forked from p15670423/monkey
UI: Switch CVE-2021-44228 from href to react-bootstrap Button
This resolves an eslint error regarding `target="blank"` without `rel="noopener"` and makes this code more consistent with other code.
This commit is contained in:
parent
d21dd6da13
commit
5bf82659bd
|
@ -1,5 +1,6 @@
|
|||
import React from 'react';
|
||||
import CollapsibleWellComponent from '../CollapsibleWell';
|
||||
import {Button} from 'react-bootstrap';
|
||||
|
||||
export function log4shellIssueOverview() {
|
||||
return (<li>Some servers are vulnerable to the Log4Shell remote code execution exploit.</li>)
|
||||
|
@ -14,8 +15,15 @@ export function log4shellIssueReport(issue) {
|
|||
className="badge badge-info" style={{margin: '2px'}}>{issue.ip_address}:{issue.port}</span>) is vulnerable to <span
|
||||
className="badge badge-danger">the Log4Shell remote code execution</span> attack.
|
||||
<br/>
|
||||
The attack was made possible due to an old version of Apache Log4j component. <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228"
|
||||
target="_blank">CVE-2021-44228</a>
|
||||
The attack was made possible due to an old version of Apache Log4j component (
|
||||
<Button
|
||||
variant={'link'}
|
||||
href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228'
|
||||
target={'_blank'}
|
||||
className={'security-report-link'}
|
||||
>
|
||||
CVE-2021-44228
|
||||
</Button>).
|
||||
</CollapsibleWellComponent>
|
||||
</>
|
||||
);
|
||||
|
|
Loading…
Reference in New Issue