WARNING: This app contains security vulnerabilities. AltoroJ is a sample banking J2EE web application. It shows what happens when web applications are written with consideration of app functionality but not app security. It's a simple and uncluttered platform for demonstrating and learning more about real-life application security issues.
Apache License 2.0
1
stars
0
forks
source link
swfobject-2.2.js: 1 vulnerabilities (highest severity is: 9.8) #5
Vulnerable Library - swfobject-2.2.js
SWFObject is an easy-to-use and standards-friendly method to embed Flash content, which utilizes one small JavaScript file
Library home page: https://cdnjs.cloudflare.com/ajax/libs/swfobject/2.2/swfobject.js
Path to dependency file: /WebContent/bank/stocks.jsp
Path to vulnerable library: /WebContent/util/swfobject.js,/WebContent/bank/../util/swfobject.js
Found in HEAD commit: c7142581c9069b8cb9288ee3a8c017f04d3578b4
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2012-2400
### Vulnerable Library - swfobject-2.2.jsSWFObject is an easy-to-use and standards-friendly method to embed Flash content, which utilizes one small JavaScript file
Library home page: https://cdnjs.cloudflare.com/ajax/libs/swfobject/2.2/swfobject.js
Path to dependency file: /WebContent/bank/stocks.jsp
Path to vulnerable library: /WebContent/util/swfobject.js,/WebContent/bank/../util/swfobject.js
Dependency Hierarchy: - :x: **swfobject-2.2.js** (Vulnerable Library)
Found in HEAD commit: c7142581c9069b8cb9288ee3a8c017f04d3578b4
Found in base branch: AltoroJ-3.2
### Vulnerability DetailsUnspecified vulnerability in wp-includes/js/swfobject.js in WordPress before 3.3.2 has unknown impact and attack vectors.
Publish Date: 2012-04-21
URL: CVE-2012-2400
### CVSS 3 Score Details (9.8)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2400
Release Date: 2012-04-21
Fix Resolution: 3.3.2