Milerius / tender_samet

MIT License
1 stars 4 forks source link

CVE-2017-15612 Medium Severity Vulnerability detected by WhiteSource #12

Open mend-bolt-for-github[bot] opened 5 years ago

mend-bolt-for-github[bot] commented 5 years ago

CVE-2017-15612 - Medium Severity Vulnerability

Vulnerable Library - mistune-0.7.4-py2.py3-none-any.whl

The fastest markdown parser in pure Python

path: /tender_samet/requirements.txt

Library home page: https://pypi.python.org/packages/7b/ab/e71dd1ca31addcd0268c54859eaf75414a10fbc48c79078f7c3066e6ed0d/mistune-0.7.4-py2.py3-none-any.whl

Dependency Hierarchy: - :x: **mistune-0.7.4-py2.py3-none-any.whl** (Vulnerable Library)

Vulnerability Details

mistune.py in Mistune 0.7.4 allows XSS via an unexpected newline (such as in java\nscript:) or a crafted email address, related to the escape and autolink functions.

Publish Date: 2017-10-19

URL: CVE-2017-15612

CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Change files

Origin: https://github.com/lepture/mistune/commit/d6f0b6402299bf5a380e7b4e77bd80e8736630fe

Release Date: 2017-10-18

Fix Resolution: Replace or update the following files: mistune.py, __init__.py, test_extra.py


Step up your Open Source Security Game with WhiteSource here