4k4xs4pH1r3 / artemisa

Source code of artemisa.unbosque.edu.co, including room and other systems.
GNU General Public License v3.0
1 stars 1 forks source link

jquery.dataTables-1.10.6.js: 1 vulnerabilities (highest severity is: 6.5) #51

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago
Vulnerable Library - jquery.dataTables-1.10.6.js

DataTables enhances HTML tables with the ability to sort, filter and page the data in the table very easily. It provides a comprehensive API and set of configuration options, allowing you to consume data from virtually any data source.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/datatables/1.10.6/js/jquery.dataTables.js

Path to dependency file: /serviciosacademicos/js/datatables/extensions/FixedHeader/examples/simple.html

Path to vulnerable library: /serviciosacademicos/js/datatables/extensions/FixedHeader/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Responsive/examples/styling/../../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/FixedColumns/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Scroller/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Responsive/examples/child-rows/../../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/ColReorder/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/AutoFill/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/KeyTable/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Responsive/examples/initialisation/../../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/ColVis/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Responsive/examples/display-control/../../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/TableTools/examples/../../../media/js/jquery.dataTables.js

Found in HEAD commit: 2265875321fc6aedc20a6cbfb8dc5453f1e64f27

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (jquery.dataTables version) Remediation Possible**
WS-2017-0234 Medium 6.5 jquery.dataTables-1.10.6.js Direct datatables - 1.10.10;org.webjars:datatables:1.10.10

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

WS-2017-0234 ### Vulnerable Library - jquery.dataTables-1.10.6.js

DataTables enhances HTML tables with the ability to sort, filter and page the data in the table very easily. It provides a comprehensive API and set of configuration options, allowing you to consume data from virtually any data source.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/datatables/1.10.6/js/jquery.dataTables.js

Path to dependency file: /serviciosacademicos/js/datatables/extensions/FixedHeader/examples/simple.html

Path to vulnerable library: /serviciosacademicos/js/datatables/extensions/FixedHeader/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Responsive/examples/styling/../../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/FixedColumns/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Scroller/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Responsive/examples/child-rows/../../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/ColReorder/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/AutoFill/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/KeyTable/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Responsive/examples/initialisation/../../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/ColVis/examples/../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/Responsive/examples/display-control/../../../../media/js/jquery.dataTables.js,/serviciosacademicos/js/datatables/extensions/TableTools/examples/../../../media/js/jquery.dataTables.js

Dependency Hierarchy: - :x: **jquery.dataTables-1.10.6.js** (Vulnerable Library)

Found in HEAD commit: 2265875321fc6aedc20a6cbfb8dc5453f1e64f27

Found in base branch: master

### Vulnerability Details

Affected versions of the package are vulnerable to Cross-site Scripting (XSS).

Publish Date: 2015-11-06

URL: WS-2017-0234

### CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2015-11-06

Fix Resolution: datatables - 1.10.10;org.webjars:datatables:1.10.10

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
mend-bolt-for-github[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.

secure-code-warrior-for-github[bot] commented 2 years ago

Micro-Learning Topic: Vulnerable library (Detected by phrase)

Matched on "vulnerable library"

What is this? (2min video)

Use of vulnerable components will introduce weaknesses into the application. Components with published vulnerabilities will allow easy exploitation as resources will often be available to automate the process.

Try this challenge in Secure Code Warrior

secure-code-warrior-for-github[bot] commented 2 years ago

Micro-Learning Topic: Vulnerable library (Detected by phrase)

Matched on "Vulnerable Library"

What is this? (2min video)

Use of vulnerable components will introduce weaknesses into the application. Components with published vulnerabilities will allow easy exploitation as resources will often be available to automate the process.

Try this challenge in Secure Code Warrior

Micro-Learning Topic: Cross-site scripting (Detected by phrase)

Matched on "XSS"

What is this? (2min video)

Reflected cross-site scripting vulnerabilities occur when unescaped input is displayed in the resulting page displayed to the user. When HTML or script is included in the input, it will be processed by a user's browser as HTML or script and can alter the appearance of the page or execute malicious scripts in their user context.

Try this challenge in Secure Code Warrior

mend-bolt-for-github[bot] commented 1 year ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.