sample-dotnet-worker-servicebus-queue icon indicating copy to clipboard operation
sample-dotnet-worker-servicebus-queue copied to clipboard

microsoft.visualstudio.web.codegeneration.design.3.1.0.nupkg: 2 vulnerabilities (highest severity is: 9.8)

Open mend-bolt-for-github[bot] opened this issue 3 years ago • 0 comments

Vulnerable Library - microsoft.visualstudio.web.codegeneration.design.3.1.0.nupkg

Path to dependency file: /src/Keda.Samples.DotNet.Web/Keda.Samples.DotNet.Web.csproj

Path to vulnerable library: /usr/share/dotnet/sdk/NuGetFallbackFolder/system.text.encodings.web/4.5.0/system.text.encodings.web.4.5.0.nupkg

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in Remediation Available
CVE-2021-26701 High 9.8 system.text.encodings.web.4.5.0.nupkg Transitive N/A
CVE-2020-11022 Medium 6.1 microsoft.visualstudio.web.codegenerators.mvc.3.1.0.nupkg Transitive N/A

Details

CVE-2021-26701

Vulnerable Library - system.text.encodings.web.4.5.0.nupkg

Provides types for encoding and escaping strings for use in JavaScript, HyperText Markup Language (H...

Library home page: https://api.nuget.org/packages/system.text.encodings.web.4.5.0.nupkg

Path to dependency file: /src/Keda.Samples.DotNet.Web/Keda.Samples.DotNet.Web.csproj

Path to vulnerable library: /usr/share/dotnet/sdk/NuGetFallbackFolder/system.text.encodings.web/4.5.0/system.text.encodings.web.4.5.0.nupkg

Dependency Hierarchy:

  • microsoft.visualstudio.web.codegeneration.design.3.1.0.nupkg (Root Library)
    • microsoft.visualstudio.web.codegenerators.mvc.3.1.0.nupkg
      • microsoft.visualstudio.web.codegeneration.3.1.0.nupkg
        • microsoft.visualstudio.web.codegeneration.entityframeworkcore.3.1.0.nupkg
          • microsoft.visualstudio.web.codegeneration.core.3.1.0.nupkg
            • microsoft.visualstudio.web.codegeneration.templating.3.1.0.nupkg
              • microsoft.aspnetcore.razor.runtime.2.2.0.nupkg
                • microsoft.aspnetcore.html.abstractions.2.2.0.nupkg
                  • :x: system.text.encodings.web.4.5.0.nupkg (Vulnerable Library)

Found in base branch: main

Vulnerability Details

.NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112.

Publish Date: 2021-02-25

URL: CVE-2021-26701

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-02-25

Fix Resolution: System.Text.Encodings.Web - 4.5.1,4.7.2,5.0.1

Step up your Open Source Security Game with Mend here

CVE-2020-11022

Vulnerable Library - microsoft.visualstudio.web.codegenerators.mvc.3.1.0.nupkg

Code Generators for ASP.NET Core MVC. Contains code generators for MVC Controllers and Views.

Library home page: https://api.nuget.org/packages/microsoft.visualstudio.web.codegenerators.mvc.3.1.0.nupkg

Path to dependency file: /src/Keda.Samples.DotNet.Web/Keda.Samples.DotNet.Web.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.visualstudio.web.codegenerators.mvc/3.1.0/microsoft.visualstudio.web.codegenerators.mvc.3.1.0.nupkg

Dependency Hierarchy:

  • microsoft.visualstudio.web.codegeneration.design.3.1.0.nupkg (Root Library)
    • :x: microsoft.visualstudio.web.codegenerators.mvc.3.1.0.nupkg (Vulnerable Library)

Found in base branch: main

Vulnerability Details

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

Publish Date: 2020-04-29

URL: CVE-2020-11022

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/

Release Date: 2020-04-29

Fix Resolution: jQuery - 3.5.0

Step up your Open Source Security Game with Mend here