WillStrohl / dnnextensions

One solution. Multiple extensions. No pain. A collection of DNN modules and other extensions.
https://upendoventures.com/dnn-extensions
MIT License
38 stars 18 forks source link

CVE-2019-14863 (Medium) detected in angular-1.4.7.min.js, angular-1.4.7.js #197

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2019-14863 - Medium Severity Vulnerability

Vulnerable Libraries - angular-1.4.7.min.js, angular-1.4.7.js

angular-1.4.7.min.js

AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.4.7/angular.min.js

Path to vulnerable library: /Modules/CodeCamp/Scripts/ng/angular/angular.min.js

Dependency Hierarchy: - :x: **angular-1.4.7.min.js** (Vulnerable Library)

angular-1.4.7.js

AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.4.7/angular.js

Path to vulnerable library: /Modules/CodeCamp/Scripts/ng/angular/angular.js

Dependency Hierarchy: - :x: **angular-1.4.7.js** (Vulnerable Library)

Found in HEAD commit: 1f8af17e591b32ac36af71a5f8fc037a8812e8f8

Found in base branch: development

Vulnerability Details

There is a vulnerability in all angular versions before 1.5.0-beta.0, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.

Publish Date: 2020-01-02

URL: CVE-2019-14863

CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-01-09

Fix Resolution: angular - v1.5.0-beta.1;org.webjars:angularjs:1.5.0-rc.0


Step up your Open Source Security Game with Mend here