[ 
https://issues.apache.org/jira/browse/TIKA-4284?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17867236#comment-17867236
 ] 

Tilman Hausherr commented on TIKA-4284:
---------------------------------------

How is this related to Tika? What subproject uses activemq-osgi-5.17.6 and 
strudl.0.3.13?

> [Security] CVE-2020-27511 fix needed for activemq-osgi-5.17.6 and 
> strudl.0.3.13
> -------------------------------------------------------------------------------
>
>                 Key: TIKA-4284
>                 URL: https://issues.apache.org/jira/browse/TIKA-4284
>             Project: Tika
>          Issue Type: Bug
>            Reporter: Abhijit Rajwade
>            Priority: Major
>              Labels: SECURITY
>
> CVE-2020-27511 fix needed for activemq-osgi-5.17.6 and strudl.0.3.13
> Description :
> Severity :    CVE CVSS 3: 7.5Sonatype CVSS 3: 7.5
> Weakness :    Sonatype CWE: 400
> Source :      National Vulnerability Database
> Categories :  Data
> Description from CVE :        An issue was discovered in the stripTags and 
> unescapeHTML components in Prototype 1.7.3 where an attacker can cause a 
> Regular Expression Denial of Servicethrough stripping crafted HTML tags.
> Explanation : The prototype package is vulnerable to Regular Expression 
> Denial of Service [ReDoS] attacks. The stripTags[] function in the String.js 
> file used to unescape HTML fails to efficiently parse and remove tags within 
> a given string. An attacker can exploit this vulnerability by submitting a 
> crafted code block which, when parsed by the affected function, will exhaust 
> system resources and trigger a DoS condition.
> Detection :   The application is vulnerable by using this component.
> Recommendation :      There is no non-vulnerable upgrade path for this 
> component/package. We recommend investigating alternative components or a 
> potential mitigating control.
> Root Cause :  activemq-osgi-5.17.6.jarorg/apache/activemq/web/prototype.js : 
> [ , ]
> Advisories :  Attack: https://github.com/AlyxRen/prototype.node.js
> CVSS Details :        CVE CVSS 3: 7.5CVSS Vector: 
> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
> CVE : CVE-2020-27511
> URL : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27511
> Remediation : This component does not have any non-vulnerable Version. Please 
> contact the vendor to get this vulnerability fixed.
> ===
> Description :
> Severity :    CVE CVSS 3: 7.5Sonatype CVSS 3: 7.5
> Weakness :    Sonatype CWE: 400
> Source :      National Vulnerability Database
> Categories :  Data
> Description from CVE :        An issue was discovered in the stripTags and 
> unescapeHTML components in Prototype 1.7.3 where an attacker can cause a 
> Regular Expression Denial of Servicethrough stripping crafted HTML tags.
> Explanation : The prototype package is vulnerable to Regular Expression 
> Denial of Service [ReDoS] attacks. The stripTags[] function in the String.js 
> file used to unescape HTML fails to efficiently parse and remove tags within 
> a given string. An attacker can exploit this vulnerability by submitting a 
> crafted code block which, when parsed by the affected function, will exhaust 
> system resources and trigger a DoS condition.
> Detection :   The application is vulnerable by using this component.
> Recommendation :      There is no non-vulnerable upgrade path for this 
> component/package. We recommend investigating alternative components or a 
> potential mitigating control.
> Root Cause :  strudl.0.3.13 : [ , ]
> Advisories :  Attack: https://github.com/AlyxRen/prototype.node.js
> CVSS Details :        CVE CVSS 3: 7.5CVSS Vector: 
> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
> CVE : CVE-2020-27511
> URL : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27511
> Remediation : This component does not have any non-vulnerable Version. Please 
> contact the vendor to get this vulnerability fixed.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to