Closed mend-for-github-com[bot] closed 2 years ago
:information_source: This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #48
:information_source: This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #48
CVE-2021-23445 - Medium Severity Vulnerability
Vulnerable Library - jquery.dataTables-1.10.16.min.js
DataTables enhances HTML tables with the ability to sort, filter and page the data in the table very easily. It provides a comprehensive API and set of configuration options, allowing you to consume data from virtually any data source.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/datatables/1.10.16/js/jquery.dataTables.min.js
Path to vulnerable library: /app/assets/javascripts/jquery.dataTables.min.js
Dependency Hierarchy: - :x: **jquery.dataTables-1.10.16.min.js** (Vulnerable Library)
Found in HEAD commit: 865acb2c06791e65a8227e6aa926e585e7834c2d
Found in base branch: master
Vulnerability Details
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.
Publish Date: 2021-09-27
URL: CVE-2021-23445
CVSS 3 Score Details (6.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23445
Release Date: 2021-09-27
Fix Resolution: datatables.net - 1.11.3