|
| 1 | +{ |
| 2 | + "SchemaVersion": 2, |
| 3 | + "CreatedAt": "2021-08-25T12:20:30.000000005Z", |
| 4 | + "ArtifactName": "testdata/fixtures/repo/bun", |
| 5 | + "ArtifactType": "repository", |
| 6 | + "Metadata": { |
| 7 | + "ImageConfig": { |
| 8 | + "architecture": "", |
| 9 | + "created": "0001-01-01T00:00:00Z", |
| 10 | + "os": "", |
| 11 | + "rootfs": { |
| 12 | + "type": "", |
| 13 | + "diff_ids": null |
| 14 | + }, |
| 15 | + "config": {} |
| 16 | + } |
| 17 | + }, |
| 18 | + "Results": [ |
| 19 | + { |
| 20 | + "Target": "bun.lock", |
| 21 | + "Class": "lang-pkgs", |
| 22 | + "Type": "bun", |
| 23 | + "Packages": [ |
| 24 | + { |
| 25 | + |
| 26 | + "Name": "jquery", |
| 27 | + "Identifier": { |
| 28 | + "PURL": "pkg:npm/ [email protected]", |
| 29 | + "UID": "996607b7a767641" |
| 30 | + }, |
| 31 | + "Version": "3.3.1", |
| 32 | + "Relationship": "direct", |
| 33 | + "Layer": {}, |
| 34 | + "Locations": [ |
| 35 | + { |
| 36 | + "StartLine": 24, |
| 37 | + "EndLine": 24 |
| 38 | + } |
| 39 | + ] |
| 40 | + }, |
| 41 | + { |
| 42 | + |
| 43 | + "Name": "typescript", |
| 44 | + "Identifier": { |
| 45 | + "PURL": "pkg:npm/ [email protected]", |
| 46 | + "UID": "dc420153a1d93546" |
| 47 | + }, |
| 48 | + "Version": "5.8.3", |
| 49 | + "Relationship": "direct", |
| 50 | + "Layer": {}, |
| 51 | + "Locations": [ |
| 52 | + { |
| 53 | + "StartLine": 26, |
| 54 | + "EndLine": 26 |
| 55 | + } |
| 56 | + ] |
| 57 | + } |
| 58 | + ], |
| 59 | + "Vulnerabilities": [ |
| 60 | + { |
| 61 | + "VulnerabilityID": "CVE-2019-11358", |
| 62 | + |
| 63 | + "PkgName": "jquery", |
| 64 | + "PkgIdentifier": { |
| 65 | + "PURL": "pkg:npm/ [email protected]", |
| 66 | + "UID": "996607b7a767641" |
| 67 | + }, |
| 68 | + "InstalledVersion": "3.3.1", |
| 69 | + "FixedVersion": "3.4.0", |
| 70 | + "Status": "fixed", |
| 71 | + "Layer": {}, |
| 72 | + "SeveritySource": "ghsa", |
| 73 | + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2019-11358", |
| 74 | + "DataSource": { |
| 75 | + "ID": "ghsa", |
| 76 | + "Name": "GitHub Security Advisory Npm", |
| 77 | + "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anpm" |
| 78 | + }, |
| 79 | + "Title": "jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection", |
| 80 | + "Description": "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.", |
| 81 | + "Severity": "MEDIUM", |
| 82 | + "CweIDs": [ |
| 83 | + "CWE-79" |
| 84 | + ], |
| 85 | + "VendorSeverity": { |
| 86 | + "alma": 2, |
| 87 | + "amazon": 2, |
| 88 | + "arch-linux": 2, |
| 89 | + "ghsa": 2, |
| 90 | + "nodejs-security-wg": 2, |
| 91 | + "nvd": 2, |
| 92 | + "oracle-oval": 2, |
| 93 | + "redhat": 2, |
| 94 | + "ruby-advisory-db": 2, |
| 95 | + "ubuntu": 1 |
| 96 | + }, |
| 97 | + "CVSS": { |
| 98 | + "nvd": { |
| 99 | + "V2Vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", |
| 100 | + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", |
| 101 | + "V2Score": 4.3, |
| 102 | + "V3Score": 6.1 |
| 103 | + }, |
| 104 | + "redhat": { |
| 105 | + "V3Vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", |
| 106 | + "V3Score": 5.6 |
| 107 | + } |
| 108 | + }, |
| 109 | + "References": [ |
| 110 | + "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html", |
| 111 | + "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html", |
| 112 | + "http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html", |
| 113 | + "http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html", |
| 114 | + "http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html", |
| 115 | + "http://seclists.org/fulldisclosure/2019/May/10", |
| 116 | + "http://seclists.org/fulldisclosure/2019/May/11", |
| 117 | + "http://seclists.org/fulldisclosure/2019/May/13", |
| 118 | + "http://www.openwall.com/lists/oss-security/2019/06/03/2", |
| 119 | + "http://www.securityfocus.com/bid/108023", |
| 120 | + "https://access.redhat.com/errata/RHBA-2019:1570", |
| 121 | + "https://access.redhat.com/errata/RHSA-2019:1456", |
| 122 | + "https://access.redhat.com/errata/RHSA-2019:2587", |
| 123 | + "https://access.redhat.com/errata/RHSA-2019:3023", |
| 124 | + "https://access.redhat.com/errata/RHSA-2019:3024", |
| 125 | + "https://access.redhat.com/security/cve/CVE-2019-11358", |
| 126 | + "https://backdropcms.org/security/backdrop-sa-core-2019-009", |
| 127 | + "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", |
| 128 | + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358", |
| 129 | + "https://github.com/DanielRuf/snyk-js-jquery-174006?files=1", |
| 130 | + "https://github.com/advisories/GHSA-6c3j-c64m-qhgq", |
| 131 | + "https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b", |
| 132 | + "https://github.com/jquery/jquery/pull/4333", |
| 133 | + "https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#434", |
| 134 | + "https://hackerone.com/reports/454365", |
| 135 | + "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601", |
| 136 | + "https://linux.oracle.com/cve/CVE-2019-11358.html", |
| 137 | + "https://linux.oracle.com/errata/ELSA-2020-4847.html", |
| 138 | + "https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E", |
| 139 | + "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E", |
| 140 | + "https://lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844@%3Ccommits.airflow.apache.org%3E", |
| 141 | + "https://lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f@%3Ccommits.airflow.apache.org%3E", |
| 142 | + "https://lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7@%3Ccommits.airflow.apache.org%3E", |
| 143 | + "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E", |
| 144 | + "https://lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205@%3Ccommits.airflow.apache.org%3E", |
| 145 | + "https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E", |
| 146 | + "https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E", |
| 147 | + "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E", |
| 148 | + "https://lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9@%3Cissues.flink.apache.org%3E", |
| 149 | + "https://lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3E", |
| 150 | + "https://lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766@%3Cdev.syncope.apache.org%3E", |
| 151 | + "https://lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08@%3Cissues.flink.apache.org%3E", |
| 152 | + "https://lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355@%3Cdev.flink.apache.org%3E", |
| 153 | + "https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E", |
| 154 | + "https://lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73@%3Cissues.flink.apache.org%3E", |
| 155 | + "https://lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d@%3Cissues.flink.apache.org%3E", |
| 156 | + "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E", |
| 157 | + "https://lists.debian.org/debian-lts-announce/2019/05/msg00006.html", |
| 158 | + "https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html", |
| 159 | + "https://lists.debian.org/debian-lts-announce/2020/02/msg00024.html", |
| 160 | + "https://lists.fedoraproject.org/archives/list/ [email protected]/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FA/", |
| 161 | + "https://lists.fedoraproject.org/archives/list/ [email protected]/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYI/", |
| 162 | + "https://lists.fedoraproject.org/archives/list/ [email protected]/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGO/", |
| 163 | + "https://lists.fedoraproject.org/archives/list/ [email protected]/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KP/", |
| 164 | + "https://lists.fedoraproject.org/archives/list/ [email protected]/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6F/", |
| 165 | + "https://lists.fedoraproject.org/archives/list/ [email protected]/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5/", |
| 166 | + "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", |
| 167 | + "https://seclists.org/bugtraq/2019/Apr/32", |
| 168 | + "https://seclists.org/bugtraq/2019/Jun/12", |
| 169 | + "https://seclists.org/bugtraq/2019/May/18", |
| 170 | + "https://security.netapp.com/advisory/ntap-20190919-0001/", |
| 171 | + "https://snyk.io/vuln/SNYK-JS-JQUERY-174006", |
| 172 | + "https://www.debian.org/security/2019/dsa-4434", |
| 173 | + "https://www.debian.org/security/2019/dsa-4460", |
| 174 | + "https://www.drupal.org/sa-core-2019-006", |
| 175 | + "https://www.oracle.com//security-alerts/cpujul2021.html", |
| 176 | + "https://www.oracle.com/security-alerts/cpuApr2021.html", |
| 177 | + "https://www.oracle.com/security-alerts/cpuapr2020.html", |
| 178 | + "https://www.oracle.com/security-alerts/cpujan2020.html", |
| 179 | + "https://www.oracle.com/security-alerts/cpujan2021.html", |
| 180 | + "https://www.oracle.com/security-alerts/cpujul2020.html", |
| 181 | + "https://www.oracle.com/security-alerts/cpuoct2020.html", |
| 182 | + "https://www.oracle.com/security-alerts/cpuoct2021.html", |
| 183 | + "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", |
| 184 | + "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", |
| 185 | + "https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/", |
| 186 | + "https://www.synology.com/security/advisory/Synology_SA_19_19", |
| 187 | + "https://www.tenable.com/security/tns-2019-08", |
| 188 | + "https://www.tenable.com/security/tns-2020-02" |
| 189 | + ], |
| 190 | + "PublishedDate": "2019-04-20T00:29:00Z", |
| 191 | + "LastModifiedDate": "2021-10-20T11:15:00Z" |
| 192 | + } |
| 193 | + ] |
| 194 | + } |
| 195 | + ] |
| 196 | +} |
0 commit comments