eldorplus / portfolio

Portfolio de Patrick LUZOLO, Ingénieur Système, Réseaux & Sécurité / Développeur We
0 stars 0 forks source link

CVE-2019-10905 (High) detected in erusev/parsedown-1.6.1 #60

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2019-10905 - High Severity Vulnerability

Vulnerable Library - erusev/parsedown-1.6.1

Parser for Markdown.

Library home page: https://api.github.com/repos/erusev/parsedown/zipball/20ff8bbb57205368b4b42d094642a3e52dac85fb

Dependency Hierarchy: - laravel/framework-v5.4.15 (Root Library) - :x: **erusev/parsedown-1.6.1** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which interferes with the intended behavior of a single class name beginning with the language- substring.

Publish Date: 2019-04-06

URL: CVE-2019-10905

CVSS 3 Score Details (8.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10905

Release Date: 2019-04-06

Fix Resolution: 1.7.2


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

mend-bolt-for-github[bot] commented 9 months ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.