therealjeffbeck / easybuggy

Too buggy web application
Apache License 2.0
0 stars 0 forks source link

CVE-2016-10006 (Medium, reachable) detected in antisamy-1.5.3.jar - autoclosed #71

Closed mend-for-github-com[bot] closed 3 months ago

mend-for-github-com[bot] commented 3 months ago

CVE-2016-10006 - Medium Severity Vulnerability

Vulnerable Library - antisamy-1.5.3.jar

The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML and CSS without exposing the site to XSS vulnerabilities.

Library home page: http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.5.3/antisamy-1.5.3.jar

Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **antisamy-1.5.3.jar** (Vulnerable Library)

Found in HEAD commit: 0638324b7d503b1f148e5a231d4de747adbd151d

Found in base branch: master

Reachability Analysis This vulnerability is potentially reachable ``` org.t246osslab.easybuggy.core.servlets.AbstractServlet (Application) -> org.owasp.esapi.ESAPI (Extension) -> org.owasp.esapi.reference.DefaultValidator (Extension) -> org.owasp.esapi.reference.validation.HTMLValidationRule (Extension) -> org.owasp.validator.html.AntiSamy (Extension) -> org.owasp.validator.html.scan.AntiSamySAXScanner (Extension) -> ❌ org.owasp.validator.html.scan.MagicSAXFilter (Vulnerable Component) ```

Vulnerability Details

In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.

Publish Date: 2016-12-24

URL: CVE-2016-10006

CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006

Release Date: 2016-12-24

Fix Resolution (org.owasp.antisamy:antisamy): 1.5.5

Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0


:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

mend-for-github-com[bot] commented 3 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.