[ 
https://issues.apache.org/jira/browse/OFBIZ-10678?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16894467#comment-16894467
 ] 

Jacques Le Roux commented on OFBIZ-10678:
-----------------------------------------

Thanks a bunch Aditya!

> CLONE - Check embedded Javascript libs vulnerabilities using retire.js
> ----------------------------------------------------------------------
>
>                 Key: OFBIZ-10678
>                 URL: https://issues.apache.org/jira/browse/OFBIZ-10678
>             Project: OFBiz
>          Issue Type: Sub-task
>          Components: ALL COMPONENTS
>    Affects Versions: Trunk, Release Branch 16.11, Release Branch 17.12, 
> Release Branch 18.12
>            Reporter: Jacques Le Roux
>            Assignee: Aditya Sharma
>            Priority: Blocker
>              Labels: Javascript, retire.js, vulnerabilities
>             Fix For: 17.12.01, 16.11.06, 18.12.01
>
>         Attachments: OFBIZ-10678.patch, OFBIZ-10678.patch, OFBIZ-10678.patch, 
> OFBIZ-10678_plugins.patch
>
>
> 3 years ago I created the page 
> https://cwiki.apache.org/confluence/display/OFBIZ/About+retire.js
> After OFBIZ-9269 (done 1 year ago) that I cloned here, I just checked and 
> here are the results:
> h3. Trunk
> {code}
> C:\projectsASF\ofbiz\plugins\ecommerce\webapp\ecommerce\js\bootstrap.bundle.min.js
>  ? bootstrap 4.0.0-beta.2 has known vulnerabilities: severity: medium; issue: 
> 20184, summary: XSS in data-target property of scrollspy, CVE: 
> CVE-2018-14041; https://github.com/twbs/bootstrap/issues/20184 severity: 
> medium; issue: 20184, s
> ummary: XSS in collapse data-parent attribute, CVE: CVE-2018-14040; 
> https://github.com/twbs/bootstrap/issues/20184 severity: medium; issue: 
> 20184, summary: XSS in data-container property of tooltip, CVE: 
> CVE-2018-14042; https://github.co
> m/twbs/bootstrap/issues/20184
> C:\projectsASF\ofbiz\plugins\ecommerce\webapp\ecommerce\js\bootstrap.min.js
>  ? bootstrap 4.0.0 has known vulnerabilities: severity: medium; issue: 20184, 
> summary: XSS in data-target property of scrollspy, CVE: CVE-2018-14041; 
> https://github.com/twbs/bootstrap/issues/20184 severity: medium; issue: 
> 20184, summary:
>  XSS in collapse data-parent attribute, CVE: CVE-2018-14040; 
> https://github.com/twbs/bootstrap/issues/20184 severity: medium; issue: 
> 20184, summary: XSS in data-container property of tooltip, CVE: 
> CVE-2018-14042; https://github.com/twbs/
> bootstrap/issues/20184
> C:\projectsASF\ofbiz\plugins\solr\webapp\solr\js\require.js
>  ? jquery 1.7.1 has known vulnerabilities: severity: medium; CVE: 
> CVE-2012-6708, bug: 11290, summary: Selector interpreted as HTML; 
> http://bugs.jquery.com/ticket/11290 
> https://nvd.nist.gov/vuln/detail/CVE-2012-6708 http://research.insecu
> relabs.org/jquery/test/ severity: medium; issue: 2432, summary: 3rd party 
> CORS request may execute, CVE: CVE-2015-9251; 
> https://github.com/jquery/jquery/issues/2432 
> http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/ https://
> nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/
> C:\projectsASF\ofbiz\plugins\solr\webapp\solr\libs\angular.js
>  ? angularjs 1.3.8 has known vulnerabilities: severity: medium; summary: The 
> attribute usemap can be used as a security exploit; 
> https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-resurrection-2016-07-21
>  severit
> y: medium; summary: Universal CSP bypass via add-on in Firefox; 
> https://github.com/mozilla/addons-linter/issues/1000#issuecomment-282083435 
> http://pastebin.com/raw/kGrdaypP severity: medium; summary: DOS in $sanitize; 
> https://github.com/
> angular/angular.js/blob/master/CHANGELOG.md severity: low; summary: XSS in 
> $sanitize in Safari/Firefox; 
> https://github.com/angular/angular.js/commit/8f31f1ff43b673a24f84422d5c13d6312b2c4d94
> C:\projectsASF\ofbiz\plugins\solr\webapp\solr\libs\angular.min.js
>  ? angularjs 1.3.8 has known vulnerabilities: severity: medium; summary: The 
> attribute usemap can be used as a security exploit; 
> https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-resurrection-2016-07-21
>  severit
> y: medium; summary: Universal CSP bypass via add-on in Firefox; 
> https://github.com/mozilla/addons-linter/issues/1000#issuecomment-282083435 
> http://pastebin.com/raw/kGrdaypP severity: medium; summary: DOS in $sanitize; 
> https://github.com/
> angular/angular.js/blob/master/CHANGELOG.md severity: low; summary: XSS in 
> $sanitize in Safari/Firefox; 
> https://github.com/angular/angular.js/commit/8f31f1ff43b673a24f84422d5c13d6312b2c4d94
> C:\projectsASF\ofbiz\plugins\solr\webapp\solr\libs\jquery-2.1.3.min.js
>  ? jquery 2.1.3.min has known vulnerabilities: severity: medium; issue: 2432, 
> summary: 3rd party CORS request may execute, CVE: CVE-2015-9251; 
> https://github.com/jquery/jquery/issues/2432 
> http://blog.jquery.com/2016/01/08/jquery-2-2-and-
> 1-12-released/ https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/ severity: medium; CVE: 
> CVE-2015-9251, issue: 11974, summary: parseHTML() executes scripts in event 
> handlers; https://bugs.jquery.
> com/ticket/11974 https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/
> C:\projectsASF\ofbiz\plugins\solr\webapp\solr\js\lib\jquery-1.7.2.min.js
>  ? jquery 1.7.2.min has known vulnerabilities: severity: medium; CVE: 
> CVE-2012-6708, bug: 11290, summary: Selector interpreted as HTML; 
> http://bugs.jquery.com/ticket/11290 
> https://nvd.nist.gov/vuln/detail/CVE-2012-6708 http://research.in
> securelabs.org/jquery/test/ severity: medium; issue: 2432, summary: 3rd party 
> CORS request may execute, CVE: CVE-2015-9251; 
> https://github.com/jquery/jquery/issues/2432 
> http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/ http
> s://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/
> {code}
> h3. R17
> {code}
> C:\projectsASF\release17.12\plugins\ecommerce\webapp\ecommerce\js\bootstrap.bundle.min.js
>  ? bootstrap 4.0.0-beta.2 has known vulnerabilities: severity: medium; issue: 
> 20184, summary: XSS in data-target property of scrollspy, CVE: 
> CVE-2018-14041; https://github.com/twbs/bootstrap/issues/20184 seve
> rity: medium; issue: 20184, summary: XSS in collapse data-parent attribute, 
> CVE: CVE-2018-14040; https://github.com/twbs/bootstrap/issues/20184 severity: 
> medium; issue: 20184, summary: XSS in data-container p
> roperty of tooltip, CVE: CVE-2018-14042; 
> https://github.com/twbs/bootstrap/issues/20184
> C:\projectsASF\release17.12\plugins\ecommerce\webapp\ecommerce\js\bootstrap.min.js
>  ? bootstrap 4.0.0 has known vulnerabilities: severity: medium; issue: 20184, 
> summary: XSS in data-target property of scrollspy, CVE: CVE-2018-14041; 
> https://github.com/twbs/bootstrap/issues/20184 severity: m
