adam-26/tag-relativeformat

View on GitHub

Showing 22 of 22 total issues

Function exports has 210 lines of code (exceeds 25 allowed). Consider refactoring.
Open

module.exports = function (grunt) {

    var libpath = require('path');

    grunt.initConfig({
Severity: Major
Found in Gruntfile.js - About 1 day to fix

    Similar blocks of code found in 2 locations. Consider refactoring.
    Open

        for (i in relativeTime.future) {
            if (relativeTime.future.hasOwnProperty(i)) {
                future += ' ' + i + ' {' +
                    relativeTime.future[i].replace('{0}', '#') + '}';
            }
    Severity: Major
    Found in src/core.js and 1 other location - About 1 hr to fix
    src/core.js on lines 140..145

    Duplicated Code

    Duplicated code can lead to software that is hard to understand and difficult to change. The Don't Repeat Yourself (DRY) principle states:

    Every piece of knowledge must have a single, unambiguous, authoritative representation within a system.

    When you violate DRY, bugs and maintenance problems are sure to follow. Duplicated code has a tendency to both continue to replicate and also to diverge (leaving bugs as two similar implementations differ in subtle ways).

    Tuning

    This issue has a mass of 72.

    We set useful threshold defaults for the languages we support but you may want to adjust these settings based on your project guidelines.

    The threshold configuration represents the minimum mass a code block must have to be analyzed for duplication. The lower the threshold, the more fine-grained the comparison.

    If the engine is too easily reporting duplication, try raising the threshold. If you suspect that the engine isn't catching enough duplication, try lowering the threshold. The best setting tends to differ from language to language.

    See codeclimate-duplication's documentation for more information about tuning the mass threshold in your .codeclimate.yml.

    Refactorings

    Further Reading

    Similar blocks of code found in 2 locations. Consider refactoring.
    Open

        for (i in relativeTime.past) {
            if (relativeTime.past.hasOwnProperty(i)) {
                past += ' ' + i + ' {' +
                    relativeTime.past[i].replace('{0}', '#') + '}';
            }
    Severity: Major
    Found in src/core.js and 1 other location - About 1 hr to fix
    src/core.js on lines 133..138

    Duplicated Code

    Duplicated code can lead to software that is hard to understand and difficult to change. The Don't Repeat Yourself (DRY) principle states:

    Every piece of knowledge must have a single, unambiguous, authoritative representation within a system.

    When you violate DRY, bugs and maintenance problems are sure to follow. Duplicated code has a tendency to both continue to replicate and also to diverge (leaving bugs as two similar implementations differ in subtle ways).

    Tuning

    This issue has a mass of 72.

    We set useful threshold defaults for the languages we support but you may want to adjust these settings based on your project guidelines.

    The threshold configuration represents the minimum mass a code block must have to be analyzed for duplication. The lower the threshold, the more fine-grained the comparison.

    If the engine is too easily reporting duplication, try raising the threshold. If you suspect that the engine isn't catching enough duplication, try lowering the threshold. The best setting tends to differ from language to language.

    See codeclimate-duplication's documentation for more information about tuning the mass threshold in your .codeclimate.yml.

    Refactorings

    Further Reading

    Function _format has a Cognitive Complexity of 11 (exceeds 5 allowed). Consider refactoring.
    Open

    RelativeFormat.prototype._format = function (date, options) {
        var now = options && options.now !== undefined ? options.now : dateNow();
    
        if (date === undefined) {
            date = now;
    Severity: Minor
    Found in src/core.js - About 1 hr to fix

    Cognitive Complexity

    Cognitive Complexity is a measure of how difficult a unit of code is to intuitively understand. Unlike Cyclomatic Complexity, which determines how difficult your code will be to test, Cognitive Complexity tells you how difficult your code will be to read and comprehend.

