Open mend-for-github-com[bot] opened 2 years ago
mermaid-8.0.0-rc.8.min.js
Markdownish syntax for generating flowcharts, sequence diagrams, class diagrams and gantt charts.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/mermaid/8.0.0-rc.8/mermaid.min.js
Path to vulnerable library: /public/mermaid/mermaid.min.js
Dependency Hierarchy: - :x: **mermaid-8.0.0-rc.8.min.js** (Vulnerable Library)
Library home page: https://cdnjs.cloudflare.com/ajax/libs/mermaid/8.0.0-rc.8/mermaid.js
Path to vulnerable library: /public/mermaid/mermaid.js
Dependency Hierarchy: - :x: **mermaid-8.0.0-rc.8.js** (Vulnerable Library)
Library home page: https://cdnjs.cloudflare.com/ajax/libs/mermaid/8.0.0-rc.8/mermaid.core.js
Path to vulnerable library: /public/mermaid/mermaid.core.js
Dependency Hierarchy: - :x: **mermaid.core-8.0.0-rc.8.js** (Vulnerable Library)
Found in HEAD commit: 86334f0df744f6cfa35a438987cbb4d18d65b5c2
Found in base branch: master
In mermaid, versions prior to 8.2.3 are vulnerable to Cross-Site Scripting if malicious input is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding.
Publish Date: 2019-07-22
URL: WS-2019-0255
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/751
Release Date: 2019-07-22
Fix Resolution: 8.2.3
WS-2019-0255 - Medium Severity Vulnerability
Vulnerable Libraries - mermaid-8.0.0-rc.8.min.js, mermaid-8.0.0-rc.8.js, mermaid.core-8.0.0-rc.8.js
mermaid-8.0.0-rc.8.min.js
Markdownish syntax for generating flowcharts, sequence diagrams, class diagrams and gantt charts.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/mermaid/8.0.0-rc.8/mermaid.min.js
Path to vulnerable library: /public/mermaid/mermaid.min.js
Dependency Hierarchy: - :x: **mermaid-8.0.0-rc.8.min.js** (Vulnerable Library)
mermaid-8.0.0-rc.8.js
Markdownish syntax for generating flowcharts, sequence diagrams, class diagrams and gantt charts.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/mermaid/8.0.0-rc.8/mermaid.js
Path to vulnerable library: /public/mermaid/mermaid.js
Dependency Hierarchy: - :x: **mermaid-8.0.0-rc.8.js** (Vulnerable Library)
mermaid.core-8.0.0-rc.8.js
Markdownish syntax for generating flowcharts, sequence diagrams, class diagrams and gantt charts.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/mermaid/8.0.0-rc.8/mermaid.core.js
Path to vulnerable library: /public/mermaid/mermaid.core.js
Dependency Hierarchy: - :x: **mermaid.core-8.0.0-rc.8.js** (Vulnerable Library)
Found in HEAD commit: 86334f0df744f6cfa35a438987cbb4d18d65b5c2
Found in base branch: master
Vulnerability Details
In mermaid, versions prior to 8.2.3 are vulnerable to Cross-Site Scripting if malicious input is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding.
Publish Date: 2019-07-22
URL: WS-2019-0255
CVSS 3 Score Details (6.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/751
Release Date: 2019-07-22
Fix Resolution: 8.2.3