ID DEBIAN_DSA-4789.NASL Type nessus Reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2020-11-13T00:00:00
Description
It was discovered that codemirror, a browser-based text editor
implemented in JavaScript, was vulnerable to regular expression
denial-of-service.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-4789. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include("compat.inc");
if (description)
{
script_id(142885);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/11/19");
script_cve_id("CVE-2020-7760");
script_xref(name:"DSA", value:"4789");
script_name(english:"Debian DSA-4789-1 : codemirror-js - security update");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"It was discovered that codemirror, a browser-based text editor
implemented in JavaScript, was vulnerable to regular expression
denial-of-service."
);
# https://security-tracker.debian.org/tracker/source-package/codemirror-js
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?5140ef3a"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.debian.org/security/2020/dsa-4789"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the codemirror-js packages.
For the stable distribution (buster), this problem has been fixed in
version 5.43.0-1+deb10u1."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:codemirror-js");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:10.0");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/10/30");
script_set_attribute(attribute:"patch_publication_date", value:"2020/11/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/11/13");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"10.0", prefix:"codemirror-js", reference:"5.43.0-1+deb10u1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "DEBIAN_DSA-4789.NASL", "bulletinFamily": "scanner", "title": "Debian DSA-4789-1 : codemirror-js - security update", "description": "It was discovered that codemirror, a browser-based text editor\nimplemented in JavaScript, was vulnerable to regular expression\ndenial-of-service.", "published": "2020-11-13T00:00:00", "modified": "2020-11-13T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://www.tenable.com/plugins/nessus/142885", "reporter": "This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://www.debian.org/security/2020/dsa-4789", "http://www.nessus.org/u?5140ef3a"], "cvelist": ["CVE-2020-7760"], "type": "nessus", "lastseen": "2020-11-21T02:00:37", "edition": 3, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2020-7760"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4789-1:817CC"]}], "modified": "2020-11-21T02:00:37", "rev": 2}, "score": {"value": 5.6, "vector": "NONE", "modified": "2020-11-21T02:00:37", "rev": 2}, "vulnersScore": 5.6}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4789. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(142885);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/19\");\n\n script_cve_id(\"CVE-2020-7760\");\n script_xref(name:\"DSA\", value:\"4789\");\n\n script_name(english:\"Debian DSA-4789-1 : codemirror-js - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that codemirror, a browser-based text editor\nimplemented in JavaScript, was vulnerable to regular expression\ndenial-of-service.\"\n );\n # https://security-tracker.debian.org/tracker/source-package/codemirror-js\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5140ef3a\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2020/dsa-4789\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Upgrade the codemirror-js packages.\n\nFor the stable distribution (buster), this problem has been fixed in\nversion 5.43.0-1+deb10u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:codemirror-js\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/10/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"10.0\", prefix:\"codemirror-js\", reference:\"5.43.0-1+deb10u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Debian Local Security Checks", "pluginID": "142885", "cpe": ["cpe:/o:debian:debian_linux:10.0", "p-cpe:/a:debian:debian_linux:codemirror-js"], "cvss3": {"score": 5.3, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}, "scheme": null}
{"cve": [{"lastseen": "2021-02-02T07:37:12", "description": "This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "LOW", "integrityImpact": "NONE", "baseScore": 5.3, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 1.4}, "published": "2020-10-30T11:15:00", "title": "CVE-2020-7760", "type": "cve", "cwe": ["CWE-400"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-7760"], "modified": "2020-11-13T16:57:00", "cpe": [], "id": "CVE-2020-7760", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-7760", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": []}], "debian": [{"lastseen": "2020-11-15T01:32:52", "bulletinFamily": "unix", "cvelist": ["CVE-2020-7760"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4789-1 security@debian.org\nhttps://www.debian.org/security/ Sebastien Delafond\nNovember 12, 2020 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : codemirror-js\nCVE ID : CVE-2020-7760\n\nIt was discovered that codemirror, a browser-based text editor\nimplemented in JavaScript, was vulnerable to regular expression\ndenial-of-service.\n\nFor the stable distribution (buster), this problem has been fixed in\nversion 5.43.0-1+deb10u1.\n\nWe recommend that you upgrade your codemirror-js packages.\n\nFor the detailed security status of codemirror-js please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/codemirror-js\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 2, "modified": "2020-11-12T09:07:34", "published": "2020-11-12T09:07:34", "id": "DEBIAN:DSA-4789-1:817CC", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2020/msg00196.html", "title": "[SECURITY] [DSA 4789-1] codemirror-js security update", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}