We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Utility to automatically link the URLs, email addresses, and Twitter handles in a given block of text/HTML
Library home page: https://registry.npmjs.org/autolinker/-/autolinker-0.24.1.tgz
Path to dependency file: /webapp/package.json
Path to vulnerable library: /webapp/node_modules/autolinker/package.json
Reachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Dependency Hierarchy:
Found in base branch: master
This vulnerability is potentially reachable
mattermost-0.0.1/utils/utils.js (Application) -> ❌ autolinker-0.24.1/dist/Autolinker.js (Vulnerable Component)
Denial of Service (DoS) vulnerability was found in autolinker before 3.0.0. Unterminated img src causes long execution.
Publish Date: 2019-01-08
URL: WS-2019-0540
Base Score Metrics:
Type: Upgrade version
Release Date: 2019-01-08
Fix Resolution: 3.0.0
In order to enable automatic remediation, please create workflow rules
Cross-site Scripting (XSS) vulnerability was found in autolinker before 3.14.0. User input passed to the innerHTML tags isn't sanitized.
Publish Date: 2017-02-15
URL: WS-2017-3770
Release Date: 2017-02-15
Fix Resolution: 3.14.0
In order to enable automatic remediation for this issue, please create workflow rules
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Vulnerable Library - autolinker-0.24.1.tgz
Utility to automatically link the URLs, email addresses, and Twitter handles in a given block of text/HTML
Library home page: https://registry.npmjs.org/autolinker/-/autolinker-0.24.1.tgz
Path to dependency file: /webapp/package.json
Path to vulnerable library: /webapp/node_modules/autolinker/package.json
Vulnerabilities
Reachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2019-0540
Vulnerable Library - autolinker-0.24.1.tgz
Utility to automatically link the URLs, email addresses, and Twitter handles in a given block of text/HTML
Library home page: https://registry.npmjs.org/autolinker/-/autolinker-0.24.1.tgz
Path to dependency file: /webapp/package.json
Path to vulnerable library: /webapp/node_modules/autolinker/package.json
Dependency Hierarchy:
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
Denial of Service (DoS) vulnerability was found in autolinker before 3.0.0. Unterminated img src causes long execution.
Publish Date: 2019-01-08
URL: WS-2019-0540
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2019-01-08
Fix Resolution: 3.0.0
In order to enable automatic remediation, please create workflow rules
WS-2017-3770
Vulnerable Library - autolinker-0.24.1.tgz
Utility to automatically link the URLs, email addresses, and Twitter handles in a given block of text/HTML
Library home page: https://registry.npmjs.org/autolinker/-/autolinker-0.24.1.tgz
Path to dependency file: /webapp/package.json
Path to vulnerable library: /webapp/node_modules/autolinker/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Cross-site Scripting (XSS) vulnerability was found in autolinker before 3.14.0. User input passed to the innerHTML tags isn't sanitized.
Publish Date: 2017-02-15
URL: WS-2017-3770
CVSS 3 Score Details (6.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2017-02-15
Fix Resolution: 3.14.0
In order to enable automatic remediation, please create workflow rules
In order to enable automatic remediation for this issue, please create workflow rules
The text was updated successfully, but these errors were encountered: