valdisiljuconoks / MvcAreasForEPiServer

Add Asp.Net Mvc areas support for EPiServer
MIT License
5 stars 4 forks source link

WS-2020-0142 (Medium) detected in tinymce-4.7.9.min.js - autoclosed #36

Closed mend-bolt-for-github[bot] closed 5 months ago

mend-bolt-for-github[bot] commented 1 year ago

WS-2020-0142 - Medium Severity Vulnerability

Vulnerable Library - tinymce-4.7.9.min.js

TinyMCE rich text editor

Library home page: https://cdnjs.cloudflare.com/ajax/libs/tinymce/4.7.9/tinymce.min.js

Path to vulnerable library: /src/MvcAreasForEPiServer.Forms/modules/_protected/EPiServer.Cms.TinyMce/EPiServer.Cms.TinyMce/2.1.0/ClientResources/tinymce/tinymce.min.js

Dependency Hierarchy: - :x: **tinymce-4.7.9.min.js** (Vulnerable Library)

Found in HEAD commit: 3736946da397dfd847cf1471dbb324579b10e286

Found in base branch: master

Vulnerability Details

A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower.

Publish Date: 2020-08-11

URL: WS-2020-0142

CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-vrv8-v4w8-f95h

Release Date: 2020-08-11

Fix Resolution: tinymce - 5.4.1, 4.9.11


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 5 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.