[
https://issues.apache.org/jira/browse/GUACAMOLE-2006?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17906865#comment-17906865
]
Mike Jumper commented on GUACAMOLE-2006:
----------------------------------------
There is a long-running, very involved effort to migrate everything to Angular
(the TypeScript-based framework that grew out of AngularJS): GUACAMOLE-1085
Until that fully materializes, we routinely check any vulnerabilities reported
against dependencies to make sure Guacamole is unaffected, including AngularJS.
Thus far, there are no vulnerabilities in AngularJS that have any impact on
Guacamole, including those listed above.
Here's a rundown:
|| CVE ID || Affects Guacamole? ||
| [CVE-2019-10768|https://nvd.nist.gov/vuln/detail/CVE-2019-10768] | *No.*
Guacamole uses AngularJS 1.8.3, while this vulnerability was addressed by
AngularJS 1.7.9. |
| [CVE-2019-14863|https://nvd.nist.gov/vuln/detail/CVE-2019-14863] | *No.*
Guacamole uses AngularJS 1.8.3, while this vulnerability was addressed by
AngularJS 1.5.0. |
| [CVE-2020-7676|https://nvd.nist.gov/vuln/detail/CVE-2020-7676] | *No.* The
vulnerability is specific to "JQLite", the minimal version of jQuery provided
and used by AngularJS when full jQuery is not available. In the case of
Guacamole, the full version of jQuery is present, and under no circumstances is
untrusted or user-supplied data passed to jQuery for DOM manipulation. |
| [CVE-2022-25869|https://nvd.nist.gov/vuln/detail/CVE-2022-25869] | *No.* This
issue deals specifically with Internet Explorer and its insecure caching
behavior of {{<textarea>}} elements. This does not affect the behavior of
{{<textarea>}} elements within Guacamole because of the dynamic nature of the
UI (there are no {{<textarea>}} elements visible to Internet Explorer's cache).
|
| [CVE-2023-26116|https://nvd.nist.gov/vuln/detail/CVE-2023-26116],
[CVE-2023-26117|https://nvd.nist.gov/vuln/detail/CVE-2023-26117],
[CVE-2023-26118|https://nvd.nist.gov/vuln/detail/CVE-2023-26118] | *No.* There
are no known cases, theoretical or otherwise, where regular expression
denial-of-service would be possible for the component in question. In
Guacamole, AngularJS is used strictly on the client side, and there are no code
paths that would allow a malicious user to force other users to use
specially-crafted inputs to affect the performance of their browser. |
If you have any questions on the above or encounter something new, please reach
out privately by sending an email to [mailto:[email protected]].
That will ensure the project can safely issue a release with a mitigation if an
issue turns up that _does_ affect Guacamole. See:
https://guacamole.apache.org/security/
We also have some changes in progress to update our security page to list
frequently discussed vulnerabilities in dependencies that have no impact on
Guacamole, to hopefully help reduce confusion.
> When scanning Guacamole (ver. 1.5.5) for vulnerabilities, the following
> problems were found: CVE-2023-26116 CVE-2022-25869 CVE-2019-14863
> CVE-2020-7676 CVE-2023-26117 CVE-2019-10768 CVE-2023-26118
> ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>
> Key: GUACAMOLE-2006
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-2006
> Project: Guacamole
> Issue Type: Wish
> Components: guacamole
> Affects Versions: 1.5.5
> Reporter: Vadim
> Priority: Major
>
> When scanning Guacamole (ver. 1.5.5) for vulnerabilities, the following
> problems were found: CVE-2023-26116 CVE-2022-25869 CVE-2019-14863
> CVE-2020-7676 CVE-2023-26117 CVE-2019-10768 CVE-2023-26118
> They affect the library angular.min.js
> Are there any plans to eliminate vulnerabilities?
--
This message was sent by Atlassian Jira
(v8.20.10#820010)