Skip to content

CVE-2020-7676 (Medium) detected in angularjs-1.4.3.jar #126

@mend-for-git.godevs.top

Description

@mend-for-git.godevs.top

CVE-2020-7676 - Medium Severity Vulnerability

Vulnerable Library - angularjs-1.4.3.jar

WebJar for AngularJS

Library home page: http://webjars.org

Path to dependency file: /pom.xml

Path to vulnerable library: /epository/org/webjars/angularjs/1.4.3/angularjs-1.4.3.jar

Dependency Hierarchy:

  • angularjs-1.4.3.jar (Vulnerable Library)

Found in HEAD commit: 1d4a86820b5ccc9e51b82198be488c68e9299e40

Found in base branch: master

Vulnerability Details

angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "" elements in "" ones changes parsing behavior, leading to possibly unsanitizing code. Publish Date: 2020-06-08 URL: CVE-2020-7676 CVSS 3 Score Details (5.4) Base Score Metrics: Exploitability Metrics: Attack Vector: Network Attack Complexity: Low Privileges Required: Low User Interaction: Required Scope: Changed Impact Metrics: Confidentiality Impact: Low Integrity Impact: Low Availability Impact: None For more information on CVSS3 Scores, click here. Suggested Fix Type: Upgrade version Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7676 Release Date: 2020-10-09 Fix Resolution: 1.8.0 :rescue_worker_helmet: Automatic Remediation is available for this issue

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions