We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
In-browser code editing made bearable
Library home page: https://cdnjs.cloudflare.com/ajax/libs/codemirror/3.16.0/mode/javascript/javascript.js
Path to dependency file: /clients/classic-ui/bower_components/codemirror/mode/javascript/typescript.html
Path to vulnerable library: /clients/classic-ui/bower_components/codemirror/mode/javascript/javascript.js
Found in HEAD commit: ee765c82cdb8fda389b5b028a35744c8dc2be1a9
Dependency Hierarchy:
Found in base branch: master
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/.?/)
Publish Date: 2020-10-30
URL: CVE-2020-7760
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7760
Release Date: 2020-10-30
Fix Resolution: codemirror - 5.58.2
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Vulnerable Library - javascript-3.16.0.js
In-browser code editing made bearable
Library home page: https://cdnjs.cloudflare.com/ajax/libs/codemirror/3.16.0/mode/javascript/javascript.js
Path to dependency file: /clients/classic-ui/bower_components/codemirror/mode/javascript/typescript.html
Path to vulnerable library: /clients/classic-ui/bower_components/codemirror/mode/javascript/javascript.js
Found in HEAD commit: ee765c82cdb8fda389b5b028a35744c8dc2be1a9
Vulnerabilities
Details
CVE-2020-7760
Vulnerable Library - javascript-3.16.0.js
In-browser code editing made bearable
Library home page: https://cdnjs.cloudflare.com/ajax/libs/codemirror/3.16.0/mode/javascript/javascript.js
Path to dependency file: /clients/classic-ui/bower_components/codemirror/mode/javascript/typescript.html
Path to vulnerable library: /clients/classic-ui/bower_components/codemirror/mode/javascript/javascript.js
Dependency Hierarchy:
Found in HEAD commit: ee765c82cdb8fda389b5b028a35744c8dc2be1a9
Found in base branch: master
Vulnerability Details
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/.?/)
Publish Date: 2020-10-30
URL: CVE-2020-7760
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7760
Release Date: 2020-10-30
Fix Resolution: codemirror - 5.58.2
The text was updated successfully, but these errors were encountered: