loftwah / shop.grindmodecypher.com

This is the repository for shop.grindmodecypher.com. A website I have built, and maintain for the music group I am in called Grind Mode Cypher.
https://shop.grindmodecypher.com
GNU General Public License v3.0
2 stars 0 forks source link

WS-2021-0001 (High) detected in tinymce-4.9.11.min.js #53

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

WS-2021-0001 - High Severity Vulnerability

Vulnerable Library - tinymce-4.9.11.min.js

TinyMCE rich text editor

Library home page: https://cdnjs.cloudflare.com/ajax/libs/tinymce/4.9.11/tinymce.min.js

Path to vulnerable library: /wp-content/themes/Divi/includes/builder/frontend-builder/assets/vendors/tinymce.min.js

Dependency Hierarchy: - :x: **tinymce-4.9.11.min.js** (Vulnerable Library)

Found in HEAD commit: ab76dd905220f63a5e50d7a6c36543f1d876d52a

Found in base branch: master

Vulnerability Details

A regex denial of service (ReDoS) vulnerability was discovered in a dependency of the codesample plugin. The vulnerability allowed poorly formed ruby code samples to lock up the browser while performing syntax highlighting. This impacts users of the codesample plugin using TinyMCE 5.5.1 or lower. This vulnerability has been patched in TinyMCE 5.6.0 by upgrading to a version of the dependency without the vulnerability.

Publish Date: 2021-01-05

URL: WS-2021-0001

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/tinymce/tinymce/security/advisories/GHSA-h96f-fc7c-9r55

Release Date: 2021-01-05

Fix Resolution: tinymce - 5.6.0


Step up your Open Source Security Game with Mend here