zettatips / ex10-website

ex10 Volleyball Club website
https://ex10.vercel.app/
MIT License
0 stars 0 forks source link

CVE-2021-39199 (Medium) detected in remark-html-13.0.1.tgz - autoclosed #5

Closed mend-bolt-for-github[bot] closed 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2021-39199 - Medium Severity Vulnerability

Vulnerable Library - remark-html-13.0.1.tgz

remark plugin to compile Markdown to HTML

Library home page: https://registry.npmjs.org/remark-html/-/remark-html-13.0.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/remark-html/package.json

Dependency Hierarchy: - :x: **remark-html-13.0.1.tgz** (Vulnerable Library)

Found in HEAD commit: ccd1fa96ac3b5406cb8231dc95b0496a05a23586

Found in base branch: master

Vulnerability Details

remark-html is an open source nodejs library which compiles Markdown to HTML. In affected versions the documentation of remark-html has mentioned that it was safe by default. In practice the default was never safe and had to be opted into. That is, user input was not sanitized. This means arbitrary HTML can be passed through leading to potential XSS attacks. The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. On older affected versions, pass `sanitize: true` if you cannot update.

Publish Date: 2021-09-07

URL: CVE-2021-39199

CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m

Release Date: 2021-09-07

Fix Resolution: 13.0.2


Step up your Open Source Security Game with WhiteSource here

mend-bolt-for-github[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.