Abhijit Rajwade created TIKA-4284: ------------------------------------- Summary: CVE-2020-27511 fix needed for activemq-osgi-5.17.6 and strudl.0.3.13 Key: TIKA-4284 URL: https://issues.apache.org/jira/browse/TIKA-4284 Project: Tika Issue Type: Bug Reporter: Abhijit Rajwade
CVE-2020-27511 fix needed for activemq-osgi-5.17.6 and strudl.0.3.13 Description : Severity : CVE CVSS 3: 7.5Sonatype CVSS 3: 7.5 Weakness : Sonatype CWE: 400 Source : National Vulnerability Database Categories : Data Description from CVE : An issue was discovered in the stripTags and unescapeHTML components in Prototype 1.7.3 where an attacker can cause a Regular Expression Denial of Servicethrough stripping crafted HTML tags. Explanation : The prototype package is vulnerable to Regular Expression Denial of Service [ReDoS] attacks. The stripTags[] function in the String.js file used to unescape HTML fails to efficiently parse and remove tags within a given string. An attacker can exploit this vulnerability by submitting a crafted code block which, when parsed by the affected function, will exhaust system resources and trigger a DoS condition. Detection : The application is vulnerable by using this component. Recommendation : There is no non-vulnerable upgrade path for this component/package. We recommend investigating alternative components or a potential mitigating control. Root Cause : activemq-osgi-5.17.6.jarorg/apache/activemq/web/prototype.js : [ , ] Advisories : Attack: https://github.com/AlyxRen/prototype.node.js CVSS Details : CVE CVSS 3: 7.5CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE : CVE-2020-27511 URL : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27511 Remediation : This component does not have any non-vulnerable Version. Please contact the vendor to get this vulnerability fixed. === Description : Severity : CVE CVSS 3: 7.5Sonatype CVSS 3: 7.5 Weakness : Sonatype CWE: 400 Source : National Vulnerability Database Categories : Data Description from CVE : An issue was discovered in the stripTags and unescapeHTML components in Prototype 1.7.3 where an attacker can cause a Regular Expression Denial of Servicethrough stripping crafted HTML tags. Explanation : The prototype package is vulnerable to Regular Expression Denial of Service [ReDoS] attacks. The stripTags[] function in the String.js file used to unescape HTML fails to efficiently parse and remove tags within a given string. An attacker can exploit this vulnerability by submitting a crafted code block which, when parsed by the affected function, will exhaust system resources and trigger a DoS condition. Detection : The application is vulnerable by using this component. Recommendation : There is no non-vulnerable upgrade path for this component/package. We recommend investigating alternative components or a potential mitigating control. Root Cause : strudl.0.3.13 : [ , ] Advisories : Attack: https://github.com/AlyxRen/prototype.node.js CVSS Details : CVE CVSS 3: 7.5CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE : CVE-2020-27511 URL : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27511 Remediation : This component does not have any non-vulnerable Version. Please contact the vendor to get this vulnerability fixed. -- This message was sent by Atlassian Jira (v8.20.10#820010)