From 5bf82659bd4ed1f5ad5120dbc907119ed92790fa Mon Sep 17 00:00:00 2001 From: Mike Salvatore Date: Thu, 20 Jan 2022 12:14:52 -0500 Subject: [PATCH] UI: Switch CVE-2021-44228 from href to react-bootstrap Button This resolves an eslint error regarding `target="blank"` without `rel="noopener"` and makes this code more consistent with other code. --- .../security/issues/Log4ShellIssue.js | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js b/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js index d76b3131f..0adec1540 100644 --- a/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js +++ b/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js @@ -1,5 +1,6 @@ import React from 'react'; import CollapsibleWellComponent from '../CollapsibleWell'; +import {Button} from 'react-bootstrap'; export function log4shellIssueOverview() { return (
  • Some servers are vulnerable to the Log4Shell remote code execution exploit.
  • ) @@ -14,8 +15,15 @@ export function log4shellIssueReport(issue) { className="badge badge-info" style={{margin: '2px'}}>{issue.ip_address}:{issue.port}) is vulnerable to the Log4Shell remote code execution attack.
    - The attack was made possible due to an old version of Apache Log4j component. CVE-2021-44228 + The attack was made possible due to an old version of Apache Log4j component ( + ). );