Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

jsonschema2pojo-core-1.2.1.jar: 1 vulnerabilities (highest severity is: 4.3) #114

Open
mend-bolt-for-github bot opened this issue Oct 5, 2024 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend

Comments

@mend-bolt-for-github
Copy link
Contributor

mend-bolt-for-github bot commented Oct 5, 2024

Vulnerable Library - jsonschema2pojo-core-1.2.1.jar

Path to dependency file: /bamboo-generator/build.gradle.kts

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/commons-io/commons-io/2.11.0/a2503f302b11ebde7ebc3df41daebe0e4eea3689/commons-io-2.11.0.jar

Found in HEAD commit: 1fc76088d115ca2a2f6ae32d49d53ed791dd82df

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (jsonschema2pojo-core version) Remediation Possible**
CVE-2024-47554 Medium 4.3 commons-io-2.11.0.jar Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-47554

Vulnerable Library - commons-io-2.11.0.jar

The Apache Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.

Library home page: https://www.apache.org/

Path to dependency file: /bamboo-generator/build.gradle.kts

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/commons-io/commons-io/2.11.0/a2503f302b11ebde7ebc3df41daebe0e4eea3689/commons-io-2.11.0.jar

Dependency Hierarchy:

  • jsonschema2pojo-core-1.2.1.jar (Root Library)
    • commons-io-2.11.0.jar (Vulnerable Library)

Found in HEAD commit: 1fc76088d115ca2a2f6ae32d49d53ed791dd82df

Found in base branch: develop

Vulnerability Details

Uncontrolled Resource Consumption vulnerability in Apache Commons IO.

The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.

This issue affects Apache Commons IO: from 2.0 before 2.14.0.

Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.

Publish Date: 2024-10-03

URL: CVE-2024-47554

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1

Release Date: 2024-10-03

Fix Resolution: commons-io:commons-io:2.14.0

Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by Mend label Oct 5, 2024
@mend-bolt-for-github mend-bolt-for-github bot changed the title jsonschema2pojo-core-1.2.1.jar: 1 vulnerabilities (highest severity is: 7.5) jsonschema2pojo-core-1.2.1.jar: 1 vulnerabilities (highest severity is: 4.3) Dec 5, 2024
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend
Projects
None yet
Development

No branches or pull requests

0 participants