    A method's cognitive complexity is based on a few simple rules:

    • Code is not considered more complex when it uses shorthand that the language provides for collapsing multiple statements into one
    • Code is considered more complex for each "break in the linear flow of the code"
    • Code is considered more complex when "flow breaking structures are nested"

    Further reading

    Function _format has 31 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

    RelativeFormat.prototype._format = function (date, options) {
        var now = options && options.now !== undefined ? options.now : dateNow();
    
        if (date === undefined) {
            date = now;
    Severity: Minor
    Found in src/core.js - About 1 hr to fix

      Function default has 28 lines of code (exceeds 25 allowed). Consider refactoring.
      Open

      export default function (from, to) {
          // Convert to ms timestamps.
          from = +from;
          to   = +to;
      
      
      Severity: Minor
      Found in src/diff.js - About 1 hr to fix

        Function _resolveLocale has a Cognitive Complexity of 8 (exceeds 5 allowed). Consider refactoring.
        Open

        RelativeFormat.prototype._resolveLocale = function (locales) {
            if (typeof locales === 'string') {
                locales = [locales];
            }
        
        
        Severity: Minor
        Found in src/core.js - About 45 mins to fix

        Cognitive Complexity

        Cognitive Complexity is a measure of how difficult a unit of code is to intuitively understand. Unlike Cyclomatic Complexity, which determines how difficult your code will be to test, Cognitive Complexity tells you how difficult your code will be to read and comprehend.

        A method's cognitive complexity is based on a few simple rules:

        • Code is not considered more complex when it uses shorthand that the language provides for collapsing multiple statements into one
        • Code is considered more complex for each "break in the linear flow of the code"
        • Code is considered more complex when "flow breaking structures are nested"

        Further reading

        growl Command Injection
        Open

            "growl": {
              "version": "1.9.2",
              "resolved": "https://registry.npmjs.org/growl/-/growl-1.9.2.tgz",
              "integrity": "sha1-Dqd0NxXbjY3ixe3hd14bRayFwC8=",
              "dev": true
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Command Injection

        Overview:

        Growl adds growl notification support to nodejs.

        Growl does not properly sanitize input before passing it to exec, allowing for arbitrary command execution.

        Recommendation:

        Update to version 1.10.2 or greater

        fresh Regular Expression Denial of Service
        Open

            "fresh": {
              "version": "0.3.0",
              "resolved": "https://registry.npmjs.org/fresh/-/fresh-0.3.0.tgz",
              "integrity": "sha1-ZR+DjiJCTnVm3hYdg1jKoZn4PU8=",
              "dev": true
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        Fresh is a module used by the Express.js framework for 'HTTP response freshness testing'. It is vulnerable to a regular expression denial of service when it is passed specially crafted input to parse. This causes the event loop to be blocked causing a denial of service condition.

        Recommendation:

        If you are using this module via express, upgrade to Express version 4.15.5 or greater.

        Upgrade to 0.5.2 or greater

        mime Regular Expression Denial of Service
        Open

            "mime": {
              "version": "1.3.4",
              "resolved": "https://registry.npmjs.org/mime/-/mime-1.3.4.tgz",
              "integrity": "sha1-EV+eO2s9rylZmDyzjxSaLUDrXVM=",
              "dev": true
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        The mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.

        Recommendation:

        Upgrade to version 2.0.3 or greater.

        cli Arbitrary File Write
        Open

            "cli": {
              "version": "0.6.6",
              "resolved": "https://registry.npmjs.org/cli/-/cli-0.6.6.tgz",
              "integrity": "sha1-Aq1Eo4Cr8nraxebwzdewQ9dMU+M=",
              "dev": true,
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Arbitrary File Write

        Overview:

        lock_file = '/tmp/' + cli.app + '.pid',
        log_file = '/tmp/' + cli.app + '.log';

        The package node-cli insecurely uses the lockfile and logfile. Both of these are temporary, but it allows the starting user to overwrite any file they have access to.

