Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NVD False Positives #61

Closed
SimeonChakarov opened this issue Mar 8, 2021 · 6 comments
Closed

NVD False Positives #61

SimeonChakarov opened this issue Mar 8, 2021 · 6 comments
Assignees
Labels
enhancement New feature or request
Projects

Comments

@SimeonChakarov
Copy link

Hi,
I use jQuery v3.5.1 (latest stable) with Visual Studion 2019. When I scan for security vulnerabilities with NuGetDefense I get the following report:

"CVE-2016-10707 : jQuery 3.0.0-rc.1 is vulnerable to Denial of Service (DoS) due to removing a logic that lowercased attribute names. Any attribute getter using a mixed-cased name for boolean attributes goes into an infinite recursion, exceeding the stack call limit."

This is a link to the full description: https://nvd.nist.gov/vuln/detail/CVE-2016-10707

I opened a ticket in jquery support, they answered me as follows:

"You should contact the creators of the scanner to report a bug. The CVE references a version that is not the one you are running. See #3133."

Please advise how to proceed to fix this issue.

Thanks in advance!

@SimeonChakarov SimeonChakarov added the enhancement New feature or request label Mar 8, 2021
@digitalcoyote
Copy link
Owner

@SimeonChakarov what version of NuGetDefense is reporting the false positive. I recently found an issue in the NVD source that could be causing this, but was fixed in the last release. If this occurs in the most recent release, I'll need to investigate

@SimeonChakarov
Copy link
Author

@digitalcoyote , the version that I use is 2.1.1 (latest stable according to Visual Studio). Btw there is a similar issue with Nlog v4.7.8 (latest stable):

"CVE-1999-1278 : nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl."

This is a link to the full description: https://cert.civis.net/en/index.php?action=alert&param=CVE-1999-1278

The Nlog support advised me to create an issue for NuGetDefense-project. Their responce:
"They are probably mixing together two packages:
NLog - https://www.nuget.org/packages/NLog/
NLog - https://seclists.org/nmap-announce/1998/81 or https://static.lwn.net/1999/0107/nlog.html"

Best regards, Simeon

@digitalcoyote digitalcoyote changed the title Requesting Vulnerability Source jQuery v3.5.1 NVD False Positives Mar 9, 2021
@digitalcoyote digitalcoyote added this to To do in NVD via automation Mar 9, 2021
@digitalcoyote
Copy link
Owner

digitalcoyote commented Mar 12, 2021

@SimeonChakarov I have some info on the NLog false-positive as well as the Jquery false-positive.

JQuery

The CPE here used the update field (previously unused) to specify rc1. With no upper limit, this caused the version range to parse incorrectly. I've made changes to address this, but I need to make some more tests to ensure nothing is adversely affected.

NLog

The CPE for CVE-1999-1278 that is parsed for that record is cpe:2.3:a:nlog:nlog:*:*:*:*:*:*:*:* Unfortunately, all I can do to fix this is add this to a list of CVE's to ignore when parsing NVD Feeds.


It will ~~probably be a week or so before ~~ I can work on getting another relase together to fix these in the distributed NVD bin, but you can add them to the Ignored CVE's in the NuGetDefense.json as neither CVE here actually affects a NuGet package.

In future versions, I may consider disabling NVD by default as there are other more accurate sources being added to NuGetDefense (although there are still use cases for the local VulnerabilityData.

Thank you again for your reports. Feel free to let me know of any more incorrectly reported vulnerabilities. 👍

@digitalcoyote
Copy link
Owner

Couldn't sleep last night, so I've been up working on that release. Gonna grab coffee and get it out before work.

NVD automation moved this from To do to Done Mar 12, 2021
@SimeonChakarov
Copy link
Author

SimeonChakarov commented Mar 15, 2021

@digitalcoyote I just installed the latest version of NuGetDefense (2.1.2). Most of the issues are gone. Thanks for the quick response! :)

There is still one reported issue for jQuery:

CVE-2007-2379 : The jQuery framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

But it is LOW/MEDIUM severity so it's ok for now. I assume that it will be fixed in the next release.

Thanks again!

@digitalcoyote
Copy link
Owner

@SimeonChakarov I believe that was never "fixed" as it's an underlying class of vulnerabilities that can affect jQuery and javascript in general. Based on what I've been told, you are probably safe to add that CVE to the ignore list and just pay attention to best practices regarding javascript hijacking. Stack Overflow seems to indicate that jQuery makes this less likely than vanilla JS/ES by default although some research into it could probably provide more detailed info.

When I update the documentation I need to explicitly mention this as I've been contacted about this vulnerability multiple times.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
Status: Done
NVD
  
Done
Development

No branches or pull requests

2 participants