Created
August 8, 2018 16:12
-
-
Save h3xstream/c901cd4f83c3e8dd54474725efb5b77c to your computer and use it in GitHub Desktop.
Test repo URL
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"retire-example": { | |
"vulnerabilities" : [ | |
{ | |
"below" : "0.0.2", | |
"severity" : "low", | |
"identifiers" : { | |
"CVE" : [ "CVE-XXXX-XXXX" ], | |
"bug" : "1234", | |
"summary" : "bug summary" | |
}, | |
"info" : [ "http://github.com/eoftedal/retire.js/" ] | |
} | |
], | |
"extractors" : { | |
"func" : [ "retire.VERSION" ], | |
"filename" : [ "retire-example-(§§version§§)(.min)?\\.js" ], | |
"filecontent" : [ "/\\*!? Retire-example v(§§version§§)" ], | |
"hashes" : { "07f8b94c8d601a24a1914a1a92bec0e4fafda964" : "0.0.1" } | |
} | |
}, | |
"jquery": { | |
"bowername": [ "jQuery" ], | |
"vulnerabilities" : [ | |
{ | |
"below" : "1.6.3", | |
"severity" : "medium", | |
"identifiers" : { | |
"CVE": [ "CVE-2011-4969" ], | |
"summary": "XSS with location.hash" | |
}, | |
"info" : [ "https://nvd.nist.gov/vuln/detail/CVE-2011-4969" , "http://research.insecurelabs.org/jquery/test/", "https://bugs.jquery.com/ticket/9521" ] | |
}, | |
{ | |
"below" : "1.9.0b1", | |
"identifiers": { | |
"CVE" : [ "CVE-2012-6708" ], | |
"bug": "11290", | |
"summary": "Selector interpreted as HTML" | |
}, | |
"severity": "medium", | |
"info" : [ "http://bugs.jquery.com/ticket/11290" , "https://nvd.nist.gov/vuln/detail/CVE-2012-6708", "http://research.insecurelabs.org/jquery/test/" ] | |
}, | |
{ | |
"atOrAbove" : "1.4.0", | |
"below" : "1.12.0", | |
"identifiers": { | |
"issue" : "2432", | |
"summary": "3rd party CORS request may execute", | |
"CVE": [ "CVE-2015-9251" ] | |
}, | |
"severity": "medium", | |
"info" : [ "https://github.com/jquery/jquery/issues/2432", "http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] | |
}, | |
{ | |
"atOrAbove" : "1.12.3", | |
"below" : "3.0.0-beta1", | |
"identifiers": { | |
"issue" : "2432", | |
"summary": "3rd party CORS request may execute", | |
"CVE": [ "CVE-2015-9251" ] | |
}, | |
"severity": "medium", | |
"info" : [ "https://github.com/jquery/jquery/issues/2432", "http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] | |
}, | |
{ | |
"atOrAbove" : "1.8.0", | |
"below" : "1.12.0", | |
"identifiers": { | |
"CVE" : [ "CVE-2015-9251" ], | |
"issue" : "11974", | |
"summary": "parseHTML() executes scripts in event handlers" | |
}, | |
"severity": "medium", | |
"info" : [ "https://bugs.jquery.com/ticket/11974", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] | |
}, | |
{ | |
"atOrAbove" : "1.12.2", | |
"below" : "2.2.0", | |
"identifiers": { | |
"CVE" : [ "CVE-2015-9251" ], | |
"issue" : "11974", | |
"summary": "parseHTML() executes scripts in event handlers" | |
}, | |
"severity": "medium", | |
"info" : [ "https://bugs.jquery.com/ticket/11974", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] | |
}, | |
{ | |
"atOrAbove" : "2.2.2", | |
"below" : "3.0.0", | |
"identifiers": { | |
"CVE" : [ "CVE-2015-9251" ], | |
"issue" : "11974", | |
"summary": "parseHTML() executes scripts in event handlers" | |
}, | |
"severity": "medium", | |
"info" : [ "https://bugs.jquery.com/ticket/11974", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] | |
} | |
], | |
"extractors" : { | |
"func" : [ | |
"(jQuery || $ || $jq || $j).fn.jquery", | |
"require('jquery').fn.jquery" | |
], | |
"uri" : [ "/(§§version§§)/jquery(\\.min)?\\.js" ], | |
"filename" : [ "jquery-(§§version§§)(\\.min)?\\.js" ], | |
"filecontent" : [ | |
"/\\*!? jQuery v(§§version§§)", "\\* jQuery JavaScript Library v(§§version§§)", | |
"\\* jQuery (§§version§§) - New Wave Javascript", "// \\$Id: jquery.js,v (§§version§§)", | |
"/\\*! jQuery v(§§version§§)", | |
"[^a-z]f=\"(§§version§§)\",.*[^a-z]jquery:f,", | |
"[^a-z]m=\"(§§version§§)\",.*[^a-z]jquery:m,", | |
"[^a-z.]jquery:[ ]?\"(§§version§§)\"", | |
"\\$\\.documentElement,Q=e.jQuery,Z=e\\.\\$,ee=\\{\\},te=\\[\\],ne=\"(§§version§§)\"" | |
], | |
"filecontentreplace" : [ | |
"/var [a-z]=[a-z]\\.document,([a-z])=\"(§§version§§)\",([a-z])=.{130,160};\\3\\.fn=\\3\\.prototype=\\{jquery:\\1/$2/" | |
], | |
"hashes" : {} | |
} | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment