetch-2.6.0.tgz

A light-weight module that brings window.fetch to node.js

Library home page: https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.0.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/@ant-design/pro-cli/node_modules/node-fetch/package.json

Dependency Hierarchy:

  • pro-cli-1.0.20.tgz (Root Library)
    • โŒ node-fetch-2.6.0.tgz (Vulnerable Library)
node-fetch-1.7.3.tgz

A light-weight module that brings window.fetch to node.js and io.js

Library home page: https://registry.npmjs.org/node-fetch/-/node-fetch-1.7.3.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/node-fetch/package.json

Dependency Hierarchy:

  • umi-request-1.2.19.tgz (Root Library)
    • isomorphic-fetch-2.2.1.tgz
      • โŒ node-fetch-1.7.3.tgz (Vulnerable Library)

Vulnerability Details

node-fetch before versions 2.6.1 and 3.0.0-beta.9 did not honor the size option after following a redirect, which means that when a content size was over the limit, a FetchError would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after fetch() has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.

Publish Date: 2020-09-10

URL: CVE-2020-15168

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-w7rc-rwvf-8q5r

Release Date: 2020-07-21

Fix Resolution: 2.6.1,3.0.0-beta.9

CVE-2020-11022 (Medium) detected in multiple libraries

CVE-2020-11022 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.8.1.min.js, jquery-1.7.1.min.js, jquery-1.9.1.js

jquery-1.8.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Path to vulnerable library: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Dependency Hierarchy:

  • โŒ jquery-1.8.1.min.js (Vulnerable Library)
jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html

Path to vulnerable library: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/hapi/html/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/echo/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/multiplex/index.html

Dependency Hierarchy:

  • โŒ jquery-1.7.1.min.js (Vulnerable Library)
jquery-1.9.1.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.js

Path to dependency file: ant-design-pro/node_modules/tinycolor2/test/index.html

Path to vulnerable library: ant-design-pro/node_modules/tinycolor2/test/../demo/jquery-1.9.1.js,ant-design-pro/node_modules/tinycolor2/demo/jquery-1.9.1.js

Dependency Hierarchy:

  • โŒ jquery-1.9.1.js (Vulnerable Library)

Vulnerability Details

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Publish Date: 2020-04-29

URL: CVE-2020-11022

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/

Release Date: 2020-04-29

Fix Resolution: jQuery - 3.5.0

CVE-2020-7660 (High) detected in serialize-javascript-2.1.2.tgz

CVE-2020-7660 - High Severity Vulnerability

Vulnerable Library - serialize-javascript-2.1.2.tgz

Serialize JavaScript to a superset of JSON that includes regular expressions and functions.

Library home page: https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-2.1.2.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/serialize-javascript/package.json

Dependency Hierarchy:

  • umi-3.1.1.tgz (Root Library)
    • preset-built-in-3.1.1.tgz
      • bundler-webpack-3.1.1.tgz
        • copy-webpack-plugin-5.1.1.tgz
          • โŒ serialize-javascript-2.1.2.tgz (Vulnerable Library)

Vulnerability Details

serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".

Publish Date: 2020-06-01

URL: CVE-2020-7660

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660

Release Date: 2020-06-01

Fix Resolution: serialize-javascript - 3.1.0

CVE-2020-7656 (Medium) detected in jquery-1.8.1.min.js, jquery-1.7.1.min.js

CVE-2020-7656 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.8.1.min.js, jquery-1.7.1.min.js

jquery-1.8.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Path to vulnerable library: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Dependency Hierarchy:

  • โŒ jquery-1.8.1.min.js (Vulnerable Library)
jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html

Path to vulnerable library: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/hapi/html/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/echo/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/multiplex/index.html

Dependency Hierarchy:

  • โŒ jquery-1.7.1.min.js (Vulnerable Library)

Vulnerability Details

jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.

Publish Date: 2020-05-19

URL: CVE-2020-7656

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: rails/jquery-rails@8f601cb

Release Date: 2020-05-19

Fix Resolution: jquery-rails - 2.2.0

CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz

CVE-2020-7598 - Medium Severity Vulnerability

Vulnerable Library - minimist-0.0.8.tgz

parse argument options

Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/@umijs/ui/node_modules/minimist/package.json

Dependency Hierarchy:

  • preset-ui-2.1.13.tgz (Root Library)
    • ui-2.1.7.tgz
      • mkdirp-0.5.1.tgz
        • โŒ minimist-0.0.8.tgz (Vulnerable Library)

Found in HEAD commit: c26250972afd973e8d94cd8930dab408216291ce

Vulnerability Details

minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "proto" payload.

Publish Date: 2020-03-11

URL: CVE-2020-7598

CVSS 3 Score Details (5.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94

Release Date: 2020-03-11

Fix Resolution: minimist - 0.2.1,1.2.3

CVE-2020-8203 (High) detected in lodash-4.17.15.tgz

CVE-2020-8203 - High Severity Vulnerability

Vulnerable Library - lodash-4.17.15.tgz

Lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/lodash/package.json

Dependency Hierarchy:

  • โŒ lodash-4.17.15.tgz (Vulnerable Library)

Vulnerability Details

Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.

Publish Date: 2020-07-15

URL: CVE-2020-8203

CVSS 3 Score Details (7.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1523

Release Date: 2020-07-23

Fix Resolution: lodash - 4.17.19


  • Check this box to open an automated fix PR

WS-2020-0068 (High) detected in yargs-parser-16.1.0.tgz, yargs-parser-10.1.0.tgz

WS-2020-0068 - High Severity Vulnerability

Vulnerable Libraries - yargs-parser-16.1.0.tgz, yargs-parser-10.1.0.tgz

yargs-parser-16.1.0.tgz

the mighty option parser used by yargs

Library home page: https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz

Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json

Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/@ant-design/pro-cli/node_modules/yargs-parser/package.json

Dependency Hierarchy:

  • pro-cli-1.0.20.tgz (Root Library)
    • โŒ yargs-parser-16.1.0.tgz (Vulnerable Library)
yargs-parser-10.1.0.tgz

the mighty option parser used by yargs

Library home page: https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz

Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json

Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/umi-uni18n/node_modules/meow/node_modules/yargs-parser/package.json

Dependency Hierarchy:

  • fabric-2.0.8.tgz (Root Library)
    • stylelint-config-rational-order-0.1.2.tgz
      • stylelint-9.10.1.tgz
        • meow-5.0.0.tgz
          • โŒ yargs-parser-10.1.0.tgz (Vulnerable Library)

Vulnerability Details

Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.proto.bar baz' adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.

Publish Date: 2020-05-01

URL: WS-2020-0068

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Adjacent
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/package/yargs-parser

Release Date: 2020-05-04

Fix Resolution: https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1

CVE-2012-6708 (Medium) detected in jquery-1.8.1.min.js, jquery-1.7.1.min.js

CVE-2012-6708 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.8.1.min.js, jquery-1.7.1.min.js

jquery-1.8.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Path to vulnerable library: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Dependency Hierarchy:

  • โŒ jquery-1.8.1.min.js (Vulnerable Library)
jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html

Path to vulnerable library: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/hapi/html/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/echo/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/multiplex/index.html

Dependency Hierarchy:

  • โŒ jquery-1.7.1.min.js (Vulnerable Library)

Found in HEAD commit: c26250972afd973e8d94cd8930dab408216291ce

Vulnerability Details

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

Publish Date: 2018-01-18

URL: CVE-2012-6708

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2012-6708

Release Date: 2018-01-18

Fix Resolution: jQuery - v1.9.0

CVE-2020-28477 (High) detected in immer-6.0.3.tgz, immer-2.1.5.tgz

CVE-2020-28477 - High Severity Vulnerability

Vulnerable Libraries - immer-6.0.3.tgz, immer-2.1.5.tgz

immer-6.0.3.tgz

Create your next immutable state by mutating the current one

Library home page: https://registry.npmjs.org/immer/-/immer-6.0.3.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/immer/package.json

Dependency Hierarchy:

  • umi-3.1.1.tgz (Root Library)
    • preset-built-in-3.1.1.tgz
      • server-3.1.1.tgz
        • โŒ immer-6.0.3.tgz (Vulnerable Library)
immer-2.1.5.tgz

Create your next immutable state by mutating the current one

Library home page: https://registry.npmjs.org/immer/-/immer-2.1.5.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/dva-immer/node_modules/immer/package.json

Dependency Hierarchy:

  • preset-react-1.4.18.tgz (Root Library)
    • plugin-dva-0.6.5.tgz
      • dva-immer-0.4.19.tgz
        • โŒ immer-2.1.5.tgz (Vulnerable Library)

Vulnerability Details

This affects all versions of package immer.

Publish Date: 2021-01-19

URL: CVE-2020-28477

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2020-11023 (Medium) detected in multiple libraries

CVE-2020-11023 - Medium Severity Vulnerability

Vulnerable Libraries - jquery-1.8.1.min.js, jquery-1.7.1.min.js, jquery-1.9.1.js

jquery-1.8.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Path to vulnerable library: ant-design-pro/node_modules/redeyed/examples/browser/index.html

Dependency Hierarchy:

  • โŒ jquery-1.8.1.min.js (Vulnerable Library)
jquery-1.7.1.min.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js

Path to dependency file: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html

Path to vulnerable library: ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express-3.x/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/express/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/hapi/html/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/echo/index.html,ant-design-pro/node_modules/@umijs/ui/node_modules/sockjs/examples/multiplex/index.html

Dependency Hierarchy:

  • โŒ jquery-1.7.1.min.js (Vulnerable Library)
jquery-1.9.1.js

JavaScript library for DOM operations

Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.js

Path to dependency file: ant-design-pro/node_modules/tinycolor2/test/index.html

Path to vulnerable library: ant-design-pro/node_modules/tinycolor2/test/../demo/jquery-1.9.1.js,ant-design-pro/node_modules/tinycolor2/demo/jquery-1.9.1.js

Dependency Hierarchy:

  • โŒ jquery-1.9.1.js (Vulnerable Library)

Vulnerability Details

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Publish Date: 2020-04-29

URL: CVE-2020-11023

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023

Release Date: 2020-04-29

Fix Resolution: jquery - 3.5.0

WS-2020-0091 (High) detected in http-proxy-1.18.0.tgz

WS-2020-0091 - High Severity Vulnerability

Vulnerable Library - http-proxy-1.18.0.tgz

HTTP proxying for the masses

Library home page: https://registry.npmjs.org/http-proxy/-/http-proxy-1.18.0.tgz

Path to dependency file: ant-design-pro/package.json

Path to vulnerable library: ant-design-pro/node_modules/http-proxy/package.json

Dependency Hierarchy:

  • umi-3.1.1.tgz (Root Library)
    • preset-built-in-3.1.1.tgz
      • server-3.1.1.tgz
        • http-proxy-middleware-1.0.3.tgz
          • โŒ http-proxy-1.18.0.tgz (Vulnerable Library)

Vulnerability Details

Versions of http-proxy prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers an ERR_HTTP_HEADERS_SENT unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using the proxyReq.setHeader function.

Publish Date: 2020-05-14

URL: WS-2020-0091

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1486

Release Date: 2020-05-26

Fix Resolution: http-proxy - 1.18.1

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.