[ https://issues.apache.org/jira/browse/TIKA-4284?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Tilman Hausherr closed TIKA-4284. --------------------------------- Resolution: Invalid > [Security] CVE-2020-27511 fix needed for activemq-osgi-5.17.6 and > strudl.0.3.13 > ------------------------------------------------------------------------------- > > Key: TIKA-4284 > URL: https://issues.apache.org/jira/browse/TIKA-4284 > Project: Tika > Issue Type: Bug > Reporter: Abhijit Rajwade > Priority: Major > Labels: SECURITY > > CVE-2020-27511 fix needed for activemq-osgi-5.17.6 and strudl.0.3.13 > Description : > Severity : CVE CVSS 3: 7.5Sonatype CVSS 3: 7.5 > Weakness : Sonatype CWE: 400 > Source : National Vulnerability Database > Categories : Data > Description from CVE : An issue was discovered in the stripTags and > unescapeHTML components in Prototype 1.7.3 where an attacker can cause a > Regular Expression Denial of Servicethrough stripping crafted HTML tags. > Explanation : The prototype package is vulnerable to Regular Expression > Denial of Service [ReDoS] attacks. The stripTags[] function in the String.js > file used to unescape HTML fails to efficiently parse and remove tags within > a given string. An attacker can exploit this vulnerability by submitting a > crafted code block which, when parsed by the affected function, will exhaust > system resources and trigger a DoS condition. > Detection : The application is vulnerable by using this component. > Recommendation : There is no non-vulnerable upgrade path for this > component/package. We recommend investigating alternative components or a > potential mitigating control. > Root Cause : activemq-osgi-5.17.6.jarorg/apache/activemq/web/prototype.js : > [ , ] > Advisories : Attack: https://github.com/AlyxRen/prototype.node.js > CVSS Details : CVE CVSS 3: 7.5CVSS Vector: > CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H > CVE : CVE-2020-27511 > URL : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27511 > Remediation : This component does not have any non-vulnerable Version. Please > contact the vendor to get this vulnerability fixed. > === > Description : > Severity : CVE CVSS 3: 7.5Sonatype CVSS 3: 7.5 > Weakness : Sonatype CWE: 400 > Source : National Vulnerability Database > Categories : Data > Description from CVE : An issue was discovered in the stripTags and > unescapeHTML components in Prototype 1.7.3 where an attacker can cause a > Regular Expression Denial of Servicethrough stripping crafted HTML tags. > Explanation : The prototype package is vulnerable to Regular Expression > Denial of Service [ReDoS] attacks. The stripTags[] function in the String.js > file used to unescape HTML fails to efficiently parse and remove tags within > a given string. An attacker can exploit this vulnerability by submitting a > crafted code block which, when parsed by the affected function, will exhaust > system resources and trigger a DoS condition. > Detection : The application is vulnerable by using this component. > Recommendation : There is no non-vulnerable upgrade path for this > component/package. We recommend investigating alternative components or a > potential mitigating control. > Root Cause : strudl.0.3.13 : [ , ] > Advisories : Attack: https://github.com/AlyxRen/prototype.node.js > CVSS Details : CVE CVSS 3: 7.5CVSS Vector: > CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H > CVE : CVE-2020-27511 > URL : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27511 > Remediation : This component does not have any non-vulnerable Version. Please > contact the vendor to get this vulnerability fixed. -- This message was sent by Atlassian Jira (v8.20.10#820010)