        Recommendation:

        Update to version 1.0.0 or later

        shell-quote Potential Command Injection
        Open

            "shell-quote": {
              "version": "0.0.1",
              "resolved": "https://registry.npmjs.org/shell-quote/-/shell-quote-0.0.1.tgz",
              "integrity": "sha1-GkEZbzwDM8SCMjWT1ohuzxU92YY=",
              "dev": true
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Potential Command Injection

        Overview:

        The npm module "shell-quote" cannot correctly escape ">" and "<" operator used for redirection in shell. I'm wondering if this might be possible vulnerability for many application which depends on shell-quote.

        For example:

        const quote = require('shell-quote').quote; console.log(quote(['foo>bar']));

        will print "foo>bar", where "foo>bar" is desirable.

        This module is downloaded more than 1M times per month and many other modules are depending on this. If an application is escaping command-line args with this module, they might be vulnerable from malicious user input.

        For example: ``` var sq = require('../tests/get/shell-quote-1.6.0'); var exec = require('child_process').exec;

        var pattern = process.argv[2];

        command = sq.quote(['grep', pattern])); exec('cat file | ' + command, function ( err, stdout, stderr) { console.log(command, stdout);
        }); ``` will be vulnerable when user input something like pattern = ':</etc/passwd', which causes the content of /etc/passwd to be leaked.

        Internally, (Jon Lamendola, Nick Starke, Jacob Waddell) found that the ;, {, and } characters weren't escaped properly either. This allows for full command injection. A malicious user could input 'a;{echo,test,123,234}' to execute echo fully.

        Recommendation:

        Upgrade to at least version 1.6.1

        debug Regular Expression Denial of Service
        Open

            "debug": {
              "version": "2.2.0",
              "resolved": "https://registry.npmjs.org/debug/-/debug-2.2.0.tgz",
              "integrity": "sha1-+HBX6ZWxofauaklgZkE3vFbwOdo=",
              "dev": true,
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.

        Recommendation:

        Upgrade to version 2.6.9 or greater if you are on the 2.6.x series or 3.1.0 or greater.

        negotiator Regular Expression Denial of Service
        Open

            "negotiator": {
              "version": "0.5.3",
              "resolved": "https://registry.npmjs.org/negotiator/-/negotiator-0.5.3.tgz",
              "integrity": "sha1-Jp1cR2gQ7JLtvntsLygxY4T5p+g=",
              "dev": true
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        negotiator is an HTTP content negotiator for Node.js and is used by many modules and frameworks including Express and Koa.

        The header for "Accept-Language", when parsed by negotiator is vulnerable to Regular Expression Denial of Service via a specially crafted string.

        Timeline

        • April 29th 2016 - Initial report to maintainers
        • April 29th 2016 - Confirm receipt from maintainers
        • May 1st 2016 - Fix confirmed
        • May 5th 2016 - 0.6.1 published with fix
        • June 16th 2016 - Advisory published (delay was to coordinate fixes in upstream frameworks, Koa and Express)

        Recommendation:

        Upgrade to at least version 0.6.1

        Express users should update to Express 4.14.0 or greater. If you want to see if you are using a vulnerable call, a quick grep for the acceptsLanguages function call in your application will tell you if you are using this functionality.

        minimatch Regular Expression Denial of Service
        Open

                "minimatch": {
                  "version": "2.0.10",
                  "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz",
                  "integrity": "sha1-jQh8OcazjAAbl/ynzm0OHoCvusc=",
                  "dev": true,
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript RegExp objects. The primary function, minimatch(path, pattern) is vulnerable to ReDoS in the pattern parameter. This is because of the regular expression on line 521 of minimatch.js: /((?:\\{2})*)(\\?)\|/g,. The problematic portion of the regex is ((?:\\{2})*) which matches against \\.

        A proof of concept is as follows: ``` var minimatch = require(“minimatch”);

        // utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; }

        var exploit = “[!” + genstr(1000000, “\”) + “A”;

        // minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ```

        Recommendation:

        Updated to version 3.0.2 or greater

        minimatch Regular Expression Denial of Service
        Open

                "minimatch": {
                  "version": "0.3.0",
                  "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz",
                  "integrity": "sha1-J12O2qxPG7MyZHIInnlJyDlGmd0=",
                  "dev": true,
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript RegExp objects. The primary function, minimatch(path, pattern) is vulnerable to ReDoS in the pattern parameter. This is because of the regular expression on line 521 of minimatch.js: /((?:\\{2})*)(\\?)\|/g,. The problematic portion of the regex is ((?:\\{2})*) which matches against \\.

        A proof of concept is as follows: ``` var minimatch = require(“minimatch”);

        // utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; }

        var exploit = “[!” + genstr(1000000, “\”) + “A”;

        // minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ```

        Recommendation:

        Updated to version 3.0.2 or greater

        minimatch Regular Expression Denial of Service
        Open

            "minimatch": {
              "version": "0.2.14",
              "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-0.2.14.tgz",
              "integrity": "sha1-x054BXT2PG+aCQ6Q775u9TpqdWo=",
              "dev": true,
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript RegExp objects. The primary function, minimatch(path, pattern) is vulnerable to ReDoS in the pattern parameter. This is because of the regular expression on line 521 of minimatch.js: /((?:\\{2})*)(\\?)\|/g,. The problematic portion of the regex is ((?:\\{2})*) which matches against \\.

        A proof of concept is as follows: ``` var minimatch = require(“minimatch”);

        // utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; }

        var exploit = “[!” + genstr(1000000, “\”) + “A”;

        // minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ```

        Recommendation:

        Updated to version 3.0.2 or greater

        minimatch Regular Expression Denial of Service
        Open

                "minimatch": {
                  "version": "2.0.10",
                  "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz",
                  "integrity": "sha1-jQh8OcazjAAbl/ynzm0OHoCvusc=",
                  "dev": true,
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript RegExp objects. The primary function, minimatch(path, pattern) is vulnerable to ReDoS in the pattern parameter. This is because of the regular expression on line 521 of minimatch.js: /((?:\\{2})*)(\\?)\|/g,. The problematic portion of the regex is ((?:\\{2})*) which matches against \\.

        A proof of concept is as follows: ``` var minimatch = require(“minimatch”);

        // utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; }

        var exploit = “[!” + genstr(1000000, “\”) + “A”;

        // minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ```

        Recommendation:

        Updated to version 3.0.2 or greater

        minimatch Regular Expression Denial of Service
        Open

                "minimatch": {
                  "version": "2.0.10",
                  "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz",
                  "integrity": "sha1-jQh8OcazjAAbl/ynzm0OHoCvusc=",
                  "dev": true,
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript RegExp objects. The primary function, minimatch(path, pattern) is vulnerable to ReDoS in the pattern parameter. This is because of the regular expression on line 521 of minimatch.js: /((?:\\{2})*)(\\?)\|/g,. The problematic portion of the regex is ((?:\\{2})*) which matches against \\.

        A proof of concept is as follows: ``` var minimatch = require(“minimatch”);

        // utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; }

        var exploit = “[!” + genstr(1000000, “\”) + “A”;

        // minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ```

        Recommendation:

        Updated to version 3.0.2 or greater

        minimatch Regular Expression Denial of Service
        Open

                "minimatch": {
                  "version": "0.3.0",
                  "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz",
                  "integrity": "sha1-J12O2qxPG7MyZHIInnlJyDlGmd0=",
                  "dev": true,
        Severity: Minor
        Found in package-lock.json by nodesecurity

        Regular Expression Denial of Service

        Overview:

        Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript RegExp objects. The primary function, minimatch(path, pattern) is vulnerable to ReDoS in the pattern parameter. This is because of the regular expression on line 521 of minimatch.js: /((?:\\{2})*)(\\?)\|/g,. The problematic portion of the regex is ((?:\\{2})*) which matches against \\.

        A proof of concept is as follows: ``` var minimatch = require(“minimatch”);

        // utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; }

        var exploit = “[!” + genstr(1000000, “\”) + “A”;

        // minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ```

        Recommendation:

        Updated to version 3.0.2 or greater

        Severity
        Category
        Status
        Source
        Language