> edium; issue: 20184, summary: XSS in collapse data-parent attribute, CVE: 
> CVE-2018-14040; https://github.com/twbs/bootstrap/issues/20184 severity: 
> medium; issue: 20184, summary: XSS in data-container property
>  of tooltip, CVE: CVE-2018-14042; 
> https://github.com/twbs/bootstrap/issues/20184
> C:\projectsASF\release17.12\plugins\solr\webapp\solr\js\require.js
>  ? jquery 1.7.1 has known vulnerabilities: severity: medium; CVE: 
> CVE-2012-6708, bug: 11290, summary: Selector interpreted as HTML; 
> http://bugs.jquery.com/ticket/11290 https://nvd.nist.gov/vuln/detail/CVE-201
> 2-6708 http://research.insecurelabs.org/jquery/test/ severity: medium; issue: 
> 2432, summary: 3rd party CORS request may execute, CVE: CVE-2015-9251; 
> https://github.com/jquery/jquery/issues/2432 http://blog.jq
> uery.com/2016/01/08/jquery-2-2-and-1-12-released/ 
> https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/
> C:\projectsASF\release17.12\plugins\solr\webapp\solr\libs\angular.js
>  ? angularjs 1.3.8 has known vulnerabilities: severity: medium; summary: The 
> attribute usemap can be used as a security exploit; 
> https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-re
> surrection-2016-07-21 severity: medium; summary: Universal CSP bypass via 
> add-on in Firefox; 
> https://github.com/mozilla/addons-linter/issues/1000#issuecomment-282083435 
> http://pastebin.com/raw/kGrdaypP severi
> ty: medium; summary: DOS in $sanitize; 
> https://github.com/angular/angular.js/blob/master/CHANGELOG.md severity: low; 
> summary: XSS in $sanitize in Safari/Firefox; 
> https://github.com/angular/angular.js/commit/8
> f31f1ff43b673a24f84422d5c13d6312b2c4d94
> C:\projectsASF\release17.12\plugins\solr\webapp\solr\libs\angular.min.js
>  ? angularjs 1.3.8 has known vulnerabilities: severity: medium; summary: The 
> attribute usemap can be used as a security exploit; 
> https://github.com/angular/angular.js/blob/master/CHANGELOG.md#1230-patronal-re
> surrection-2016-07-21 severity: medium; summary: Universal CSP bypass via 
> add-on in Firefox; 
> https://github.com/mozilla/addons-linter/issues/1000#issuecomment-282083435 
> http://pastebin.com/raw/kGrdaypP severi
> ty: medium; summary: DOS in $sanitize; 
> https://github.com/angular/angular.js/blob/master/CHANGELOG.md severity: low; 
> summary: XSS in $sanitize in Safari/Firefox; 
> https://github.com/angular/angular.js/commit/8
> f31f1ff43b673a24f84422d5c13d6312b2c4d94
> C:\projectsASF\release17.12\plugins\solr\webapp\solr\libs\jquery-2.1.3.min.js
>  ? jquery 2.1.3.min has known vulnerabilities: severity: medium; issue: 2432, 
> summary: 3rd party CORS request may execute, CVE: CVE-2015-9251; 
> https://github.com/jquery/jquery/issues/2432 http://blog.jquery.c
> om/2016/01/08/jquery-2-2-and-1-12-released/ 
> https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/ severity: medium; CVE: 
> CVE-2015-9251, issue: 11974, summary: parseHTML(
> ) executes scripts in event handlers; https://bugs.jquery.com/ticket/11974 
> https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/
> C:\projectsASF\release17.12\plugins\solr\webapp\solr\js\lib\jquery-1.7.2.min.js
>  ? jquery 1.7.2.min has known vulnerabilities: severity: medium; CVE: 
> CVE-2012-6708, bug: 11290, summary: Selector interpreted as HTML; 
> http://bugs.jquery.com/ticket/11290 https://nvd.nist.gov/vuln/detail/CVE
> -2012-6708 http://research.insecurelabs.org/jquery/test/ severity: medium; 
> issue: 2432, summary: 3rd party CORS request may execute, CVE: CVE-2015-9251; 
> https://github.com/jquery/jquery/issues/2432 http://blo
> g.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/ 
> https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/
> {code}
> h3. R16
> {code}
>  ? jquery 1.11.0 has known vulnerabilities: severity: medium; issue: 2432, 
> summary: 3rd party CORS request may execute, CVE: CVE-2015-9251; 
> https://github.com/jquery/jquery/issues/2432 http://blog.jquery.com/
> 2016/01/08/jquery-2-2-and-1-12-released/ 
> https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/ severity: medium; CVE: 
> CVE-2015-9251, issue: 11974, summary: parseHTML() e
> xecutes scripts in event handlers; https://bugs.jquery.com/ticket/11974 
> https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/
> C:\projectsASF\release16.11\framework\images\webapp\images\jquery\jquery-1.11.0.min.js
>  ? jquery 1.11.0.min has known vulnerabilities: severity: medium; issue: 
> 2432, summary: 3rd party CORS request may execute, CVE: CVE-2015-9251; 
> https://github.com/jquery/jquery/issues/2432 http://blog.jquery.
> com/2016/01/08/jquery-2-2-and-1-12-released/ 
> https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/ severity: medium; CVE: 
> CVE-2015-9251, issue: 11974, summary: parseHTML
> () executes scripts in event handlers; https://bugs.jquery.com/ticket/11974 
> https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/
> C:\projectsASF\release16.11\framework\images\webapp\images\jquery\jquery-migrate-1.2.1.js
>  ? jquery-migrate 1.2.1 has known vulnerabilities: severity: medium; bug: 
> 11290, summary: Selector interpreted as HTML; 
> http://bugs.jquery.com/ticket/11290 
> http://research.insecurelabs.org/jquery/test/
> C:\projectsASF\release16.11\specialpurpose\solr\webapp\solr\js\require.js
>  ? jquery 1.7.1 has known vulnerabilities: severity: medium; CVE: 
> CVE-2012-6708, bug: 11290, summary: Selector interpreted as HTML; 
> http://bugs.jquery.com/ticket/11290 https://nvd.nist.gov/vuln/detail/CVE-201
> 2-6708 http://research.insecurelabs.org/jquery/test/ severity: medium; issue: 
> 2432, summary: 3rd party CORS request may execute, CVE: CVE-2015-9251; 
> https://github.com/jquery/jquery/issues/2432 http://blog.jq
> uery.com/2016/01/08/jquery-2-2-and-1-12-released/ 
> https://nvd.nist.gov/vuln/detail/CVE-2015-9251 
> http://research.insecurelabs.org/jquery/test/
> C:\projectsASF\release16.11\framework\images\webapp\images\jquery\jquery.mobile\jquery.mobile-1.4.0.min.js
>  ? jquery-mobile 1.4.0.min has known vulnerabilities: severity: medium; 
> summary: open redirect leads to cross site scripting; 
> http://sirdarckcat.blogspot.no/2017/02/unpatched-0day-jquery-mobile-xss.html
> C:\projectsASF\release16.11\framework\images\webapp\images\jquery\jquery.mobile\jquery.mobile-1.4.0.js
>  ? jquery-mobile 1.4.0 has known vulnerabilities: severity: medium; summary: 
> open redirect leads to cross site scripting; 
> http://sirdarckcat.blogspot.no/2017/02/unpatched-0day-jquery-mobile-xss.html
> {code}
> So it's time to update again the Javascript embedded libs. I'll check what I 
> have been done with OFBIZ-9269  before...



--
This message was sent by Atlassian JIRA
(v7.6.14#76016)

Reply via email to