Skip to content

Commit

Permalink
Merge pull request #5737 from preyanshu/master
Browse files Browse the repository at this point in the history
fix #5725
  • Loading branch information
sudhanshutech committed Jul 30, 2024
2 parents 4074ca8 + 72573ab commit 8d9168c
Show file tree
Hide file tree
Showing 2 changed files with 36 additions and 27 deletions.
5 changes: 5 additions & 0 deletions src/sections/Community/Handbook/Handbook.style.js
Original file line number Diff line number Diff line change
Expand Up @@ -154,6 +154,11 @@ export const HandbookWrapper = styled.div`
}
}
.table-container {
width: 100%;
overflow-x: auto;
}
td, th {
border: 0.05rem solid ${(props) => props.theme.primaryLightColor};
text-align: left;
Expand Down
58 changes: 31 additions & 27 deletions src/sections/Community/Handbook/security-vulnerabilities.js
Original file line number Diff line number Diff line change
Expand Up @@ -141,32 +141,36 @@ const SecurityVulnerabilitiesPage = () => {
<p>As much as possible this announcement will be actionable, and include any mitigating steps customers can take prior to upgrading to a fixed version.</p>

<h2>List of Announced Vulnerabilities:</h2>
<table>
<thead>
<tr>
<th><b>DATE ANNOUNCED</b></th>
<th><b>CVE ID</b></th>
<th><b>DESCRIPTION</b></th>
<th><b>AFFECTED COMPONENT</b></th>
<th><b>VULNERABLE VERSION</b></th>
<th><b>PATCHED VERSION</b></th>
<th><b>FIX DETAILS</b></th>
<th><b>LINKS</b></th>
</tr>
</thead>
<tbody>
<tr>
<td>2021-04-28</td>
<td>CVE-2021-31856</td>
<td>A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).</td>
<td>REST API</td>
<td>v0.5.2</td>
<td>v0.5.3</td>
<td><a href="https://github.com/layer5io/meshery/pull/2745">fix pull</a></td>
<td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31856">mitre</a>, <a href="https://github.com/ssst0n3/CVE-2021-31856">details</a></td>
</tr>
</tbody>
</table>

<div className="table-container">
<table>
<thead>
<tr>
<th><b>DATE ANNOUNCED</b></th>
<th><b>CVE ID</b></th>
<th><b>DESCRIPTION</b></th>
<th><b>AFFECTED COMPONENT</b></th>
<th><b>VULNERABLE VERSION</b></th>
<th><b>PATCHED VERSION</b></th>
<th><b>FIX DETAILS</b></th>
<th><b>LINKS</b></th>
</tr>
</thead>
<tbody>
<tr>
<td>2021-04-28</td>
<td>CVE-2021-31856</td>
<td>A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).</td>
<td>REST API</td>
<td>v0.5.2</td>
<td>v0.5.3</td>
<td><a href="https://github.com/layer5io/meshery/pull/2745">fix pull</a></td>
<td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31856">mitre</a>, <a href="https://github.com/ssst0n3/CVE-2021-31856">details</a></td>
</tr>
</tbody>
</table>
</div>

</div>
</Container>
</div>
Expand All @@ -175,4 +179,4 @@ const SecurityVulnerabilitiesPage = () => {
);
};

export default SecurityVulnerabilitiesPage;
export default SecurityVulnerabilitiesPage;

0 comments on commit 8d9168c

Please sign in to comment.