当前位置:   article > 正文

maven 漏洞扫描_idea中maven漏洞扫描

idea中maven漏洞扫描

dependency-check-maven 插件

添加以下 Maven 插件,第一次 check 会很慢,因为需要下载漏洞包

  1. <plugin>
  2. <groupId>org.owasp</groupId>
  3. <artifactId>dependency-check-maven</artifactId>
  4. <version>9.0.9</version>
  5. <configuration>
  6. <autoUpdate>true</autoUpdate>
  7. </configuration>
  8. <executions>
  9. <execution>
  10. <goals>
  11. <goal>check</goal>
  12. </goals>
  13. </execution>
  14. </executions>
  15. </plugin>

将以下 jsrepository.json 文件粘贴到 maven 仓库依赖目录下 dependency-check-data/9.0 和 dependency-check-utils/9.0.9 中

在右侧maven 插件 点击 check 后,运行完毕,在项目 target 会出现 dependency-check-report.html 报告

  1. {
  2. "retire-example": {
  3. "vulnerabilities" : [
  4. {
  5. "below" : "0.0.2",
  6. "severity" : "low",
  7. "identifiers" : {
  8. "CVE" : [ "CVE-XXXX-XXXX" ],
  9. "bug" : "1234",
  10. "summary" : "bug summary"
  11. },
  12. "info" : [ "http://github.com/eoftedal/retire.js/" ]
  13. }
  14. ],
  15. "extractors" : {
  16. "func" : [ "retire.VERSION" ],
  17. "filename" : [ "retire-example-(§§version§§)(.min)?\\.js" ],
  18. "filecontent" : [ "/\\*!? Retire-example v(§§version§§)" ],
  19. "hashes" : { "07f8b94c8d601a24a1914a1a92bec0e4fafda964" : "0.0.1" }
  20. }
  21. },
  22. "jquery": {
  23. "bowername": [ "jQuery" ],
  24. "vulnerabilities" : [
  25. {
  26. "below" : "1.6.3",
  27. "severity" : "medium",
  28. "identifiers" : {
  29. "CVE": [ "CVE-2011-4969" ],
  30. "summary": "XSS with location.hash"
  31. },
  32. "info" : [ "https://nvd.nist.gov/vuln/detail/CVE-2011-4969" , "http://research.insecurelabs.org/jquery/test/", "https://bugs.jquery.com/ticket/9521" ]
  33. },
  34. {
  35. "below" : "1.9.0b1",
  36. "identifiers": {
  37. "CVE" : [ "CVE-2012-6708" ],
  38. "bug": "11290",
  39. "summary": "Selector interpreted as HTML"
  40. },
  41. "severity": "medium",
  42. "info" : [ "http://bugs.jquery.com/ticket/11290" , "https://nvd.nist.gov/vuln/detail/CVE-2012-6708", "http://research.insecurelabs.org/jquery/test/" ]
  43. },
  44. {
  45. "atOrAbove" : "1.4.0",
  46. "below" : "1.12.0",
  47. "identifiers": {
  48. "issue" : "2432",
  49. "summary": "3rd party CORS request may execute",
  50. "CVE": [ "CVE-2015-9251" ]
  51. },
  52. "severity": "medium",
  53. "info" : [ "https://github.com/jquery/jquery/issues/2432", "http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ]
  54. },
  55. {
  56. "atOrAbove" : "1.12.3",
  57. "below" : "3.0.0-beta1",
  58. "identifiers": {
  59. "issue" : "2432",
  60. "summary": "3rd party CORS request may execute",
  61. "CVE": [ "CVE-2015-9251" ]
  62. },
  63. "severity": "medium",
  64. "info" : [ "https://github.com/jquery/jquery/issues/2432", "http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ]
  65. },
  66. {
  67. "atOrAbove" : "1.8.0",
  68. "below" : "1.12.0",
  69. "identifiers": {
  70. "CVE" : [ "CVE-2015-9251" ],
  71. "issue" : "11974",
  72. "summary": "parseHTML() executes scripts in event handlers"
  73. },
  74. "severity": "medium",
  75. "info" : [ "https://bugs.jquery.com/ticket/11974", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ]
  76. },
  77. {
  78. "atOrAbove" : "1.12.2",
  79. "below" : "2.2.0",
  80. "identifiers": {
  81. "CVE" : [ "CVE-2015-9251" ],
  82. "issue" : "11974",
  83. "summary": "parseHTML() executes scripts in event handlers"
  84. },
  85. "severity": "medium",
  86. "info" : [ "https://bugs.jquery.com/ticket/11974", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ]
  87. },
  88. {
  89. "atOrAbove" : "2.2.2",
  90. "below" : "3.0.0",
  91. "identifiers": {
  92. "CVE" : [ "CVE-2015-9251" ],
  93. "issue" : "11974",
  94. "summary": "parseHTML() executes scripts in event handlers"
  95. },
  96. "severity": "medium",
  97. "info" : [ "https://bugs.jquery.com/ticket/11974", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ]
  98. },
  99. {
  100. "below" : "3.4.0",
  101. "identifiers": {
  102. "CVE" : [ "CVE-2019-11358" ],
  103. "summary": "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution"
  104. },
  105. "severity" : "low",
  106. "info" : [ "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", "https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b" ]
  107. },
  108. {
  109. "below" : "3.5.0",
  110. "identifiers": {
  111. "CVE": [ "CVE-2020-11022" ],
  112. "summary": "Regex in its jQuery.htmlPrefilter sometimes may introduce XSS"
  113. },
  114. "severity" : "medium",
  115. "info" : [ "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" ]
  116. },
  117. {
  118. "below" : "3.5.0",
  119. "identifiers": {
  120. "CVE": [ "CVE-2020-11023" ],
  121. "summary": "Regex in its jQuery.htmlPrefilter sometimes may introduce XSS"
  122. },
  123. "severity" : "medium",
  124. "info" : [ "https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/" ]
  125. }
  126. ],
  127. "extractors" : {
  128. "func" : [
  129. "(window.jQuery || window.$ || window.$jq || window.$j).fn.jquery",
  130. "require('jquery').fn.jquery"
  131. ],
  132. "uri" : [ "/(§§version§§)/jquery(\\.min)?\\.js" ],
  133. "filename" : [ "jquery-(§§version§§)(\\.min)?\\.js" ],
  134. "filecontent" : [
  135. "/\\*!? jQuery v(§§version§§)", "\\* jQuery JavaScript Library v(§§version§§)",
  136. "\\* jQuery (§§version§§) - New Wave Javascript", "// \\$Id: jquery.js,v (§§version§§)",
  137. "/\\*! jQuery v(§§version§§)",
  138. "[^a-z]f=\"(§§version§§)\",.*[^a-z]jquery:f,",
  139. "[^a-z]m=\"(§§version§§)\",.*[^a-z]jquery:m,",
  140. "[^a-z.]jquery:[ ]?\"(§§version§§)\"",
  141. "\\$\\.documentElement,Q=e.jQuery,Z=e\\.\\$,ee=\\{\\},te=\\[\\],ne=\"(§§version§§)\""
  142. ],
  143. "filecontentreplace" : [
  144. "/var [a-z]=[a-z]\\.document,([a-z])=\"(§§version§§)\",([a-z])=.{130,160};\\3\\.fn=\\3\\.prototype=\\{jquery:\\1/$2/"
  145. ],
  146. "hashes" : {}
  147. }
  148. },
  149. "jquery-migrate" : {
  150. "vulnerabilities" : [
  151. {
  152. "below" : "1.2.0",
  153. "severity": "medium",
  154. "identifiers": {
  155. "release": "jQuery Migrate 1.2.0 Released",
  156. "summary": "cross-site-scripting"
  157. },
  158. "info" : [ "http://blog.jquery.com/2013/05/01/jquery-migrate-1-2-0-released/" ]
  159. },
  160. {
  161. "below" : "1.2.2",
  162. "severity": "medium",
  163. "identifiers": {
  164. "bug": "11290",
  165. "summary": "Selector interpreted as HTML"
  166. },
  167. "info" : [ "http://bugs.jquery.com/ticket/11290" , "http://research.insecurelabs.org/jquery/test/" ]
  168. }
  169. ],
  170. "extractors" : {
  171. "filename" : [ "jquery-migrate-(§§version§§)(.min)?\\.js" ],
  172. "filecontent" : [ "/\\*!?(?:\n \\*)? jQuery Migrate(?: -)? v(§§version§§)" ],
  173. "hashes" : {}
  174. }
  175. },
  176. "jquery.validator" : {
  177. "bowername": [ "jquery-validator" ],
  178. "vulnerabilities" : [
  179. ],
  180. "extractors" : {
  181. "func" : [ "jQuery.validation.version" ],
  182. "filename" : [ "jquery.validation-(§§version§§)(.min)?\\.js" ],
  183. "uri" : [ "/(§§version§§)/jquery.validation(\\.min)?\\.js" ],
  184. "filecontent" : [ "/\\*!?(?:\n \\*)? jQuery Validation Plugin v(§§version§§)" ],
  185. "hashes" : {}
  186. }
  187. },
  188. "jquery-mobile" : {
  189. "bowername": [ "jquery-mobile", "jquery-mobile-min", "jquery-mobile-build", "jquery-mobile-dist", "jquery-mobile-bower" ],
  190. "vulnerabilities" : [
  191. {
  192. "below" : "1.0RC2",
  193. "severity": "high",
  194. "identifiers": {"osvdb": ["94563", "93562", "94316", "94561", "94560"]},
  195. "info" : [ "http://osvdb.org/show/osvdb/94563", "http://osvdb.org/show/osvdb/94562", "http://osvdb.org/show/osvdb/94316", "http://osvdb.org/show/osvdb/94561", "http://osvdb.org/show/osvdb/94560" ]
  196. },
  197. {
  198. "below" : "1.0.1",
  199. "severity": "high",
  200. "identifiers": {"osvdb": ["94317"]},
  201. "info": [ "http://osvdb.org/show/osvdb/94317" ]
  202. },
  203. {
  204. "below" : "1.1.2",
  205. "severity": "medium",
  206. "identifiers": {
  207. "issue": "4787",
  208. "release": "http://jquerymobile.com/changelog/1.1.2/",
  209. "summary": "location.href cross-site scripting"
  210. },
  211. "info": [ "http://jquerymobile.com/changelog/1.1.2/", "https://github.com/jquery/jquery-mobile/issues/4787" ]
  212. },
  213. {
  214. "below" : "1.2.0",
  215. "severity": "medium",
  216. "identifiers": {
  217. "issue": "4787",
  218. "release": "http://jquerymobile.com/changelog/1.2.0/",
  219. "summary": "location.href cross-site scripting"
  220. },
  221. "info": [ "http://jquerymobile.com/changelog/1.2.0/", "https://github.com/jquery/jquery-mobile/issues/4787" ]
  222. },
  223. {
  224. "below" : "100.0.0",
  225. "severity": "medium",
  226. "identifiers": {
  227. "summary": "open redirect leads to cross site scripting"
  228. },
  229. "info": [ "http://sirdarckcat.blogspot.no/2017/02/unpatched-0day-jquery-mobile-xss.html" ]
  230. },
  231. {
  232. "below" : "1.3.0",
  233. "severity": "high",
  234. "identifiers": {
  235. "summary": "Endpoint that reflect user input leads to cross site scripting"
  236. },
  237. "info": [ "https://gist.github.com/jupenur/e5d0c6f9b58aa81860bf74e010cf1685" ]
  238. }
  239. ],
  240. "extractors" : {
  241. "func" : [ "jQuery.mobile.version" ],
  242. "filename" : [ "jquery.mobile-(§§version§§)(.min)?\\.js" ],
  243. "uri" : [ "/(§§version§§)/jquery.mobile(\\.min)?\\.js" ],
  244. "filecontent" : [ "/\\*!?(?:\n \\*)? jQuery Mobile(?: -)? v(§§version§§)" ],
  245. "hashes" : {}
  246. }
  247. },
  248. "jquery-ui-dialog" : {
  249. "bowername": [ "jquery-ui", "jquery.ui" ],
  250. "vulnerabilities" : [
  251. {
  252. "atOrAbove": "1.8.9",
  253. "below" : "1.10.0",
  254. "severity": "medium",
  255. "identifiers": {
  256. "CVE": [ "CVE-2010-5312" ],
  257. "bug": "6016",
  258. "summary": "Title cross-site scripting vulnerability"
  259. },
  260. "info" : [ "http://bugs.jqueryui.com/ticket/6016", "https://nvd.nist.gov/vuln/detail/CVE-2010-5312" ]
  261. },
  262. {
  263. "below" : "1.12.0",
  264. "severity": "high",
  265. "identifiers": {
  266. "CVE": [ "CVE-2016-7103" ],
  267. "bug": "281",
  268. "summary": "XSS Vulnerability on closeText option"
  269. },
  270. "info" : [ "https://github.com/jquery/api.jqueryui.com/issues/281", "https://nvd.nist.gov/vuln/detail/CVE-2016-7103", "https://snyk.io/vuln/npm:jquery-ui:20160721" ]
  271. }
  272. ],
  273. "extractors" : {
  274. "func" : [ "jQuery.ui.dialog.version" ],
  275. "filecontent" : [
  276. "/\\*!? jQuery UI - v(§§version§§)(.*\n){1,3}.*jquery\\.ui\\.dialog\\.js",
  277. "/\\*!?[\n *]+jQuery UI (§§version§§)(.*\n)*.*\\.ui\\.dialog",
  278. "/\\*!?[\n *]+jQuery UI Dialog (§§version§§)",
  279. "/\\*!? jQuery UI - v(§§version§§)(.*\n){1,3}\\* Includes: .* dialog\\.js"
  280. ],
  281. "hashes" : {}
  282. }
  283. },
  284. "jquery-ui-autocomplete" : {
  285. "bowername": [ "jquery-ui", "jquery.ui" ],
  286. "vulnerabilities" : [ ],
  287. "extractors" : {
  288. "func" : [ "jQuery.ui.autocomplete.version" ],
  289. "filecontent" : [
  290. "/\\*!? jQuery UI - v(§§version§§)(.*\n){1,3}.*jquery\\.ui\\.autocomplete\\.js",
  291. "/\\*!?[\n *]+jQuery UI (§§version§§)(.*\n)*.*\\.ui\\.autocomplete",
  292. "/\\*!?[\n *]+jQuery UI Autocomplete (§§version§§)",
  293. "/\\*!? jQuery UI - v(§§version§§)(.*\n){1,3}\\* Includes: .* autocomplete\\.js"
  294. ],
  295. "hashes" : {}
  296. }
  297. },
  298. "jquery-ui-tooltip" : {
  299. "bowername": [ "jquery-ui", "jquery.ui" ],
  300. "vulnerabilities" : [
  301. {
  302. "atOrAbove": "1.9.2",
  303. "below" : "1.10.0",
  304. "severity": "high",
  305. "identifiers": {
  306. "CVE" : [ "CVE-2012-6662" ],
  307. "bug": "8859",
  308. "summary": "Autocomplete cross-site scripting vulnerability"
  309. },
  310. "info" : [ "http://bugs.jqueryui.com/ticket/8859", "https://nvd.nist.gov/vuln/detail/CVE-2012-6662" ]
  311. }
  312. ],
  313. "extractors" : {
  314. "func" : [ "jQuery.ui.tooltip.version" ],
  315. "filecontent" : [
  316. "/\\*!? jQuery UI - v(§§version§§)(.*\n){1,3}.*jquery\\.ui\\.tooltip\\.js",
  317. "/\\*!?[\n *]+jQuery UI (§§version§§)(.*\n)*.*\\.ui\\.tooltip",
  318. "/\\*!?[\n *]+jQuery UI Tooltip (§§version§§)"
  319. ],
  320. "hashes" : {}
  321. }
  322. },
  323. "jquery.prettyPhoto" : {
  324. "bowername": [ "jquery-prettyPhoto" ],
  325. "vulnerabilities" : [
  326. {
  327. "below" : "3.1.5",
  328. "severity" : "high",
  329. "identifiers" : { "CVE" : [ "CVE-2013-6837" ] },
  330. "info" : [ "https://nvd.nist.gov/vuln/detail/CVE-2013-6837" ]
  331. },
  332. {
  333. "below" : "3.1.6",
  334. "severity" : "high",
  335. "info" : [ "https://github.com/scaron/prettyphoto/issues/149", "https://blog.anantshri.info/forgotten_disclosure_dom_xss_prettyphoto" ]
  336. }
  337. ],
  338. "extractors" : {
  339. "func" : [ "jQuery.prettyPhoto.version" ],
  340. "filecontent" : [
  341. "/\\*(?:.*[\n\r]+){1,3}.*Class: prettyPhoto(?:.*[\n\r]+){1,3}.*Version: (§§version§§)",
  342. "\\.prettyPhoto[ ]?=[ ]?\\{version:[ ]?(?:'|\")(§§version§§)(?:'|\")\\}"
  343. ],
  344. "hashes" : {}
  345. }
  346. },
  347. "jPlayer" : {
  348. "bowername": [ "jPlayer" ],
  349. "vulnerabilities" : [
  350. {
  351. "below" : "2.3.1",
  352. "severity": "high",
  353. "identifiers": {
  354. "CVE": [ "CVE-2013-2023" ],
  355. "release" : "2.3.1",
  356. "summary" : "XSS vulnerability in actionscript/Jplayer.as in the Flash SWF component" },
  357. "info" : [ "http://jplayer.org/latest/release-notes/", "https://nvd.nist.gov/vuln/detail/CVE-2013-2023" ]
  358. },
  359. {
  360. "below" : "2.3.23",
  361. "severity": "high",
  362. "identifiers": {
  363. "CVE": [ "CVE-2013-2022" ],
  364. "release": "2.3.23",
  365. "summary": "XSS vulnerabilities in actionscript/Jplayer.as in the Flash SWF component"
  366. },
  367. "info" : [ "http://jplayer.org/latest/release-notes/", "https://nvd.nist.gov/vuln/detail/CVE-2013-2022" ]
  368. },
  369. {
  370. "below" : "2.2.20",
  371. "severity": "high",
  372. "identifiers": {
  373. "CVE": [ "CVE-2013-1942" ],
  374. "release": "2.2.20",
  375. "summary": "XSS vulnerabilities in actionscript/Jplayer.as in the Flash SWF component"
  376. },
  377. "info" : [ "http://jplayer.org/latest/release-notes/", "https://nvd.nist.gov/vuln/detail/CVE-2013-1942" ]
  378. }
  379. ],
  380. "extractors" : {
  381. "func" : [ "new jQuery.jPlayer().version.script" ],
  382. "filecontent" : [
  383. "/\\*(?:.*[\n\r]+){1,3}.*jPlayer Plugin for jQuery(?:.*[\n\r]+){1,10}.*Version: (§§version§§)"
  384. ],
  385. "hashes" : {}
  386. }
  387. },
  388. "knockout": {
  389. "vulnerabilities" : [
  390. {
  391. "below" : "3.5.0-beta",
  392. "severity": "medium",
  393. "identifiers": {"summary": "XSS injection point in attr name binding for browser IE7 and older"},
  394. "info" : [ "https://github.com/knockout/knockout/issues/1244" ]
  395. }
  396. ],
  397. "extractors" : {
  398. "func" : [ "ko.version" ],
  399. "filename" : [ "knockout-(§§version§§)(.min)?\\.js"],
  400. "filecontent" : [
  401. "\\* Knockout JavaScript library v(§§version§§)"
  402. ],
  403. "hashes" : {}
  404. }
  405. },
  406. "sessvars": {
  407. "vulnerabilities" : [
  408. {
  409. "below" : "1.01",
  410. "severity": "low",
  411. "identifiers": {"summary": "Unsanitized data passed to eval()"},
  412. "info" : [ "http://www.thomasfrank.se/sessionvars.html" ]
  413. }
  414. ],
  415. "extractors" : {
  416. "filename" : [ "sessvars-(§§version§§)(.min)?\\.js"],
  417. "filecontent" : [ "sessvars ver (§§version§§)"],
  418. "hashes" : {}
  419. }
  420. },
  421. "swfobject": {
  422. "bowername": [ "swfobject", "swfobject-bower" ],
  423. "vulnerabilities" : [
  424. {
  425. "below" : "2.1",
  426. "severity": "medium",
  427. "identifiers": {"summary": "DOM-based XSS"},
  428. "info" : [ "https://github.com/swfobject/swfobject/wiki/SWFObject-Release-Notes#swfobject-v21-beta7-june-6th-2008" ]
  429. }
  430. ],
  431. "extractors" : {
  432. "filename" : [ "swfobject_(§§version§§)(.min)?\\.js"],
  433. "filecontent" : [ "SWFObject v(§§version§§) "],
  434. "hashes" : {}
  435. }
  436. },
  437. "tinyMCE" : {
  438. "bowername": [ "tinymce", "tinymce-dist" ],
  439. "vulnerabilities" : [
  440. {
  441. "below" : "1.4.2",
  442. "severity" : "high",
  443. "identifiers" : {
  444. "summary" : "Static code injection vulnerability in inc/function.base.php",
  445. "CVE" : [ "CVE-2011-4825" ]
  446. },
  447. "info" : [ "http://www.cvedetails.com/cve/CVE-2011-4825/" ]
  448. },
  449. {
  450. "below" : "4.2.4",
  451. "severity" : "medium",
  452. "identifiers" : { "summary" : "xss issues with media plugin not properly filtering out some script attributes." },
  453. "info" : [ "https://www.tinymce.com/docs/changelog/" ]
  454. },
  455. {
  456. "below" : "4.2.0",
  457. "severity" : "medium",
  458. "identifiers" : { "summary" : "FIXED so script elements gets removed by default to prevent possible XSS issues in default config implementations" },
  459. "info" : [ "https://www.tinymce.com/docs/changelog/" ]
  460. },
  461. {
  462. "below" : "4.7.12",
  463. "severity" : "medium",
  464. "identifiers" : { "summary" : "FIXED so links with xlink:href attributes are filtered correctly to prevent XSS." },
  465. "info" : [ "https://www.tinymce.com/docs/changelog/" ]
  466. }
  467. ],
  468. "extractors" : {
  469. "filecontent" : [ "// (§§version§§) \\([0-9\\-]+\\)[\n\r]+.{0,1200}l=.tinymce/geom/Rect." ],
  470. "filecontentreplace" : [
  471. "/tinyMCEPreInit.*majorVersion:.([0-9]+).,minorVersion:.([0-9.]+)./$1.$2/",
  472. "/majorVersion:.([0-9]+).,minorVersion:.([0-9.]+).,.*tinyMCEPreInit/$1.$2/"
  473. ],
  474. "func" : [ "tinyMCE.majorVersion + '.'+ tinyMCE.minorVersion" ]
  475. }
  476. },
  477. "YUI" : {
  478. "bowername": [ "yui", "yui3" ],
  479. "vulnerabilities" : [
  480. {
  481. "atOrAbove" : "3.5.0" ,
  482. "below" : "3.9.2",
  483. "severity": "high",
  484. "identifiers": {"CVE": [ "CVE-2013-4942" ] },
  485. "info" : [ "http://www.cvedetails.com/cve/CVE-2013-4942/" ]
  486. },
  487. {
  488. "atOrAbove" : "3.2.0" ,
  489. "below" : "3.9.2",
  490. "severity": "high",
  491. "identifiers": {"CVE": [ "CVE-2013-4941" ] },
  492. "info" : [ "http://www.cvedetails.com/cve/CVE-2013-4941/" ]
  493. },
  494. {
  495. "atOrAbove" : "3.0.0",
  496. "below" : "3.10.3",
  497. "severity": "high",
  498. "identifiers": {"CVE": [ "CVE-2013-4940" ] },
  499. "info" : [ "http://www.cvedetails.com/cve/CVE-2013-4940/" ]
  500. },
  501. {
  502. "atOrAbove" : "3.0.0" ,
  503. "below" : "3.9.2",
  504. "severity": "high",
  505. "identifiers": {"CVE": [ "CVE-2013-4939" ] },
  506. "info" : [ "http://www.cvedetails.com/cve/CVE-2013-4939/" ]
  507. },
  508. {
  509. "atOrAbove" : "2.8.0" ,
  510. "below" : "2.9.1",
  511. "severity": "high",
  512. "identifiers": {"CVE": [ "CVE-2012-5883" ] },
  513. "info" : [ "http://www.cvedetails.com/cve/CVE-2012-5883/" ]
  514. },
  515. {
  516. "atOrAbove" : "2.5.0" ,
  517. "below" : "2.9.1",
  518. "severity": "high",
  519. "identifiers": {"CVE": [ "CVE-2012-5882" ] },
  520. "info" : [ "http://www.cvedetails.com/cve/CVE-2012-5882/" ]
  521. },
  522. {
  523. "atOrAbove" : "2.4.0" ,
  524. "below" : "2.9.1",
  525. "severity": "high",
  526. "identifiers": {"CVE": [ "CVE-2012-5881" ] },
  527. "info" : [ "http://www.cvedetails.com/cve/CVE-2012-5881/" ]
  528. },
  529. {
  530. "below" : "2.9.0",
  531. "severity": "medium",
  532. "identifiers": {"CVE": [ "CVE-2010-4710" ] },
  533. "info" : [ "http://www.cvedetails.com/cve/CVE-2010-4710/" ]
  534. },
  535. {
  536. "atOrAbove" : "2.8.0" ,
  537. "below" : "2.8.2",
  538. "severity": "high",
  539. "identifiers": {"CVE": [ "CVE-2010-4209" ] },
  540. "info" : [ "http://www.cvedetails.com/cve/CVE-2010-4209/" ]
  541. },
  542. {
  543. "atOrAbove" : "2.5.0" ,
  544. "below" : "2.8.2",
  545. "severity": "high",
  546. "identifiers": {"CVE": [ "CVE-2010-4208" ] },
  547. "info" : [ "http://www.cvedetails.com/cve/CVE-2010-4208/" ]
  548. },
  549. {
  550. "atOrAbove" : "2.4.0" ,
  551. "below" : "2.8.2",
  552. "severity": "high",
  553. "identifiers": {"CVE": [ "CVE-2010-4207" ] },
  554. "info" : [ "http://www.cvedetails.com/cve/CVE-2010-4207/" ]
  555. }
  556. ],
  557. "extractors" : {
  558. "func" : [ "YUI.Version", "YAHOO.VERSION" ],
  559. "filename" : [ "yui-(§§version§§)(.min)?\\.js"],
  560. "filecontent" : [ "/*\nYUI (§§version§§)", "/yui/license.(?:html|txt)\nversion: (§§version§§)"],
  561. "hashes" : {}
  562. }
  563. },
  564. "prototypejs" : {
  565. "bowername": [ "prototypejs", "prototype.js", "prototypejs-bower" ],
  566. "vulnerabilities" : [
  567. {
  568. "atOrAbove" : "1.6.0",
  569. "below" : "1.6.0.2",
  570. "severity": "high",
  571. "identifiers": {"CVE": [ "CVE-2008-7220" ] },
  572. "info" : [ "http://www.cvedetails.com/cve/CVE-2008-7220/", "http://prototypejs.org/2008/01/25/prototype-1-6-0-2-bug-fixes-performance-improvements-and-security/" ] },
  573. {
  574. "below" : "1.5.1.2",
  575. "severity": "high",
  576. "identifiers": {"CVE": [ "CVE-2008-7220" ] },
  577. "info" : [ "http://www.cvedetails.com/cve/CVE-2008-7220/", "http://prototypejs.org/2008/01/25/prototype-1-6-0-2-bug-fixes-performance-improvements-and-security/" ] }
  578. ],
  579. "extractors" : {
  580. "func" : [ "Prototype.Version" ],
  581. "uri" : [ "/(§§version§§)/prototype(\\.min)?\\.js" ],
  582. "filename" : [ "prototype-(§§version§§)(.min)?\\.js" ],
  583. "filecontent" : [ "Prototype JavaScript framework, version (§§version§§)",
  584. "Prototype[ ]?=[ ]?\\{[ \r\n\t]*Version:[ ]?(?:'|\")(§§version§§)(?:'|\")" ],
  585. "hashes" : {}
  586. }
  587. },
  588. "ember" : {
  589. "vulnerabilities" : [
  590. {
  591. "atOrAbove" : "1.8.0",
  592. "below" :"1.11.4",
  593. "severity" : "medium",
  594. "identifiers": {"CVE": [ "CVE-2015-7565" ] },
  595. "info": [ "https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY" ]
  596. },
  597. {
  598. "atOrAbove" : "1.12.0",
  599. "below" :"1.12.2",
  600. "severity" : "medium",
  601. "identifiers": {"CVE": [ "CVE-2015-7565" ] },
  602. "info": [ "https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY" ]
  603. },
  604. {
  605. "atOrAbove" : "1.13.0",
  606. "below" : "1.13.12",
  607. "severity" : "medium",
  608. "identifiers": {"CVE": [ "CVE-2015-7565" ] },
  609. "info": [ "https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY" ]
  610. },
  611. {
  612. "atOrAbove" : "2.0.0",
  613. "below" : "2.0.3",
  614. "severity" : "medium",
  615. "identifiers": {"CVE": [ "CVE-2015-7565" ] },
  616. "info": [ "https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY" ]
  617. },
  618. {
  619. "atOrAbove" : "2.1.0",
  620. "below" : "2.1.2",
  621. "severity" : "medium",
  622. "identifiers": {"CVE": [ "CVE-2015-7565" ] },
  623. "info": [ "https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY" ]
  624. },
  625. {
  626. "atOrAbove" : "2.2.0",
  627. "below" : "2.2.1",
  628. "severity" : "medium",
  629. "identifiers": {"CVE": [ "CVE-2015-7565" ] },
  630. "info": [ "https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY" ]
  631. },
  632. {
  633. "below" : "1.5.0",
  634. "severity": "medium",
  635. "identifiers": {
  636. "CVE": [ "CVE-2014-0046" ],
  637. "summary": "ember-routing-auto-location can be forced to redirect to another domain"
  638. },
  639. "info" : [ "https://github.com/emberjs/ember.js/blob/v1.5.0/CHANGELOG.md" ]
  640. },
  641. {
  642. "atOrAbove" : "1.3.0-*",
  643. "below" : "1.3.2",
  644. "severity": "medium",
  645. "identifiers": {"CVE": [ "CVE-2014-0046" ] },
  646. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ" ]
  647. },
  648. {
  649. "atOrAbove" : "1.2.0-*",
  650. "below" : "1.2.2",
  651. "severity": "medium",
  652. "identifiers": {"CVE": [ "CVE-2014-0046" ] },
  653. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ" ] },
  654. {
  655. "atOrAbove" : "1.4.0-*",
  656. "below" : "1.4.0-beta.2",
  657. "severity": "high",
  658. "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]},
  659. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ]
  660. },
  661. {
  662. "atOrAbove" : "1.3.0-*",
  663. "below" : "1.3.1",
  664. "severity": "high",
  665. "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]},
  666. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ]
  667. },
  668. {
  669. "atOrAbove" : "1.2.0-*",
  670. "below" : "1.2.1",
  671. "severity": "high",
  672. "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]},
  673. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ]
  674. },
  675. {
  676. "atOrAbove" : "1.1.0-*",
  677. "below" : "1.1.3",
  678. "severity": "high",
  679. "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]},
  680. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ]
  681. },
  682. {
  683. "atOrAbove" : "1.0.0-*",
  684. "below" : "1.0.1",
  685. "severity": "high",
  686. "identifiers": {"CVE": ["CVE-2014-0013", "CVE-2014-0014"]},
  687. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4", "https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4" ]
  688. },
  689. {
  690. "atOrAbove" : "1.0.0-rc.1",
  691. "below" : "1.0.0-rc.1.1",
  692. "severity": "medium",
  693. "identifiers": {"CVE": [ "CVE-2013-4170" ] },
  694. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ]
  695. },
  696. {
  697. "atOrAbove" : "1.0.0-rc.2",
  698. "below" : "1.0.0-rc.2.1",
  699. "severity": "medium",
  700. "identifiers": {"CVE": [ "CVE-2013-4170" ] },
  701. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ]
  702. },
  703. {
  704. "atOrAbove" : "1.0.0-rc.3",
  705. "below" : "1.0.0-rc.3.1",
  706. "severity": "medium",
  707. "identifiers": {"CVE": [ "CVE-2013-4170" ] },
  708. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ]
  709. },
  710. {
  711. "atOrAbove" : "1.0.0-rc.4",
  712. "below" : "1.0.0-rc.4.1",
  713. "severity": "medium",
  714. "identifiers": {"CVE": [ "CVE-2013-4170" ] },
  715. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ]
  716. },
  717. {
  718. "atOrAbove" : "1.0.0-rc.5",
  719. "below" : "1.0.0-rc.5.1",
  720. "severity": "medium",
  721. "identifiers": {"CVE": [ "CVE-2013-4170" ] },
  722. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ]
  723. },
  724. {
  725. "atOrAbove" : "1.0.0-rc.6",
  726. "below" : "1.0.0-rc.6.1",
  727. "severity": "medium",
  728. "identifiers": {"CVE": [ "CVE-2013-4170" ] },
  729. "info" : [ "https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM" ]
  730. },
  731. {
  732. "below" : "0.9.7.1",
  733. "info" : [ "https://github.com/emberjs/ember.js/blob/master/CHANGELOG" ]
  734. },
  735. {
  736. "below" : "0.9.7",
  737. "severity": "high",
  738. "identifiers": {
  739. "bug": "699",
  740. "summary": "Bound attributes aren't escaped properly"
  741. },
  742. "info" : [ "https://github.com/emberjs/ember.js/issues/699" ]
  743. }
  744. ],
  745. "extractors" : {
  746. "func" : [ "Ember.VERSION" ],
  747. "uri" : [ "/(?:v)?(§§version§§)/ember(\\.min)?\\.js" ],
  748. "filename" : [ "ember-(§§version§§)(\\.min)?\\.js" ],
  749. "filecontent" : [
  750. "Project: Ember -(?:.*\n){9,11}// Version: v(§§version§§)",
  751. "// Version: v(§§version§§)(.*\n){10,15}(Ember Debug|@module ember|@class ember)",
  752. "Ember.VERSION[ ]?=[ ]?(?:'|\")(§§version§§)(?:'|\")"
  753. ],
  754. "hashes" : {}
  755. }
  756. },
  757. "dojo" : {
  758. "vulnerabilities" : [
  759. {
  760. "atOrAbove" : "0.4",
  761. "below" : "0.4.4",
  762. "severity": "high",
  763. "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2272"]},
  764. "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2272/" ]
  765. },
  766. {
  767. "atOrAbove" : "1.0",
  768. "below" : "1.0.3",
  769. "severity": "high",
  770. "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2274", "CVE-2010-2273"]},
  771. "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ]
  772. },
  773. {
  774. "atOrAbove" : "1.1",
  775. "below" : "1.1.2",
  776. "severity": "high",
  777. "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2274", "CVE-2010-2273"]},
  778. "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ]
  779. },
  780. {
  781. "atOrAbove" : "1.2",
  782. "below" : "1.2.4",
  783. "severity": "high",
  784. "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2274", "CVE-2010-2273"]},
  785. "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ]
  786. },
  787. {
  788. "atOrAbove" : "1.3",
  789. "below" : "1.3.3",
  790. "severity": "high",
  791. "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2274", "CVE-2010-2273"]},
  792. "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ]
  793. },
  794. {
  795. "atOrAbove" : "1.4",
  796. "below" : "1.4.2",
  797. "severity": "high",
  798. "identifiers": {"CVE": ["CVE-2010-2276", "CVE-2010-2274", "CVE-2010-2273"]},
  799. "info" : [ "http://dojotoolkit.org/blog/dojo-security-advisory", "http://www.cvedetails.com/cve/CVE-2010-2276/", "http://www.cvedetails.com/cve/CVE-2010-2274/", "http://www.cvedetails.com/cve/CVE-2010-2273/" ]
  800. },
  801. {
  802. "below" : "1.4.2",
  803. "severity": "medium",
  804. "identifiers": {"CVE": [ "CVE-2010-2275" ] },
  805. "info" : [ "http://www.cvedetails.com/cve/CVE-2010-2275/"]
  806. },
  807. {
  808. "below" : "1.1",
  809. "severity": "medium",
  810. "identifiers": {"CVE": [ "CVE-2008-6681" ] },
  811. "info" : [ "http://www.cvedetails.com/cve/CVE-2008-6681/"]
  812. },
  813. {
  814. "below" : "1.10.10",
  815. "severity": "medium",
  816. "identifiers": { "PR" : "307" },
  817. "info" : [ "https://github.com/dojo/dojo/pull/307" , "https://dojotoolkit.org/blog/dojo-1-14-released"]
  818. },
  819. {
  820. "atOrAbove" : "1.11.0",
  821. "below" : "1.11.6",
  822. "severity": "medium",
  823. "identifiers": { "PR" : "307" },
  824. "info" : [ "https://github.com/dojo/dojo/pull/307" , "https://dojotoolkit.org/blog/dojo-1-14-released"]
  825. },
  826. {
  827. "atOrAbove" : "1.12.0",
  828. "below" : "1.12.4",
  829. "severity": "medium",
  830. "identifiers": { "PR" : "307" },
  831. "info" : [ "https://github.com/dojo/dojo/pull/307" , "https://dojotoolkit.org/blog/dojo-1-14-released"]
  832. },
  833. {
  834. "atOrAbove" : "1.13.0",
  835. "below" : "1.13.1",
  836. "severity": "medium",
  837. "identifiers": { "PR" : "307" },
  838. "info" : [ "https://github.com/dojo/dojo/pull/307" , "https://dojotoolkit.org/blog/dojo-1-14-released"]
  839. },
  840. {
  841. "below" : "1.14",
  842. "severity": "medium",
  843. "identifiers": { "CVE": ["CVE-2018-15494"] },
  844. "info" : [ "https://dojotoolkit.org/blog/dojo-1-14-released" ]
  845. }
  846. ],
  847. "extractors" : {
  848. "func" : [ "dojo.version.toString()" ],
  849. "uri" : [ "/(?:dojo-)?(§§version§§)/dojo(\\.min)?\\.js" ],
  850. "filename" : [ "dojo-(§§version§§)(\\.min)?\\.js" ],
  851. "filecontentreplace" : [ "/dojo.version=\\{major:([0-9]+),minor:([0-9]+),patch:([0-9]+)/$1.$2.$3/"],
  852. "hashes" : {
  853. "73cdd262799aab850abbe694cd3bfb709ea23627" : "1.4.1",
  854. "c8c84eddc732c3cbf370764836a7712f3f873326" : "1.4.0",
  855. "d569ce9efb7edaedaec8ca9491aab0c656f7c8f0" : "1.0.0",
  856. "ad44e1770895b7fa84aff5a56a0f99b855a83769" : "1.3.2",
  857. "8fc10142a06966a8709cd9b8732f7b6db88d0c34" : "1.3.1",
  858. "a09b5851a0a3e9d81353745a4663741238ee1b84" : "1.3.0",
  859. "2ab48d45abe2f54cdda6ca32193b5ceb2b1bc25d" : "1.2.3",
  860. "12208a1e649402e362f528f6aae2c614fc697f8f" : "1.2.0",
  861. "72a6a9fbef9fa5a73cd47e49942199147f905206" : "1.1.1"
  862. }
  863. }
  864. },
  865. "angularjs" : {
  866. "bowername": [ "angularjs", "angular.js" ],
  867. "vulnerabilities" : [
  868. {
  869. "below" : "1.8.0",
  870. "severity": "medium",
  871. "identifiers": {
  872. "summary": "angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one.",
  873. "CVE": [ "CVE-2020-7676" ]
  874. },
  875. "info" : [ "https://nvd.nist.gov/vuln/detail/CVE-2020-7676" ]
  876. },
  877. {
  878. "below" : "1.7.9",
  879. "severity": "medium",
  880. "identifiers": {
  881. "summary": "Prototype pollution"
  882. },
  883. "info" : [ "https://github.com/angular/angular.js/commit/726f49dcf6c23106ddaf5cfd5e2e592841db743a", "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#179-pollution-eradication-2019-11-19" ]
  884. },
  885. {
  886. "atOrAbove" : "1.5.0",
  887. "below" : "1.6.9",
  888. "severity": "low",
  889. "identifiers": {
  890. "summary": "XSS through SVG if enableSvg is set"
  891. },
  892. "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#169-fiery-basilisk-2018-02-02", "https://vulnerabledoma.in/ngSanitize1.6.8_bypass.html" ]
  893. },
  894. {
  895. "atOrAbove" : "1.3.0",
  896. "below" : "1.5.0-rc2",
  897. "severity": "medium",
  898. "identifiers": {
  899. "summary": "The attribute usemap can be used as a security exploit"
  900. },
  901. "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-resurrection-2016-07-21" ]
  902. },
  903. {
  904. "atOrAbove" : "1.0.0",
  905. "below" : "1.2.30",
  906. "severity": "medium",
  907. "identifiers": {
  908. "summary": "The attribute usemap can be used as a security exploit"
  909. },
  910. "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-resurrection-2016-07-21" ]
  911. },
  912. {
  913. "below" : "1.6.3",
  914. "severity": "medium",
  915. "identifiers": {
  916. "summary": "Universal CSP bypass via add-on in Firefox"
  917. },
  918. "info" : [ "https://github.com/mozilla/addons-linter/issues/1000#issuecomment-282083435", "http://pastebin.com/raw/kGrdaypP" ]
  919. },
  920. {
  921. "below" : "1.6.3",
  922. "severity": "medium",
  923. "identifiers": {
  924. "summary": "DOS in $sanitize"
  925. },
  926. "info" : [ "https://github.com/angular/angular.js/blob/master/CHANGELOG.md", "https://github.com/angular/angular.js/pull/15699" ]
  927. },
  928. {
  929. "below" : "1.6.5",
  930. "severity": "low",
  931. "identifiers": {
  932. "summary": "XSS in $sanitize in Safari/Firefox"
  933. },
  934. "info" : [ "https://github.com/angular/angular.js/commit/8f31f1ff43b673a24f84422d5c13d6312b2c4d94" ]
  935. }
  936. ],
  937. "extractors" : {
  938. "func" : [ "angular.version.full" ],
  939. "uri" : [ "/(§§version§§)/angular(\\.min)?\\.js" ],
  940. "filename" : [ "angular(?:js)?-(§§version§§)(.min)?\\.js" ],
  941. "filecontent" : [
  942. "/\\*[ \n]+AngularJS v(§§version§§)",
  943. "http://errors\\.angularjs\\.org/(§§version§§)/"
  944. ],
  945. "hashes" : {}
  946. }
  947. },
  948. "backbone.js" : {
  949. "bowername": [ "backbonejs", "backbone" ],
  950. "vulnerabilities" : [
  951. {
  952. "below" : "0.5.0",
  953. "severity": "medium",
  954. "identifiers": {
  955. "release": "0.5.0",
  956. "summary": "cross-site scripting vulnerability"
  957. },
  958. "info" : [ "http://backbonejs.org/#changelog" ]
  959. }
  960. ],
  961. "extractors" : {
  962. "func" : [ "Backbone.VERSION" ],
  963. "uri" : [ "/(§§version§§)/backbone(\\.min)?\\.js" ],
  964. "filename" : [ "backbone(?:js)?-(§§version§§)(.min)?\\.js" ],
  965. "filecontent" : [ "//[ ]+Backbone.js (§§version§§)", "a=t.Backbone={}}a.VERSION=\"(§§version§§)\"" ],
  966. "hashes" : {}
  967. }
  968. },
  969. "mustache.js" : {
  970. "bowername": [ "mustache.js", "mustache" ],
  971. "vulnerabilities" : [
  972. {
  973. "below" : "0.3.1",
  974. "severity": "high",
  975. "identifiers": {
  976. "bug": "112",
  977. "summary": "execution of arbitrary javascript"
  978. },
  979. "info" : [ "https://github.com/janl/mustache.js/issues/112" ]
  980. },
  981. {
  982. "below" : "2.2.1",
  983. "severity": "medium",
  984. "identifiers": {
  985. "bug": "pull request 530",
  986. "summary": "weakness in HTML escaping"
  987. },
  988. "info" : [ "https://github.com/janl/mustache.js/releases/tag/v2.2.1", "https://github.com/janl/mustache.js/pull/530" ]
  989. }
  990. ],
  991. "extractors" : {
  992. "func" : [ "Mustache.version" ],
  993. "uri" : [ "/(§§version§§)/mustache(\\.min)?\\.js" ],
  994. "filename" : [ "mustache(?:js)?-(§§version§§)(.min)?\\.js" ],
  995. "filecontent" : [ "name:\"mustache.js\",version:\"(§§version§§)\"",
  996. "[^a-z]mustache.version[ ]?=[ ]?(?:'|\")(§§version§§)(?:'|\")",
  997. "exports.name[ ]?=[ ]?\"mustache.js\";[\n ]*exports.version[ ]?=[ ]?(?:'|\")(§§version§§)(?:'|\");"
  998. ],
  999. "hashes" : {}
  1000. }
  1001. },
  1002. "handlebars" : {
  1003. "bowername": [ "handlebars", "handlebars.js" ],
  1004. "vulnerabilities" : [
  1005. {
  1006. "below" : "1.0.0.beta.3",
  1007. "severity": "medium",
  1008. "identifiers": {
  1009. "summary": "poorly sanitized input passed to eval()"
  1010. },
  1011. "info" : [ "https://github.com/wycats/handlebars.js/pull/68" ]
  1012. },
  1013. {
  1014. "below" : "4.0.0",
  1015. "severity": "medium",
  1016. "identifiers": {
  1017. "summary": "Quoteless attributes in templates can lead to XSS"
  1018. },
  1019. "info" : [ "https://github.com/wycats/handlebars.js/pull/1083" ]
  1020. },
  1021. {
  1022. "atOrAbove" : "4.0.0",
  1023. "below" : "4.0.13",
  1024. "severity": "high",
  1025. "identifiers": {
  1026. "summary": "A prototype pollution vulnerability in handlebars is exploitable if an attacker can control the template"
  1027. },
  1028. "info" : [
  1029. "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692",
  1030. "https://github.com/wycats/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86"
  1031. ]
  1032. },
  1033. {
  1034. "atOrAbove" : "4.0.0",
  1035. "below" : "4.0.14",
  1036. "severity": "high",
  1037. "identifiers": {
  1038. "summary": "A prototype pollution vulnerability in handlebars is exploitable if an attacker can control the template"
  1039. },
  1040. "info" : [
  1041. "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-174183",
  1042. "https://github.com/wycats/handlebars.js/issues/1495",
  1043. "https://github.com/wycats/handlebars.js/commit/cd38583216dce3252831916323202749431c773e"
  1044. ]
  1045. },
  1046. {
  1047. "atOrAbove" : "4.1.0",
  1048. "below" : "4.1.2",
  1049. "severity": "high",
  1050. "identifiers": {
  1051. "summary": "A prototype pollution vulnerability in handlebars is exploitable if an attacker can control the template"
  1052. },
  1053. "info" : [
  1054. "https://snyk.io/vuln/SNYK-JS-HANDLEBARS-174183",
  1055. "https://github.com/wycats/handlebars.js/issues/1495",
  1056. "https://github.com/wycats/handlebars.js/commit/cd38583216dce3252831916323202749431c773e"
  1057. ]
  1058. },
  1059. {
  1060. "below" : "4.3.0",
  1061. "severity": "low",
  1062. "identifiers": {
  1063. "summary": "Disallow calling helperMissing and blockHelperMissing directly"
  1064. },
  1065. "info" : [
  1066. "https://github.com/wycats/handlebars.js/blob/master/release-notes.md#v430---september-24th-2019"
  1067. ]
  1068. },
  1069. {
  1070. "below" : "4.5.3",
  1071. "severity": "medium",
  1072. "identifiers": {
  1073. "summary": "Prototype pollution"
  1074. },
  1075. "info" : [
  1076. "https://github.com/wycats/handlebars.js/blob/master/release-notes.md#v453---november-18th-2019"
  1077. ]
  1078. }
  1079. ],
  1080. "extractors" : {
  1081. "func" : [ "Handlebars.VERSION" ],
  1082. "uri" : [ "/(§§version§§)/handlebars(\\.min)?\\.js" ],
  1083. "filename" : [ "handlebars(?:js)?-(§§version§§)(.min)?\\.js" ],
  1084. "filecontent" : [
  1085. "Handlebars.VERSION = \"(§§version§§)\";", "Handlebars=\\{VERSION:(?:'|\")(§§version§§)(?:'|\")",
  1086. "this.Handlebars=\\{\\};[\n\r \t]+\\(function\\([a-z]\\)\\{[a-z].VERSION=(?:'|\")(§§version§§)(?:'|\")",
  1087. "/\\*+![\\s]+(?:@license)?[\\s]+handlebars v(§§version§§)"
  1088. ],
  1089. "hashes" : {}
  1090. }
  1091. },
  1092. "easyXDM" : {
  1093. "vulnerabilities" : [
  1094. {
  1095. "below" : "2.4.18",
  1096. "severity": "high",
  1097. "identifiers": {"CVE": [ "CVE-2013-5212" ] },
  1098. "info" : [ "http://blog.kotowicz.net/2013/09/exploiting-easyxdm-part-1-not-usual.html", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5212" ]
  1099. },
  1100. {
  1101. "below" : "2.4.19",
  1102. "severity": "high",
  1103. "identifiers": {"CVE": [ "CVE-2014-1403" ] },
  1104. "info" : [ "http://blog.kotowicz.net/2014/01/xssing-with-shakespeare-name-calling.html", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1403" ]
  1105. }
  1106. ],
  1107. "extractors" : {
  1108. "uri" : [ "/(?:easyXDM-)?(§§version§§)/easyXDM(\\.min)?\\.js" ],
  1109. "filename" : [ "easyXDM-(§§version§§)(.min)?\\.js" ],
  1110. "filecontent" : [ " \\* easyXDM\n \\* http://easyxdm.net/(?:\r|\n|.)+version:\"(§§version§§)\"",
  1111. "@class easyXDM(?:.|\r|\n)+@version (§§version§§)(\r|\n)" ],
  1112. "hashes" : { "cf266e3bc2da372c4f0d6b2bd87bcbaa24d5a643" : "2.4.6"}
  1113. }
  1114. },
  1115. "plupload" : {
  1116. "bowername": [ "Plupload", "plupload" ],
  1117. "vulnerabilities" : [
  1118. {
  1119. "below" : "1.5.4",
  1120. "severity": "high",
  1121. "identifiers": {"CVE": [ "CVE-2012-2401" ] },
  1122. "info" : [ "http://www.cvedetails.com/cve/CVE-2012-2401/" ]
  1123. },
  1124. {
  1125. "below" : "1.5.5",
  1126. "severity": "high",
  1127. "identifiers": {"CVE": [ "CVE-2013-0237" ] },
  1128. "info" : [ "http://www.cvedetails.com/cve/CVE-2013-0237/" ]
  1129. },
  1130. {
  1131. "below" : "2.1.9",
  1132. "severity": "medium",
  1133. "identifiers": {"CVE": [ "CVE-2016-4566" ] },
  1134. "info" : [ "https://github.com/moxiecode/plupload/releases" ]
  1135. }
  1136. ],
  1137. "extractors" : {
  1138. "func" : [ "plupload.VERSION" ],
  1139. "uri" : [ "/(§§version§§)/plupload(\\.min)?\\.js" ],
  1140. "filename" : [ "plupload-(§§version§§)(.min)?\\.js" ],
  1141. "filecontent" : [ "\\* Plupload - multi-runtime File Uploader(?:\r|\n)+ \\* v(§§version§§)",
  1142. "var g=\\{VERSION:\"(§§version§§)\",.*;window.plupload=g\\}"
  1143. ],
  1144. "hashes" : {}
  1145. }
  1146. },
  1147. "DOMPurify" : {
  1148. "bowername": [ "dompurify", "DOMPurify" ],
  1149. "vulnerabilities" : [
  1150. {
  1151. "below" : "0.6.1",
  1152. "severity": "medium",
  1153. "identifiers": { },
  1154. "info" : [ "https://github.com/cure53/DOMPurify/releases/tag/0.6.1" ]
  1155. },
  1156. {
  1157. "below" : "0.8.6",
  1158. "severity": "medium",
  1159. "identifiers": { },
  1160. "info" : [ "https://github.com/cure53/DOMPurify/releases/tag/0.8.6" ]
  1161. },
  1162. {
  1163. "below" : "0.8.9",
  1164. "severity": "low",
  1165. "identifiers": { "summary": "safari UXSS" },
  1166. "info" : [ "https://github.com/cure53/DOMPurify/releases/tag/0.8.9", "https://lists.ruhr-uni-bochum.de/pipermail/dompurify-security/2017-May/000006.html" ]
  1167. },
  1168. {
  1169. "below" : "0.9.0",
  1170. "severity": "low",
  1171. "identifiers": { "summary": "safari UXSS" },
  1172. "info" : [ "https://github.com/cure53/DOMPurify/releases/tag/0.9.0" ]
  1173. }
  1174. ],
  1175. "extractors" : {
  1176. "func" : [ "DOMPurify.version" ],
  1177. "filecontent" : [
  1178. "DOMPurify.version = '(§§version§§)';",
  1179. "DOMPurify.version=\"(§§version§§)\"",
  1180. "DOMPurify=.[^\\r\\n]{10,500}\\.version=\"(§§version§§)\""
  1181. ],
  1182. "hashes" : {}
  1183. }
  1184. },
  1185. "react" : {
  1186. "vulnerabilities" : [
  1187. {
  1188. "atOrAbove" : "0.4.0", "below" : "0.4.2",
  1189. "severity" : "low",
  1190. "identifiers" : {
  1191. "CVE": [ "CVE-2013-7035" ] ,
  1192. "summary":"potential XSS vulnerability can arise when using user data as a key"
  1193. },
  1194. "info": [ "https://facebook.github.io/react/blog/2013/12/18/react-v0.5.2-v0.4.2.html" ]
  1195. },
  1196. {
  1197. "atOrAbove" : "0.5.0", "below" : "0.5.2",
  1198. "severity" : "low",
  1199. "identifiers" : {
  1200. "CVE": [ "CVE-2013-7035" ],
  1201. "summary":"potential XSS vulnerability can arise when using user data as a key"
  1202. },
  1203. "info": [ "https://facebook.github.io/react/blog/2013/12/18/react-v0.5.2-v0.4.2.html" ]
  1204. },
  1205. {
  1206. "below" : "0.14.0",
  1207. "severity" : "low",
  1208. "identifiers" : { "summary":" including untrusted objects as React children can result in an XSS security vulnerability" },
  1209. "info": [ "http://danlec.com/blog/xss-via-a-spoofed-react-element", "https://facebook.github.io/react/blog/2015/10/07/react-v0.14.html" ]
  1210. },
  1211. {
  1212. "atOrAbove" : "16.0.0", "below" : "16.0.1",
  1213. "severity" : "low",
  1214. "identifiers" : {
  1215. "CVE": [ "CVE-2018-6341" ],
  1216. "summary":"potential XSS vulnerability when the attacker controls an attribute name"
  1217. },
  1218. "info": [ "https://github.com/facebook/react/blob/master/CHANGELOG.md", "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ]
  1219. },
  1220. {
  1221. "atOrAbove" : "16.1.0", "below" : "16.1.2",
  1222. "severity" : "low",
  1223. "identifiers" : {
  1224. "CVE": [ "CVE-2018-6341" ],
  1225. "summary":"potential XSS vulnerability when the attacker controls an attribute name"
  1226. },
  1227. "info": [ "https://github.com/facebook/react/blob/master/CHANGELOG.md", "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ]
  1228. },
  1229. {
  1230. "atOrAbove" : "16.2.0", "below" : "16.2.1",
  1231. "severity" : "low",
  1232. "identifiers" : {
  1233. "CVE": [ "CVE-2018-6341" ],
  1234. "summary":"potential XSS vulnerability when the attacker controls an attribute name"
  1235. },
  1236. "info": [ "https://github.com/facebook/react/blob/master/CHANGELOG.md", "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ]
  1237. },
  1238. {
  1239. "atOrAbove" : "16.3.0", "below" : "16.3.3",
  1240. "severity" : "low",
  1241. "identifiers" : {
  1242. "CVE": [ "CVE-2018-6341" ],
  1243. "summary":"potential XSS vulnerability when the attacker controls an attribute name"
  1244. },
  1245. "info": [ "https://github.com/facebook/react/blob/master/CHANGELOG.md", "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ]
  1246. },
  1247. {
  1248. "atOrAbove" : "16.4.0", "below" : "16.4.2",
  1249. "severity" : "low",
  1250. "identifiers" : {
  1251. "CVE": [ "CVE-2018-6341" ],
  1252. "summary":"potential XSS vulnerability when the attacker controls an attribute name"
  1253. },
  1254. "info": [ "https://github.com/facebook/react/blob/master/CHANGELOG.md", "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" ]
  1255. }
  1256. ],
  1257. "extractors" : {
  1258. "func" : [
  1259. "react.version",
  1260. "require('react').version"
  1261. ],
  1262. "filecontent" : [
  1263. "/\\*\\*\n +\\* React \\(with addons\\) ?v(§§version§§)",
  1264. "/\\*\\*\n +\\* React v(§§version§§)",
  1265. "\"\\./ReactReconciler\":[0-9]+,\"\\./Transaction\":[0-9]+,\"fbjs/lib/invariant\":[0-9]+\\}\\],[0-9]+:\\[function\\(require,module,exports\\)\\{\"use strict\";module\\.exports=\"(§§version§§)\"\\}",
  1266. "ReactVersion\\.js[\\*! \\\\/\n\r]{0,100}function\\(e,t\\)\\{\"use strict\";e\\.exports=\"(§§version§§)\"",
  1267. "expected a ReactNode.[\\s\\S]{0,1800}?function\\(e,t\\)\\{\"use strict\";e\\.exports=\"(§§version§§)\""
  1268. ]
  1269. }
  1270. },
  1271. "flowplayer" : {
  1272. "vulnerabilities" : [
  1273. {
  1274. "below" : "5.4.3",
  1275. "severity": "medium",
  1276. "identifiers": { "summary" : "XSS vulnerability in Flash fallback" },
  1277. "info" : [ "https://github.com/flowplayer/flowplayer/issues/381" ]
  1278. }
  1279. ],
  1280. "extractors" : {
  1281. "uri" : [ "flowplayer-(§§version§§)(\\.min)?\\.js" ],
  1282. "filename" : [ "flowplayer-(§§version§§)(\\.min)?\\.js" ]
  1283. }
  1284. },
  1285. "DWR" : {
  1286. "vulnerabilities" : [
  1287. {
  1288. "below" : "1.1.4",
  1289. "severity": "high",
  1290. "identifiers": { "CVE" : [ "CVE-2007-01-09" ] },
  1291. "info" : [ "http://www.cvedetails.com/cve/CVE-2014-5326/", "http://www.cvedetails.com/cve/CVE-2014-5326/" ]
  1292. },
  1293. {
  1294. "below" : "2.0.11",
  1295. "severity": "medium",
  1296. "identifiers": { "CVE" : ["CVE-2014-5326", "CVE-2014-5325"] },
  1297. "info" : [ "http://www.cvedetails.com/cve/CVE-2014-5326/", "http://www.cvedetails.com/cve/CVE-2014-5326/" ]
  1298. },
  1299. {
  1300. "above" : "3",
  1301. "below" : "3.0.RC3",
  1302. "severity": "medium",
  1303. "identifiers": { "CVE" : ["CVE-2014-5326", "CVE-2014-5325"] },
  1304. "info" : [ "http://www.cvedetails.com/cve/CVE-2014-5326/", "http://www.cvedetails.com/cve/CVE-2014-5326/" ]
  1305. }
  1306. ],
  1307. "extractors" : {
  1308. "func" : [ "dwr.version" ],
  1309. "filecontent" : [
  1310. " dwr-(§§version§§).jar"
  1311. ]
  1312. }
  1313. },
  1314. "moment.js" : {
  1315. "bowername": [ "moment", "momentjs" ],
  1316. "vulnerabilities" : [
  1317. {
  1318. "below" : "2.11.2",
  1319. "severity": "low",
  1320. "identifiers": { "summary":"reDOS - regular expression denial of service" },
  1321. "info" : [ "https://github.com/moment/moment/issues/2936" ]
  1322. }
  1323. ],
  1324. "extractors" : {
  1325. "func" : [ "moment.version" ],
  1326. "filecontent" : [ "//! moment.js(?:[\n\r]+)//! version : (§§version§§)" ]
  1327. }
  1328. },
  1329. "bootstrap": {
  1330. "vulnerabilities" : [
  1331. {
  1332. "below" : "4.3.1",
  1333. "atOrAbove" : "4.0.0",
  1334. "identifiers": {
  1335. "issue" : "28236",
  1336. "summary": "XSS in data-template, data-content and data-title properties of tooltip/popover",
  1337. "CVE" : ["CVE-2019-8331"]
  1338. },
  1339. "severity" : "high",
  1340. "info" : [ "https://github.com/twbs/bootstrap/issues/28236" ]
  1341. },
  1342. {
  1343. "below" : "3.4.1",
  1344. "identifiers": {
  1345. "issue" : "28236",
  1346. "summary": "XSS in data-template, data-content and data-title properties of tooltip/popover",
  1347. "CVE" : ["CVE-2019-8331"]
  1348. },
  1349. "severity" : "high",
  1350. "info" : [ "https://github.com/twbs/bootstrap/issues/28236" ]
  1351. },
  1352. {
  1353. "below" : "4.1.2",
  1354. "atOrAbove" : "4.0.0",
  1355. "identifiers": {
  1356. "issue" : "20184",
  1357. "summary": "XSS in data-target property of scrollspy",
  1358. "CVE" : ["CVE-2018-14041"]
  1359. },
  1360. "severity" : "medium",
  1361. "info" : [ "https://github.com/twbs/bootstrap/issues/20184" ]
  1362. },
  1363. {
  1364. "below" : "3.4.0",
  1365. "identifiers": {
  1366. "issue" : "20184",
  1367. "summary": "XSS in data-target property of scrollspy",
  1368. "CVE" : ["CVE-2018-14041"]
  1369. },
  1370. "severity" : "medium",
  1371. "info" : [ "https://github.com/twbs/bootstrap/issues/20184" ]
  1372. },
  1373. {
  1374. "below" : "4.1.2",
  1375. "atOrAbove" : "4.0.0",
  1376. "identifiers": {
  1377. "issue" : "20184",
  1378. "summary": "XSS in collapse data-parent attribute",
  1379. "CVE" : ["CVE-2018-14040"]
  1380. },
  1381. "severity" : "medium",
  1382. "info" : [ "https://github.com/twbs/bootstrap/issues/20184" ]
  1383. },
  1384. {
  1385. "below" : "3.4.0",
  1386. "identifiers": {
  1387. "issue" : "20184",
  1388. "summary": "XSS in collapse data-parent attribute",
  1389. "CVE" : ["CVE-2018-14040"]
  1390. },
  1391. "severity" : "medium",
  1392. "info" : [ "https://github.com/twbs/bootstrap/issues/20184" ]
  1393. },
  1394. {
  1395. "below" : "4.1.2",
  1396. "atOrAbove" : "4.0.0",
  1397. "identifiers": {
  1398. "issue" : "20184",
  1399. "summary": "XSS in data-container property of tooltip",
  1400. "CVE" : ["CVE-2018-14042"]
  1401. },
  1402. "severity" : "medium",
  1403. "info" : [ "https://github.com/twbs/bootstrap/issues/20184" ]
  1404. },
  1405. {
  1406. "below" : "3.4.0",
  1407. "identifiers": {
  1408. "issue" : "20184",
  1409. "summary": "XSS in data-container property of tooltip",
  1410. "CVE" : ["CVE-2018-14042"]
  1411. },
  1412. "severity" : "medium",
  1413. "info" : [ "https://github.com/twbs/bootstrap/issues/20184" ]
  1414. },
  1415. {
  1416. "below" : "2.1.0",
  1417. "severity": "medium",
  1418. "identifiers": {
  1419. "summary": "cross-site scripting vulnerability"
  1420. },
  1421. "info" : [ "https://github.com/twbs/bootstrap/pull/3421" ]
  1422. }
  1423. ],
  1424. "extractors" : {
  1425. "uri" : [ "/(§§version§§)/bootstrap(\\.min)?\\.js", "/(§§version§§)/js/bootstrap(\\.min)?\\.js" ],
  1426. "filename" : [ "bootstrap-(§§version§§)(\\.min)?\\.js" ],
  1427. "filecontent" : [
  1428. "/\\*!? Bootstrap v(§§version§§)",
  1429. "\\* Bootstrap v(§§version§§)",
  1430. "/\\*! Bootstrap v(§§version§§)"
  1431. ],
  1432. "hashes" : {}
  1433. }
  1434. },
  1435. "ckeditor" : {
  1436. "vulnerabilities": [
  1437. {
  1438. "below" : "4.4.3",
  1439. "identifiers" : {
  1440. "summary" : "XSS"
  1441. },
  1442. "severity" : "medium",
  1443. "info": [ "https://github.com/ckeditor/ckeditor-dev/blob/master/CHANGES.md#ckeditor-443" ]
  1444. },
  1445. {
  1446. "below" : "4.4.6",
  1447. "identifiers" : {
  1448. "summary" : "XSS"
  1449. },
  1450. "severity" : "medium",
  1451. "info": [ "https://github.com/ckeditor/ckeditor-dev/blob/master/CHANGES.md#ckeditor-446" ]
  1452. },
  1453. {
  1454. "below" : "4.4.8",
  1455. "identifiers" : {
  1456. "summary" : "XSS"
  1457. },
  1458. "severity" : "medium",
  1459. "info": [ "https://github.com/ckeditor/ckeditor-dev/blob/master/CHANGES.md#ckeditor-448" ]
  1460. },
  1461. {
  1462. "below" : "4.5.11",
  1463. "identifiers" : {
  1464. "summary" : "XSS"
  1465. },
  1466. "severity" : "medium",
  1467. "info": [ "https://github.com/ckeditor/ckeditor-dev/blob/master/CHANGES.md#ckeditor-4511" ]
  1468. },
  1469. {
  1470. "below" : "4.9.2",
  1471. "atOrAbove" : "4.5.11",
  1472. "identifiers" : {
  1473. "summary" : "XSS if the enhanced image plugin is installed"
  1474. },
  1475. "severity" : "medium",
  1476. "info": [ "https://ckeditor.com/blog/CKEditor-4.9.2-with-a-security-patch-released/", "https://ckeditor.com/cke4/release-notes" ]
  1477. },
  1478. {
  1479. "atOrAbove" : "4.0.0",
  1480. "below" : "4.11.0",
  1481. "identifiers" : {
  1482. "summary" : "XSS vulnerability in the HTML parser"
  1483. },
  1484. "severity" : "medium",
  1485. "info" : [
  1486. "https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/",
  1487. "https://snyk.io/vuln/SNYK-JS-CKEDITOR-72618"
  1488. ]
  1489. },
  1490. {
  1491. "below" : "4.14.0",
  1492. "identifiers" : {
  1493. "summary" : "XSS"
  1494. },
  1495. "severity" : "low",
  1496. "info": [ "https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-414" ]
  1497. }
  1498. ],
  1499. "extractors" : {
  1500. "uri" : [ "/(§§version§§)/ckeditor(\\.min)?\\.js" ],
  1501. "filename" : [ "ckeditor-(§§version§§)(\\.min)?\\.js" ],
  1502. "filecontent" : [
  1503. "ckeditor..js.{4,20}=\\{timestamp:\"[^\"]+\",version:\"(§§version§§)",
  1504. "window.CKEDITOR=function\\(\\)\\{var [a-z]=\\{timestamp:\"[^\"]+\",version:\"(§§version§§)"
  1505. ],
  1506. "hashes" : {},
  1507. "func" : [ "CKEDITOR.version" ]
  1508. }
  1509. },
  1510. "vue" : {
  1511. "vulnerabilities" : [
  1512. {
  1513. "below" : "2.5.17",
  1514. "severity" : "medium",
  1515. "identifiers" : {
  1516. "summary" : "potential xss in ssr when using v-bind"
  1517. },
  1518. "info" : [ "https://github.com/vuejs/vue/releases/tag/v2.5.17" ]
  1519. },
  1520. {
  1521. "below" : "2.4.3",
  1522. "severity" : "medium",
  1523. "identifiers" : {
  1524. "summary" : "possible xss vector "
  1525. },
  1526. "info" : [ "https://github.com/vuejs/vue/releases/tag/v2.4.3" ]
  1527. }
  1528. ],
  1529. "extractors" : {
  1530. "uri" : [
  1531. "/vue@(§§version§§)/dist/vue\\.js"
  1532. ],
  1533. "filename" : [ "vue-(§§version§§)(\\.min)?\\.js" ],
  1534. "filecontent" : [
  1535. "/\\*!\\n * Vue.js v(§§version§§)",
  1536. "Vue.version = '(§§version§§)';",
  1537. "'(§§version§§)'[^\\n]{0,8000}Vue compiler"
  1538. ],
  1539. "func" : [ "Vue.version" ]
  1540. }
  1541. },
  1542. "ExtJS" : {
  1543. "vulnerabilities" : [
  1544. {
  1545. "below" : "6.6.0",
  1546. "atOrAbove" : "4.0.0",
  1547. "severity" : "high",
  1548. "identifiers" : {
  1549. "CVE" : [
  1550. "CVE-2018-8046"
  1551. ],
  1552. "summary" : "XSS in Sencha Ext JS 4 to 6 via getTip() method of Action Columns"
  1553. },
  1554. "info" : [
  1555. "http://seclists.org/fulldisclosure/2018/Jul/8",
  1556. "https://nvd.nist.gov/vuln/detail/CVE-2018-8046"
  1557. ]
  1558. },
  1559. {
  1560. "below" : "6.0.0",
  1561. "severity" : "high",
  1562. "identifiers" : {
  1563. "CVE" : [
  1564. "CVE-2007-2285"
  1565. ],
  1566. "summary" : "Directory traversal and arbitrary file read"
  1567. },
  1568. "info" : [
  1569. "https://www.cvedetails.com/cve/CVE-2007-2285/",
  1570. "https://packetstormsecurity.com/files/132052/extjs-Arbitrary-File-Read.html",
  1571. "https://www.akawebdesign.com/2018/08/14/should-js-frameworks-prevent-xss/"
  1572. ]
  1573. },
  1574. {
  1575. "below" : "4.0.0",
  1576. "atOrAbove" : "3.0.0",
  1577. "severity" : "high",
  1578. "identifiers" : {
  1579. "CVE" : [
  1580. "CVE-2010-4207",
  1581. "CVE-2012-5881"
  1582. ],
  1583. "summary" : "XSS vulnerability in ExtJS charts.swf"
  1584. },
  1585. "info" : [
  1586. "https://www.acunetix.com/vulnerabilities/web/extjs-charts-swf-cross-site-scripting",
  1587. "https://typo3.org/security/advisory/typo3-core-sa-2014-001/",
  1588. "https://www.akawebdesign.com/2018/08/14/should-js-frameworks-prevent-xss/"
  1589. ]
  1590. }
  1591. ],
  1592. "extractors" : {
  1593. "uri" : [
  1594. "/extjs/(§§version§§)/.*\\.js"
  1595. ],
  1596. "filename" : [
  1597. "/ext-all-(§§version§§)(\\.min)?\\.js",
  1598. "/ext-all-debug-(§§version§§)(\\.min)?\\.js",
  1599. "/ext-base-(§§version§§)(\\.min)?\\.js"
  1600. ],
  1601. "filecontent" : [
  1602. "/*!\n * Ext JS Library (§§version§§)"
  1603. ],
  1604. "func" : [
  1605. "Ext && Ext.versions && Ext.versions.extjs.version",
  1606. "Ext && Ext.version"
  1607. ]
  1608. }
  1609. },
  1610. "dont check" : {
  1611. "extractors" : {
  1612. "uri" : [
  1613. "^http[s]?://(ssl|www).google-analytics.com/ga.js",
  1614. "^http[s]?://apis.google.com/js/plusone.js",
  1615. "^http[s]?://cdn.cxense.com/cx.js"
  1616. ]
  1617. }
  1618. }
  1619. }

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/花生_TL007/article/detail/427731
推荐阅读
相关标签
  

闽ICP备14008679号