snowdensb / CSPBR

CSP Bit Ranger Solution
0 stars 0 forks source link

WS-2019-0255 (Medium) detected in multiple libraries #25

Open mend-for-github-com[bot] opened 2 years ago

mend-for-github-com[bot] commented 2 years ago

WS-2019-0255 - Medium Severity Vulnerability

Vulnerable Libraries - mermaid-8.0.0-rc.8.min.js, mermaid-8.0.0-rc.8.js, mermaid.core-8.0.0-rc.8.js

mermaid-8.0.0-rc.8.min.js

Markdownish syntax for generating flowcharts, sequence diagrams, class diagrams and gantt charts.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/mermaid/8.0.0-rc.8/mermaid.min.js

Path to vulnerable library: /public/mermaid/mermaid.min.js

Dependency Hierarchy: - :x: **mermaid-8.0.0-rc.8.min.js** (Vulnerable Library)

mermaid-8.0.0-rc.8.js

Markdownish syntax for generating flowcharts, sequence diagrams, class diagrams and gantt charts.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/mermaid/8.0.0-rc.8/mermaid.js

Path to vulnerable library: /public/mermaid/mermaid.js

Dependency Hierarchy: - :x: **mermaid-8.0.0-rc.8.js** (Vulnerable Library)

mermaid.core-8.0.0-rc.8.js

Markdownish syntax for generating flowcharts, sequence diagrams, class diagrams and gantt charts.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/mermaid/8.0.0-rc.8/mermaid.core.js

Path to vulnerable library: /public/mermaid/mermaid.core.js

Dependency Hierarchy: - :x: **mermaid.core-8.0.0-rc.8.js** (Vulnerable Library)

Found in HEAD commit: 86334f0df744f6cfa35a438987cbb4d18d65b5c2

Found in base branch: master

Vulnerability Details

In mermaid, versions prior to 8.2.3 are vulnerable to Cross-Site Scripting if malicious input is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding.

Publish Date: 2019-07-22

URL: WS-2019-0255

CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/751

Release Date: 2019-07-22

Fix Resolution: 8.2.3