You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Dojo core is a powerful, lightweight library that makes common tasks quicker and easier. Animate elements, manipulate the DOM, and query with easy CSS syntax, all without sacrificing performance.
Path to dependency file: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/package.json
Path to vulnerable library: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/node_modules/intern-geezer/node_modules/dojo/package.json
Dependency Hierarchy:
intern-geezer-2.2.3.tgz (Root Library)
❌ dojo-1.9.4.tgz (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in unit.html and testsDOH/_base/loader/i18n-exhaustive/i18n-test/unit.html and testsDOH/_base/i18nExhaustive.js in the DOH that can result in Victim attacked through their browser - deliver malware, steal HTTP cookies, bypass CORS trust. This attack appear to be exploitable via Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. This vulnerability appears to have been fixed in 1.14.
CVE-2018-1000665 - Medium Severity Vulnerability
Vulnerable Library - dojo-1.9.4.tgz
Dojo core is a powerful, lightweight library that makes common tasks quicker and easier. Animate elements, manipulate the DOM, and query with easy CSS syntax, all without sacrificing performance.
Library home page: https://registry.npmjs.org/dojo/-/dojo-1.9.4.tgz
Path to dependency file: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/package.json
Path to vulnerable library: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/node_modules/intern-geezer/node_modules/dojo/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in unit.html and testsDOH/_base/loader/i18n-exhaustive/i18n-test/unit.html and testsDOH/_base/i18nExhaustive.js in the DOH that can result in Victim attacked through their browser - deliver malware, steal HTTP cookies, bypass CORS trust. This attack appear to be exploitable via Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. This vulnerability appears to have been fixed in 1.14.
Publish Date: 2018-09-06
URL: CVE-2018-1000665
CVSS 3 Score Details (6.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082
Release Date: 2018-09-06
Fix Resolution: 1.14.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: