GithubHelp home page GithubHelp logo

interserver / mailbaby-api-samples Goto Github PK

View Code? Open in Web Editor NEW
1.0 1.0 1.0 13.08 MB

API Samples for MailBaby

License: MIT License

Shell 1.57% PHP 14.85% HTML 18.81% Ada 0.81% Apex 1.71% Dockerfile 0.03% CMake 0.10% C 2.06% Clojure 0.46% C++ 9.66% QMake 0.03% C# 7.94% Crystal 1.73% Dart 4.64% Eiffel 1.52% Elixir 0.45% Erlang 0.53% Scala 3.63% Java 22.08% JavaScript 7.37%

mailbaby-api-samples's People

Contributors

dependabot[bot] avatar detain avatar mend-bolt-for-github[bot] avatar

Stargazers

 avatar

Watchers

 avatar  avatar  avatar  avatar

Forkers

jannie101

mailbaby-api-samples's Issues

CVE-2019-14439 (High) detected in multiple libraries

CVE-2019-14439 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.4.2.jar, jackson-databind-2.9.2.jar, jackson-databind-2.9.0.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.8.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.3.jar

jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.

Publish Date: 2019-07-30

URL: CVE-2019-14439

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439

Release Date: 2019-07-30

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.2

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.9.10

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.2

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.0.10

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.2

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.4

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.2

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19


Step up your Open Source Security Game with Mend here

CVE-2019-12814 (Medium) detected in multiple libraries

CVE-2019-12814 - Medium Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.4.2.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.2.jar, jackson-databind-2.9.8.jar, jackson-databind-2.9.0.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.3.jar

jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.

Publish Date: 2019-06-19

URL: CVE-2019-12814

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-06-19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.1

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.9.10

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.1

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.4

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.1

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.0.10

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9.1

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19


Step up your Open Source Security Game with Mend here

CVE-2020-11620 (High) detected in multiple libraries

CVE-2020-11620 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.4.5.jar, jackson-databind-2.9.8.jar, jackson-databind-2.9.2.jar, jackson-databind-2.9.0.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.3.jar, jackson-databind-2.4.2.jar

jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).

Publish Date: 2020-04-07

URL: CVE-2020-11620

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620

Release Date: 2020-04-07

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.4

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.5

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.4

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.10.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.4

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.1.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.4

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0


Step up your Open Source Security Game with Mend here

CVE-2021-21290 (Medium) detected in multiple libraries

CVE-2021-21290 - Medium Severity Vulnerability

Vulnerable Libraries - netty-codec-http-4.1.30.Final.jar, netty-codec-http-4.0.51.Final.jar, netty-handler-4.0.51.Final.jar, netty-handler-4.1.30.Final.jar

netty-codec-http-4.1.30.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /swagger-client/micronaut/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.30.Final/netty-codec-http-4.1.30.Final.jar

Dependency Hierarchy:

  • micronaut-http-client-1.1.4.jar (Root Library)
    • micronaut-http-netty-1.1.4.jar
      • netty-codec-http-4.1.30.Final.jar (Vulnerable Library)
netty-codec-http-4.0.51.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec-http/4.0.51.Final/1c8074c311dd2f1273c722477b232cdb74dcd844/netty-codec-http-4.0.51.Final.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-app-2.3.0.jar
      • gatling-http-2.3.0.jar
        • async-http-client-2.0.35.jar
          • netty-codec-http-4.0.51.Final.jar (Vulnerable Library)
netty-handler-4.0.51.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-handler/4.0.51.Final/d1bb19203fef0a78babdbd0eb511add11d806df8/netty-handler-4.0.51.Final.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-app-2.3.0.jar
      • gatling-http-2.3.0.jar
        • async-http-client-2.0.35.jar
          • netty-handler-4.0.51.Final.jar (Vulnerable Library)
netty-handler-4.1.30.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /swagger-client/micronaut/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-handler/4.1.30.Final/netty-handler-4.1.30.Final.jar

Dependency Hierarchy:

  • micronaut-http-client-1.1.4.jar (Root Library)
    • micronaut-http-netty-1.1.4.jar
      • netty-handler-4.1.30.Final.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user.

Publish Date: 2021-02-08

URL: CVE-2021-21290

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-5mcr-gq6c-3hq2

Release Date: 2021-02-08

Fix Resolution (io.netty:netty-codec-http): 4.1.59.Final

Direct dependency fix Resolution (io.micronaut:micronaut-http-client): 2.3.2

Fix Resolution (io.netty:netty-codec-http): 4.1.59.Final

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.6.0

Fix Resolution (io.netty:netty-handler): 4.1.59.Final

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.6.0

Fix Resolution (io.netty:netty-handler): 4.1.59.Final

Direct dependency fix Resolution (io.micronaut:micronaut-http-client): 2.3.2


Step up your Open Source Security Game with Mend here

CVE-2019-10062 (Medium) detected in aurelia-framework-1.3.1.tgz - autoclosed

CVE-2019-10062 - Medium Severity Vulnerability

Vulnerable Library - aurelia-framework-1.3.1.tgz

The aurelia framework brings together all the required core aurelia libraries into a ready-to-go application-building platform.

Library home page: https://registry.npmjs.org/aurelia-framework/-/aurelia-framework-1.3.1.tgz

Path to dependency file: /openapi-client/typescript-aurelia/package.json

Path to vulnerable library: /openapi-client/typescript-aurelia/node_modules/aurelia-framework/package.json

Dependency Hierarchy:

  • aurelia-framework-1.3.1.tgz (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

The HTMLSanitizer class in html-sanitizer.ts in all released versions of the Aurelia framework 1.x repository is vulnerable to XSS. The sanitizer only attempts to filter SCRIPT elements, which makes it feasible for remote attackers to conduct XSS attacks via (for example) JavaScript code in an attribute of various other elements. An attacker might also exploit a bug in how the SCRIPT string is processed by splitting and nesting them for example.

Publish Date: 2021-05-13

URL: CVE-2019-10062

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2019-10062

Release Date: 2021-05-13

Fix Resolution: no_fix


Step up your Open Source Security Game with Mend here

CVE-2021-45046 (High) detected in log4j-core-2.11.2.jar - autoclosed

CVE-2021-45046 - High Severity Vulnerability

Vulnerable Library - log4j-core-2.11.2.jar

The Apache Log4j Implementation

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.logging.log4j/log4j-core/2.11.2/6c2fb3f5b7cd27504726aef1b674b542a0c9cf53/log4j-core-2.11.2.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.logging.log4j/log4j-core/2.11.2/6c2fb3f5b7cd27504726aef1b674b542a0c9cf53/log4j-core-2.11.2.jar

Dependency Hierarchy:

  • zinc_2.12-1.3.5.jar (Root Library)
    • zinc-compile-core_2.12-1.3.5.jar
      • util-logging_2.12-1.3.0.jar
        • log4j-core-2.11.2.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.

Publish Date: 2021-12-14

URL: CVE-2021-45046

CVSS 3 Score Details (9.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://logging.apache.org/log4j/2.x/security.html

Release Date: 2021-12-14

Fix Resolution (org.apache.logging.log4j:log4j-core): 2.12.2

Direct dependency fix Resolution (org.scala-sbt:zinc_2.12): 1.4.0


Step up your Open Source Security Game with Mend here

WS-2019-0379 (Medium) detected in multiple libraries

WS-2019-0379 - Medium Severity Vulnerability

Vulnerable Libraries - commons-codec-1.11.jar, commons-codec-1.10.jar, commons-codec-1.9.jar

commons-codec-1.11.jar

The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

Path to dependency file: /swagger-client/jaxrs-resteasy-eap/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-codec/commons-codec/1.11/commons-codec-1.11.jar

Dependency Hierarchy:

  • resteasy-jaxrs-3.15.6.Final.jar (Root Library)
    • httpclient-4.5.13.jar
      • commons-codec-1.11.jar (Vulnerable Library)
commons-codec-1.10.jar

The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

Path to dependency file: /swagger-client/kotlin-server/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/commons-codec/commons-codec/1.10/4b95f4897fa13f2cd904aee711aeafc0c5295cd8/commons-codec-1.10.jar

Dependency Hierarchy:

  • ktor-client-apache-1.5.4.jar (Root Library)
    • httpasyncclient-4.1.4.jar
      • httpclient-4.5.6.jar
        • commons-codec-1.10.jar (Vulnerable Library)
commons-codec-1.9.jar

The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.

Path to dependency file: /swagger-client/inflector/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-codec/commons-codec/1.9/commons-codec-1.9.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-parser-2.0.12.jar
      • swagger-parser-v2-converter-2.0.12.jar
        • swagger-compat-spec-parser-1.0.44.jar
          • httpclient-4.5.2.jar
            • commons-codec-1.9.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation.

Publish Date: 2019-05-20

URL: WS-2019-0379

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-05-20

Fix Resolution (commons-codec:commons-codec): 1.13

Direct dependency fix Resolution (io.ktor:ktor-client-apache): 2.0.0


Step up your Open Source Security Game with Mend here

CVE-2019-12086 (High) detected in multiple libraries

CVE-2019-12086 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.2.jar, jackson-databind-2.9.8.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.3.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.0.jar, jackson-databind-2.9.4.jar

jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.

Publish Date: 2019-05-17

URL: CVE-2019-12086

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086

Release Date: 2019-05-17

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.9.9

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.1

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.4.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.0.9


Step up your Open Source Security Game with Mend here

CVE-2019-11835 (High) detected in openapi-generatorv5.1.1 - autoclosed

CVE-2019-11835 - High Severity Vulnerability

Vulnerable Library - openapi-generatorv5.1.1

OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec (v2, v3)

Library home page: https://github.com/OpenAPITools/openapi-generator.git

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerable Source Files (1)

/.c

Vulnerability Details

cJSON before 1.7.11 allows out-of-bounds access, related to multiline comments.

Publish Date: 2019-05-09

URL: CVE-2019-11835

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11835

Release Date: 2019-05-09

Fix Resolution: v1.7.11


Step up your Open Source Security Game with Mend here

CVE-2020-11619 (High) detected in multiple libraries

CVE-2020-11619 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.8.jar, jackson-databind-2.9.3.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.2.jar, jackson-databind-2.9.0.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.4.jar

jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).

Publish Date: 2020-04-07

URL: CVE-2020-11619

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619

Release Date: 2020-04-07

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.4

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.5

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.4

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.4

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.10.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.4

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.1.0


Step up your Open Source Security Game with Mend here

CVE-2021-27293 (High) detected in restsharp.105.1.0.nupkg

CVE-2021-27293 - High Severity Vulnerability

Vulnerable Library - restsharp.105.1.0.nupkg

Simple REST and HTTP API Client

Library home page: https://api.nuget.org/packages/restsharp.105.1.0.nupkg

Path to dependency file: /swagger-client/csharp/src/IO.Swagger/IO.Swagger.csproj

Path to vulnerable library: /tmp/ws-ua_20230810174927_TOIXHM/dotnet_NGCYAB/20230810175648/RestSharp.105.1.0/RestSharp.105.1.0.nupkg,/tmp/ws-ua_20230810174927_TOIXHM/dotnet_NGCYAB/20230810175648/RestSharp.105.1.0/RestSharp.105.1.0.nupkg

Dependency Hierarchy:

  • restsharp.105.1.0.nupkg (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server can trigger Denial of Service.

Publish Date: 2021-07-12

URL: CVE-2021-27293

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-9pq7-rcxv-47vq

Release Date: 2021-07-12

Fix Resolution: RestSharp - 106.11.8-alpha.0.13


Step up your Open Source Security Game with Mend here

CVE-2020-36181 (High) detected in multiple libraries

CVE-2020-36181 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.4.jar, jackson-databind-2.9.0.jar, jackson-databind-2.9.10.5.jar, jackson-databind-2.4.5.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.3.jar, jackson-databind-2.9.8.jar, jackson-databind-2.9.10.4.jar, jackson-databind-2.9.2.jar

jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.10.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/spring/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10.5/jackson-databind-2.9.10.5.jar

Dependency Hierarchy:

  • spring-boot-starter-web-2.1.16.RELEASE.jar (Root Library)
    • spring-boot-starter-json-2.1.16.RELEASE.jar
      • jackson-databind-2.9.10.5.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.9.10.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.10.4.jar

Dependency Hierarchy:

  • json4s-jackson_2.13-3.6.8.jar (Root Library)
    • jackson-databind-2.9.10.4.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.

Publish Date: 2021-01-06

URL: CVE-2020-36181

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-01-06

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.1.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.5

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.5

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.5

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (org.json4s:json4s-jackson_2.13): 3.6.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.10.0


Step up your Open Source Security Game with Mend here

WS-2018-0111 (Critical) detected in base64-url-1.2.1.tgz

WS-2018-0111 - Critical Severity Vulnerability

Vulnerable Library - base64-url-1.2.1.tgz

Base64 encode, decode, escape and unescape for URL applications

Library home page: https://registry.npmjs.org/base64-url/-/base64-url-1.2.1.tgz

Path to dependency file: /openapi-documentation/dynamic-html/package.json

Path to vulnerable library: /openapi-documentation/dynamic-html/node_modules/base64-url/package.json,/swagger-documentation/dynamic-html/node_modules/base64-url/package.json

Dependency Hierarchy:

  • express-3.21.2.tgz (Root Library)
    • connect-2.30.2.tgz
      • express-session-1.11.3.tgz
        • uid-safe-2.0.0.tgz
          • base64-url-1.2.1.tgz (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Versions of base64-url before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input.

Publish Date: 2018-05-16

URL: WS-2018-0111

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nodesecurity.io/advisories/660

Release Date: 2018-01-27

Fix Resolution (base64-url): 2.0.0

Direct dependency fix Resolution (express): 4.0.0


Step up your Open Source Security Game with Mend here

CVE-2020-11612 (High) detected in netty-codec-4.1.30.Final.jar

CVE-2020-11612 - High Severity Vulnerability

Vulnerable Library - netty-codec-4.1.30.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /swagger-client/micronaut/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec/4.1.30.Final/netty-codec-4.1.30.Final.jar

Dependency Hierarchy:

  • micronaut-http-client-1.1.4.jar (Root Library)
    • micronaut-http-netty-1.1.4.jar
      • netty-codec-http-4.1.30.Final.jar
        • netty-codec-4.1.30.Final.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.

Publish Date: 2020-04-07

URL: CVE-2020-11612

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://netty.io/news/2020/02/28/4-1-46-Final.html

Release Date: 2020-04-07

Fix Resolution (io.netty:netty-codec): 4.1.46.Final

Direct dependency fix Resolution (io.micronaut:micronaut-http-client): 1.3.3


Step up your Open Source Security Game with Mend here

WS-2018-0590 (High) detected in diff-2.2.3.tgz - autoclosed

WS-2018-0590 - High Severity Vulnerability

Vulnerable Library - diff-2.2.3.tgz

A javascript text diff implementation.

Library home page: https://registry.npmjs.org/diff/-/diff-2.2.3.tgz

Path to dependency file: /openapi-client/typescript-aurelia/package.json

Path to vulnerable library: /openapi-client/typescript-aurelia/node_modules/diff/package.json

Dependency Hierarchy:

  • tslint-3.15.1.tgz (Root Library)
    • diff-2.2.3.tgz (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.

Publish Date: 2018-03-05

URL: WS-2018-0590

CVSS 3 Score Details (7.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: kpdecker/jsdiff@2aec429

Release Date: 2018-03-05

Fix Resolution (diff): 3.5.0

Direct dependency fix Resolution (tslint): 4.0.0-dev.1


Step up your Open Source Security Game with Mend here

CVE-2020-26939 (Medium) detected in bcprov-jdk15on-1.58.jar

CVE-2020-26939 - Medium Severity Vulnerability

Vulnerable Library - bcprov-jdk15on-1.58.jar

The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.

Library home page: http://www.bouncycastle.org/java.html

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15on/1.58/2c9aa1c4e3372b447ba5daabade4adf2a2264b12/bcprov-jdk15on-1.58.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • bcpkix-jdk15on-1.58.jar
        • bcprov-jdk15on-1.58.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

In Legion of the Bouncy Castle BC before 1.61 and BC-FJA before 1.0.1.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.

Publish Date: 2020-11-02

URL: CVE-2020-26939

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-11-02

Fix Resolution (org.bouncycastle:bcprov-jdk15on): 1.61

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.1.0


Step up your Open Source Security Game with Mend here

CVE-2019-11834 (High) detected in openapi-generatorv5.1.1 - autoclosed

CVE-2019-11834 - High Severity Vulnerability

Vulnerable Library - openapi-generatorv5.1.1

OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec (v2, v3)

Library home page: https://github.com/OpenAPITools/openapi-generator.git

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerable Source Files (1)

/.c

Vulnerability Details

cJSON before 1.7.11 allows out-of-bounds access, related to \x00 in a string literal.

Publish Date: 2019-05-09

URL: CVE-2019-11834

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11835

Release Date: 2019-05-09

Fix Resolution: v1.7.11


Step up your Open Source Security Game with Mend here

CVE-2017-16138 (High) detected in mime-1.3.4.tgz

CVE-2017-16138 - High Severity Vulnerability

Vulnerable Library - mime-1.3.4.tgz

A comprehensive library for mime-type mapping

Library home page: https://registry.npmjs.org/mime/-/mime-1.3.4.tgz

Path to dependency file: /swagger-documentation/dynamic-html/package.json

Path to vulnerable library: /swagger-documentation/dynamic-html/node_modules/mime/package.json,/openapi-documentation/dynamic-html/node_modules/mime/package.json

Dependency Hierarchy:

  • express-3.21.2.tgz (Root Library)
    • send-0.13.0.tgz
      • mime-1.3.4.tgz (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
Mend Note: Converted from WS-2017-0330, on 2022-11-08.

Publish Date: 2018-06-07

URL: CVE-2017-16138

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138

Release Date: 2018-06-07

Fix Resolution (mime): 1.4.1

Direct dependency fix Resolution (express): 4.16.0


Step up your Open Source Security Game with Mend here

CVE-2017-7561 (High) detected in resteasy-jaxrs-3.0.11.Final.jar - autoclosed

CVE-2017-7561 - High Severity Vulnerability

Vulnerable Library - resteasy-jaxrs-3.0.11.Final.jar

Resteasy

Path to dependency file: /swagger-client/jaxrs-resteasy/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jboss.resteasy/resteasy-jaxrs/3.0.11.Final/e38927a7ee37a43950d0ca58d63042d14ca93a5f/resteasy-jaxrs-3.0.11.Final.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jboss.resteasy/resteasy-jaxrs/3.0.11.Final/e38927a7ee37a43950d0ca58d63042d14ca93a5f/resteasy-jaxrs-3.0.11.Final.jar,/tmp/ws-ua_20230509045249_MRBJOU/downloadResource_LJDDTC/20230509051140/resteasy-jaxrs-3.0.11.Final.jar

Dependency Hierarchy:

  • resteasy-jaxrs-3.0.11.Final.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Red Hat JBoss EAP version 3.0.7 through before 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact.

Publish Date: 2017-09-13

URL: CVE-2017-7561

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://issues.jboss.org/browse/RESTEASY-1704

Release Date: 2017-08-22

Fix Resolution: 3.0.26.Final


Step up your Open Source Security Game with Mend here

CVE-2020-15250 (Medium) detected in junit-4.12.jar

CVE-2020-15250 - Medium Severity Vulnerability

Vulnerable Library - junit-4.12.jar

JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck.

Library home page: http://junit.org

Path to dependency file: /swagger-client/java/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/junit/junit/4.12/2973d150c0dc1fefe998f834810d68f278ea58ec/junit-4.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/junit/junit/4.12/2973d150c0dc1fefe998f834810d68f278ea58ec/junit-4.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/junit/junit/4.12/2973d150c0dc1fefe998f834810d68f278ea58ec/junit-4.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/junit/junit/4.12/2973d150c0dc1fefe998f834810d68f278ea58ec/junit-4.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/junit/junit/4.12/2973d150c0dc1fefe998f834810d68f278ea58ec/junit-4.12.jar

Dependency Hierarchy:

  • junit-4.12.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.

Publish Date: 2020-10-12

URL: CVE-2020-15250

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-269g-pwp5-87pp

Release Date: 2020-10-12

Fix Resolution: 4.13.1


Step up your Open Source Security Game with Mend here

CVE-2013-7398 (Medium) detected in async-http-client-1.8.5.jar, async-http-client-1.8.14.jar

CVE-2013-7398 - Medium Severity Vulnerability

Vulnerable Libraries - async-http-client-1.8.5.jar, async-http-client-1.8.14.jar

async-http-client-1.8.5.jar

Async Http Client library purpose is to allow Java applications to easily execute HTTP requests and asynchronously process the HTTP responses.

Library home page: http://github.com/AsyncHttpClient/async-http-client

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/ning/async-http-client/1.8.5/async-http-client-1.8.5.jar

Dependency Hierarchy:

  • jersey-ahc-client-1.0.5.jar (Root Library)
    • async-http-client-1.8.5.jar (Vulnerable Library)
async-http-client-1.8.14.jar

Async Http Client library purpose is to allow Java applications to easily execute HTTP requests and asynchronously process the HTTP responses.

Library home page: http://github.com/AsyncHttpClient/async-http-client

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.ning/async-http-client/1.8.14/e11c597d4b7bf728519f44f7e600685c9f91eaee/async-http-client-1.8.14.jar,/home/wss-scanner/.ivy2/cache/com.ning/async-http-client/jars/async-http-client-1.8.14.jar

Dependency Hierarchy:

  • swagger-async-httpclient_2.11-0.3.5.jar (Root Library)
    • async-http-client-1.8.14.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

main/java/com/ning/http/client/AsyncHttpClientConfig.java in Async Http Client (aka AHC or async-http-client) before 1.9.0 does not require a hostname match during verification of X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.

Publish Date: 2015-06-24

URL: CVE-2013-7398

CVSS 3 Score Details (4.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7398

Release Date: 2015-06-24

Fix Resolution: 1.9.0


Step up your Open Source Security Game with Mend here

CVE-2017-16137 (Medium) detected in debug-2.2.0.tgz

CVE-2017-16137 - Medium Severity Vulnerability

Vulnerable Library - debug-2.2.0.tgz

small debugging utility

Library home page: https://registry.npmjs.org/debug/-/debug-2.2.0.tgz

Path to dependency file: /openapi-documentation/dynamic-html/package.json

Path to vulnerable library: /openapi-documentation/dynamic-html/node_modules/debug/package.json,/swagger-documentation/dynamic-html/node_modules/debug/package.json

Dependency Hierarchy:

  • express-3.21.2.tgz (Root Library)
    • debug-2.2.0.tgz (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.

Publish Date: 2018-06-07

URL: CVE-2017-16137

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137

Release Date: 2018-04-26

Fix Resolution (debug): 2.6.9

Direct dependency fix Resolution (express): 4.15.5


Step up your Open Source Security Game with Mend here

CVE-2020-36189 (High) detected in multiple libraries

CVE-2020-36189 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.2.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.0.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.10.4.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.10.5.jar, jackson-databind-2.9.3.jar, jackson-databind-2.9.8.jar

jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.10.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.10.4.jar

Dependency Hierarchy:

  • json4s-jackson_2.13-3.6.8.jar (Root Library)
    • jackson-databind-2.9.10.4.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.10.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/spring/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10.5/jackson-databind-2.9.10.5.jar

Dependency Hierarchy:

  • spring-boot-starter-web-2.1.16.RELEASE.jar (Root Library)
    • spring-boot-starter-json-2.1.16.RELEASE.jar
      • jackson-databind-2.9.10.5.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.

Publish Date: 2021-01-06

URL: CVE-2020-36189

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-01-06

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.10.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.5

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.5

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (org.json4s:json4s-jackson_2.13): 3.6.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.1.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.5


Step up your Open Source Security Game with Mend here

CVE-2020-7611 (Critical) detected in micronaut-http-netty-1.1.4.jar

CVE-2020-7611 - Critical Severity Vulnerability

Vulnerable Library - micronaut-http-netty-1.1.4.jar

Natively Cloud Native

Library home page: http://micronaut.io

Path to dependency file: /swagger-client/micronaut/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/micronaut/micronaut-http-netty/1.1.4/micronaut-http-netty-1.1.4.jar

Dependency Hierarchy:

  • micronaut-http-client-1.1.4.jar (Root Library)
    • micronaut-http-netty-1.1.4.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

All versions of io.micronaut:micronaut-http-client before 1.2.11 and all versions from 1.3.0 before 1.3.2 are vulnerable to HTTP Request Header Injection due to not validating request headers passed to the client.

Publish Date: 2020-03-30

URL: CVE-2020-7611

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7611

Release Date: 2020-04-02

Fix Resolution (io.micronaut:micronaut-http-netty): 1.2.11

Direct dependency fix Resolution (io.micronaut:micronaut-http-client): 1.2.11


Step up your Open Source Security Game with Mend here

CVE-2020-28168 (Medium) detected in axios-0.19.2.tgz - autoclosed

CVE-2020-28168 - Medium Severity Vulnerability

Vulnerable Library - axios-0.19.2.tgz

Promise based HTTP client for the browser and node.js

Library home page: https://registry.npmjs.org/axios/-/axios-0.19.2.tgz

Path to dependency file: /swagger-client/typescript-axios/package.json

Path to vulnerable library: /swagger-client/typescript-axios/node_modules/axios/package.json

Dependency Hierarchy:

  • axios-0.19.2.tgz (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.

Publish Date: 2020-11-06

URL: CVE-2020-28168

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: axios/axios@c7329fe

Release Date: 2020-11-06

Fix Resolution: 0.21.1


Step up your Open Source Security Game with Mend here

CVE-2018-14721 (Critical) detected in multiple libraries

CVE-2018-14721 - Critical Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.0.jar, jackson-databind-2.4.5.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.3.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.2.jar

jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.

Publish Date: 2019-01-02

URL: CVE-2018-14721

CVSS 3 Score Details (10.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721

Release Date: 2019-01-02

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.7

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.1.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.7

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.7

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.0.7

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.7

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.9.7


Step up your Open Source Security Game with Mend here

CVE-2021-21293 (High) detected in blaze-core_2.11-0.12.5.jar

CVE-2021-21293 - High Severity Vulnerability

Vulnerable Library - blaze-core_2.11-0.12.5.jar

NIO Framework for Scala

Library home page: https://github.com/http4s/blaze

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/org.http4s/blaze-core_2.11/jars/blaze-core_2.11-0.12.5.jar

Dependency Hierarchy:

  • http4s-blaze-client_2.11-0.15.12a.jar (Root Library)
    • http4s-blaze-core_2.11-0.15.12a.jar
      • blaze-http_2.11-0.12.5.jar
        • blaze-core_2.11-0.12.5.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

blaze is a Scala library for building asynchronous pipelines, with a focus on network IO. All servers running blaze-core before version 0.14.15 are affected by a vulnerability in which unbounded connection acceptance leads to file handle exhaustion. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. The issue is fixed in version 0.14.15 for "NIO1SocketServerGroup". A "maxConnections" parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. The "NIO2SocketServerGroup" has no such setting and is now deprecated. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xmw9-q7x9-j5qc.

Publish Date: 2021-02-02

URL: CVE-2021-21293

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-xmw9-q7x9-j5qc

Release Date: 2021-02-02

Fix Resolution: org.http4s:blaze-core_2.11:0.14.15,org.http4s:blaze-core_2.12:0.14.15,org.http4s:blaze-core_2.13:0.14.15


Step up your Open Source Security Game with Mend here

CVE-2021-32769 (High) detected in micronaut-core-1.1.4.jar, micronaut-inject-1.1.4.jar - autoclosed

CVE-2021-32769 - High Severity Vulnerability

Vulnerable Libraries - micronaut-core-1.1.4.jar, micronaut-inject-1.1.4.jar

micronaut-core-1.1.4.jar

Natively Cloud Native

Library home page: http://micronaut.io

Path to dependency file: /swagger-client/micronaut/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/micronaut/micronaut-core/1.1.4/micronaut-core-1.1.4.jar

Dependency Hierarchy:

  • micronaut-inject-1.1.4.jar (Root Library)
    • micronaut-core-1.1.4.jar (Vulnerable Library)
micronaut-inject-1.1.4.jar

Natively Cloud Native

Library home page: http://micronaut.io

Path to dependency file: /swagger-client/micronaut/pom.xml

Path to vulnerable library: /io/micronaut/micronaut-inject/1.1.4/micronaut-inject-1.1.4.jar

Dependency Hierarchy:

  • micronaut-inject-1.1.4.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Micronaut is a JVM-based, full stack Java framework designed for building JVM applications. A path traversal vulnerability exists in versions prior to 2.5.9. With a basic configuration, it is possible to access any file from a filesystem, using "/../../" in the URL. This occurs because Micronaut does not restrict file access to configured paths. The vulnerability is patched in version 2.5.9. As a workaround, do not use ** in mapping, use only *, which exposes only flat structure of a directory not allowing traversal. If using Linux, another workaround is to run micronaut in chroot.

Publish Date: 2021-07-16

URL: CVE-2021-32769

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32769

Release Date: 2021-07-16

Fix Resolution (io.micronaut:micronaut-core): 2.5.9

Direct dependency fix Resolution (io.micronaut:micronaut-inject): 2.5.9


Step up your Open Source Security Game with Mend here

CVE-2019-17531 (Critical) detected in multiple libraries

CVE-2019-17531 - Critical Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.8.jar, jackson-databind-2.9.0.jar, jackson-databind-2.9.2.jar, jackson-databind-2.4.2.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.3.jar

jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.

Publish Date: 2019-10-12

URL: CVE-2019-17531

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531

Release Date: 2019-10-12

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.1

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.5

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.1

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.10.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.1

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.1.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.1

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19


Step up your Open Source Security Game with Mend here

CVE-2019-17267 (Critical) detected in multiple libraries

CVE-2019-17267 - Critical Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.4.jar, jackson-databind-2.9.3.jar, jackson-databind-2.9.0.jar, jackson-databind-2.4.5.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.2.jar, jackson-databind-2.9.8.jar

jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.

Publish Date: 2019-10-07

URL: CVE-2019-17267

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-10-07

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.0.10

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.9.10

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.4


Step up your Open Source Security Game with Mend here

CVE-2014-3577 (Medium) detected in httpclient-4.2.6.jar - autoclosed

CVE-2014-3577 - Medium Severity Vulnerability

Vulnerable Library - httpclient-4.2.6.jar

HttpComponents Client

Path to dependency file: /swagger-client/jaxrs-resteasy-eap/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.httpcomponents/httpclient/4.2.6/e4ca30a6a3a075053a61c6fc850d2432dc012ba7/httpclient-4.2.6.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.httpcomponents/httpclient/4.2.6/e4ca30a6a3a075053a61c6fc850d2432dc012ba7/httpclient-4.2.6.jar

Dependency Hierarchy:

  • resteasy-jaxrs-3.0.11.Final.jar (Root Library)
    • httpclient-4.2.6.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.

Publish Date: 2014-08-21

URL: CVE-2014-3577

CVSS 3 Score Details (4.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2014-08-21

Fix Resolution (org.apache.httpcomponents:httpclient): 4.3.5

Direct dependency fix Resolution (org.jboss.resteasy:resteasy-jaxrs): 3.0.12.Final


Step up your Open Source Security Game with Mend here

CVE-2021-37136 (High) detected in multiple libraries

CVE-2021-37136 - High Severity Vulnerability

Vulnerable Libraries - netty-codec-4.1.30.Final.jar, netty-codec-4.1.63.Final.jar, netty-codec-4.0.51.Final.jar

netty-codec-4.1.30.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /swagger-client/micronaut/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec/4.1.30.Final/netty-codec-4.1.30.Final.jar

Dependency Hierarchy:

  • micronaut-http-client-1.1.4.jar (Root Library)
    • micronaut-http-netty-1.1.4.jar
      • netty-codec-http-4.1.30.Final.jar
        • netty-codec-4.1.30.Final.jar (Vulnerable Library)
netty-codec-4.1.63.Final.jar

Library home page: https://netty.io/

Path to dependency file: /swagger-client/kotlin-server/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.63.Final/d4d2fccea88c80e56d59ce1053c53df0f9f4f5db/netty-codec-4.1.63.Final.jar

Dependency Hierarchy:

  • ktor-server-netty-1.5.4.jar (Root Library)
    • netty-codec-http2-4.1.63.Final.jar
      • netty-codec-4.1.63.Final.jar (Vulnerable Library)
netty-codec-4.0.51.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.0.51.Final/d23fcf04e4e515df86801fb9cbc281c9b4810310/netty-codec-4.0.51.Final.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-app-2.3.0.jar
      • gatling-http-2.3.0.jar
        • async-http-client-2.0.35.jar
          • netty-resolver-dns-2.0.35.jar
            • netty-codec-dns-2.0.35.jar
              • netty-codec-4.0.51.Final.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack

Publish Date: 2021-10-19

URL: CVE-2021-37136

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-grg4-wf29-r9vv

Release Date: 2021-10-19

Fix Resolution (io.netty:netty-codec): 4.1.68.Final

Direct dependency fix Resolution (io.micronaut:micronaut-http-client): 3.0.2

Fix Resolution (io.netty:netty-codec): 4.1.68.Final

Direct dependency fix Resolution (io.ktor:ktor-server-netty): 1.6.5

Fix Resolution (io.netty:netty-codec): 4.1.68.Final

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.7.0


Step up your Open Source Security Game with Mend here

CVE-2018-14720 (Critical) detected in multiple libraries

CVE-2018-14720 - Critical Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.2.jar, jackson-databind-2.4.2.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.3.jar, jackson-databind-2.9.0.jar

jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.

Publish Date: 2019-01-02

URL: CVE-2018-14720

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-14720

Release Date: 2019-01-02

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.7

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.9.7

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.7

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.0.7

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.7

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.7

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.1.0


Step up your Open Source Security Game with Mend here

CVE-2014-0193 (Medium) detected in netty-3.9.0.Final.jar

CVE-2014-0193 - Medium Severity Vulnerability

Vulnerable Library - netty-3.9.0.Final.jar

The Netty project is an effort to provide an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

Library home page: http://netty.io/

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty/3.9.0.Final/netty-3.9.0.Final.jar

Dependency Hierarchy:

  • jersey-ahc-client-1.0.5.jar (Root Library)
    • netty-3.9.0.Final.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

WebSocket08FrameDecoder in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames.

Publish Date: 2014-05-06

URL: CVE-2014-0193

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0193

Release Date: 2014-05-06

Fix Resolution: io.netty:netty-all:4.0.19.Final,io.netty:netty-codec-http:4.0.19.Final,io.netty:netty:3.6.9.Final,io.netty:netty:3.7.1.Final,io.netty:netty:3.8.2.Final,io.netty:netty:3.9.1.Final


Step up your Open Source Security Game with Mend here

WS-2018-0629 (Critical) detected in woodstox-core-5.0.3.jar

WS-2018-0629 - Critical Severity Vulnerability

Vulnerable Library - woodstox-core-5.0.3.jar

Woodstox is a high-performance XML processor that implements Stax (JSR-173), SAX2 and Stax2 APIs

Library home page: https://github.com/FasterXML/woodstox

Path to dependency file: /swagger-client/inflector/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/woodstox/woodstox-core/5.0.3/woodstox-core-5.0.3.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • jackson-jaxrs-xml-provider-2.9.8.jar
      • jackson-dataformat-xml-2.9.8.jar
        • woodstox-core-5.0.3.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

The woodstox-core package is vulnerable to improper restriction of XXE reference.

Publish Date: 2018-08-23

URL: WS-2018-0629

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2018-08-23

Fix Resolution (com.fasterxml.woodstox:woodstox-core): 5.2.1

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.4


Step up your Open Source Security Game with Mend here

CVE-2020-11979 (High) detected in ant-1.9.15.jar

CVE-2020-11979 - High Severity Vulnerability

Vulnerable Library - ant-1.9.15.jar

master POM

Library home page: http://ant.apache.org/

Path to dependency file: /openapi-client/groovy/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.ant/ant/1.9.15/da94dd78a0bdddcbc68107464632ecc7a61039a1/ant-1.9.15.jar

Dependency Hierarchy:

  • groovy-all-2.5.14-groovydoc.jar (Root Library)
    • groovy-ant-2.5.14.jar
      • ant-1.9.15.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.

Publish Date: 2020-10-01

URL: CVE-2020-11979

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://ant.apache.org/security.html

Release Date: 2020-10-01

Fix Resolution (org.apache.ant:ant): 1.10.9

Direct dependency fix Resolution (org.codehaus.groovy:groovy-all): 3.0.8


Step up your Open Source Security Game with Mend here

CVE-2020-36180 (High) detected in multiple libraries

CVE-2020-36180 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.4.2.jar, jackson-databind-2.9.3.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.0.jar, jackson-databind-2.9.10.4.jar, jackson-databind-2.9.2.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.10.5.jar, jackson-databind-2.9.8.jar

jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.10.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.10.4.jar

Dependency Hierarchy:

  • json4s-jackson_2.13-3.6.8.jar (Root Library)
    • jackson-databind-2.9.10.4.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.10.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/spring/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10.5/jackson-databind-2.9.10.5.jar

Dependency Hierarchy:

  • spring-boot-starter-web-2.1.16.RELEASE.jar (Root Library)
    • spring-boot-starter-json-2.1.16.RELEASE.jar
      • jackson-databind-2.9.10.5.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.

Publish Date: 2021-01-07

URL: CVE-2020-36180

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-01-07

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.5

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.5

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (org.json4s:json4s-jackson_2.13): 3.6.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.10.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.1.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.5


Step up your Open Source Security Game with Mend here

CVE-2019-16335 (Critical) detected in multiple libraries

CVE-2019-16335 - Critical Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.4.5.jar, jackson-databind-2.9.8.jar, jackson-databind-2.9.2.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.0.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.3.jar

jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.

Publish Date: 2019-09-15

URL: CVE-2019-16335

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-09-15

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.4

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.9.10

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.0.10

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19


Step up your Open Source Security Game with Mend here

WS-2018-0125 (Medium) detected in jackson-core-2.4.5.jar, jackson-core-2.4.2.jar

WS-2018-0125 - Medium Severity Vulnerability

Vulnerable Libraries - jackson-core-2.4.5.jar, jackson-core-2.4.2.jar

jackson-core-2.4.5.jar

Core Jackson abstractions, basic JSON streaming API implementation

Library home page: https://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-core/2.4.5/6fb96728ee26edb19fe329d94f3bd4df1a97652a/jackson-core-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar
      • jackson-core-2.4.5.jar (Vulnerable Library)
jackson-core-2.4.2.jar

Core Jackson abstractions, basic JSON streaming API implementation

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-core/bundles/jackson-core-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar
        • jackson-core-2.4.2.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

OutOfMemoryError when writing BigDecimal In Jackson Core before version 2.7.7.
When enabled the WRITE_BIGDECIMAL_AS_PLAIN setting, Jackson will attempt to write out the whole number, no matter how large the exponent.

Publish Date: 2016-08-25

URL: WS-2018-0125

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2016-08-25

Fix Resolution (com.fasterxml.jackson.core:jackson-core): 2.7.7

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-core): 2.7.7

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0


Step up your Open Source Security Game with Mend here

CVE-2019-12406 (Medium) detected in cxf-core-3.3.0.jar - autoclosed

CVE-2019-12406 - Medium Severity Vulnerability

Vulnerable Library - cxf-core-3.3.0.jar

Apache CXF Core

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/cxf/cxf-core/3.3.0/cxf-core-3.3.0.jar

Dependency Hierarchy:

  • cxf-rt-frontend-jaxrs-3.3.0.jar (Root Library)
    • cxf-core-3.3.0.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property "attachment-max-count".

Publish Date: 2019-11-06

URL: CVE-2019-12406

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12406

Release Date: 2019-11-06

Fix Resolution (org.apache.cxf:cxf-core): 3.3.4

Direct dependency fix Resolution (org.apache.cxf:cxf-rt-frontend-jaxrs): 3.3.4


Step up your Open Source Security Game with Mend here

WS-2018-0124 (Medium) detected in jackson-core-2.4.5.jar, jackson-core-2.4.2.jar

WS-2018-0124 - Medium Severity Vulnerability

Vulnerable Libraries - jackson-core-2.4.5.jar, jackson-core-2.4.2.jar

jackson-core-2.4.5.jar

Core Jackson abstractions, basic JSON streaming API implementation

Library home page: https://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-core/2.4.5/6fb96728ee26edb19fe329d94f3bd4df1a97652a/jackson-core-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar
      • jackson-core-2.4.5.jar (Vulnerable Library)
jackson-core-2.4.2.jar

Core Jackson abstractions, basic JSON streaming API implementation

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-core/bundles/jackson-core-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar
        • jackson-core-2.4.2.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

In Jackson Core before version 2.8.6 if the REST endpoint consumes POST requests with JSON or XML data and data are invalid, the first unrecognized token is printed to server.log. If the first token is word of length 10MB, the whole word is printed. This is potentially dangerous and can be used to attack the server by filling the disk with logs.

Publish Date: 2018-06-24

URL: WS-2018-0124

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=WS-2018-0124

Release Date: 2018-01-24

Fix Resolution (com.fasterxml.jackson.core:jackson-core): 2.8.6

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.14

Fix Resolution (com.fasterxml.jackson.core:jackson-core): 2.8.6

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0


Step up your Open Source Security Game with Mend here

CVE-2013-7397 (Medium) detected in async-http-client-1.8.14.jar, async-http-client-1.8.5.jar

CVE-2013-7397 - Medium Severity Vulnerability

Vulnerable Libraries - async-http-client-1.8.14.jar, async-http-client-1.8.5.jar

async-http-client-1.8.14.jar

Async Http Client library purpose is to allow Java applications to easily execute HTTP requests and asynchronously process the HTTP responses.

Library home page: http://github.com/AsyncHttpClient/async-http-client

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.ning/async-http-client/1.8.14/e11c597d4b7bf728519f44f7e600685c9f91eaee/async-http-client-1.8.14.jar,/home/wss-scanner/.ivy2/cache/com.ning/async-http-client/jars/async-http-client-1.8.14.jar

Dependency Hierarchy:

  • swagger-async-httpclient_2.11-0.3.5.jar (Root Library)
    • async-http-client-1.8.14.jar (Vulnerable Library)
async-http-client-1.8.5.jar

Async Http Client library purpose is to allow Java applications to easily execute HTTP requests and asynchronously process the HTTP responses.

Library home page: http://github.com/AsyncHttpClient/async-http-client

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/ning/async-http-client/1.8.5/async-http-client-1.8.5.jar

Dependency Hierarchy:

  • jersey-ahc-client-1.0.5.jar (Root Library)
    • async-http-client-1.8.5.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuration, as demonstrated by a configuration that does not send client certificates.

Publish Date: 2015-06-24

URL: CVE-2013-7397

CVSS 3 Score Details (4.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7397

Release Date: 2015-06-24

Fix Resolution: 1.9.0


Step up your Open Source Security Game with Mend here

CVE-2018-12022 (High) detected in multiple libraries

CVE-2018-12022 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.2.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.3.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.0.jar

jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.

Publish Date: 2019-03-21

URL: CVE-2018-12022

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022

Release Date: 2019-03-17

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.6

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.9.6

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.6

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.6

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.0.7

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.6

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.0.0


Step up your Open Source Security Game with Mend here

CVE-2019-14540 (Critical) detected in multiple libraries

CVE-2019-14540 - Critical Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.0.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.2.jar, jackson-databind-2.9.3.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.8.jar, jackson-databind-2.4.5.jar

jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.

Publish Date: 2019-09-15

URL: CVE-2019-14540

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540

Release Date: 2019-09-15

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.2

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.1.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.2

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.10.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.2

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.2

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.5

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11


Step up your Open Source Security Game with Mend here

CVE-2018-12023 (High) detected in multiple libraries

CVE-2018-12023 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.4.2.jar, jackson-databind-2.9.2.jar, jackson-databind-2.4.5.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.0.jar, jackson-databind-2.9.3.jar

jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.

Publish Date: 2019-03-21

URL: CVE-2018-12023

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022

Release Date: 2019-03-17

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.6

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.9.6

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.6

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.0.7

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.6

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.0.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.6

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19


Step up your Open Source Security Game with Mend here

CVE-2020-9488 (Low) detected in log4j-1.2.16.jar

CVE-2020-9488 - Low Severity Vulnerability

Vulnerable Library - log4j-1.2.16.jar

Apache Log4j 1.2

Path to dependency file: /swagger-client/jaxrs-resteasy/pom.xml

Path to vulnerable library: /swagger-client/jaxrs-resteasy/pom.xml,/swagger-client/jaxrs-resteasy-eap/pom.xml

Dependency Hierarchy:

  • slf4j-log4j12-1.6.3.jar (Root Library)
    • log4j-1.2.16.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1

Publish Date: 2020-04-27

URL: CVE-2020-9488

CVSS 3 Score Details (3.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://reload4j.qos.ch/

Release Date: 2020-04-27

Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.3


Step up your Open Source Security Game with Mend here

CVE-2020-36188 (High) detected in multiple libraries

CVE-2020-36188 - High Severity Vulnerability

Vulnerable Libraries - jackson-databind-2.9.2.jar, jackson-databind-2.9.10.5.jar, jackson-databind-2.9.8.jar, jackson-databind-2.4.5.jar, jackson-databind-2.4.2.jar, jackson-databind-2.9.0.jar, jackson-databind-2.9.3.jar, jackson-databind-2.9.4.jar, jackson-databind-2.9.10.4.jar

jackson-databind-2.9.2.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.2.jar

Dependency Hierarchy:

  • jackson-module-scala_2.11-2.9.2.jar (Root Library)
    • jackson-databind-2.9.2.jar (Vulnerable Library)
jackson-databind-2.9.10.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/spring/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10.5/jackson-databind-2.9.10.5.jar

Dependency Hierarchy:

  • spring-boot-starter-web-2.1.16.RELEASE.jar (Root Library)
    • spring-boot-starter-json-2.1.16.RELEASE.jar
      • jackson-databind-2.9.10.5.jar (Vulnerable Library)
jackson-databind-2.9.8.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-akka/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.8.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar

Dependency Hierarchy:

  • swagger-inflector-2.0.0.jar (Root Library)
    • swagger-jaxrs2-2.0.8.jar
      • jackson-databind-2.9.8.jar (Vulnerable Library)
jackson-databind-2.4.5.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar

Dependency Hierarchy:

  • swagger-core-1.5.8.jar (Root Library)
    • jackson-databind-2.4.5.jar (Vulnerable Library)
jackson-databind-2.4.2.jar

General data-binding functionality for Jackson: works on core streaming API

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.4.2.jar

Dependency Hierarchy:

  • http4s-server-metrics_2.11-0.15.12a.jar (Root Library)
    • metrics-json-3.1.4.jar
      • jackson-databind-2.4.2.jar (Vulnerable Library)
jackson-databind-2.9.0.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.0/14fb5f088cc0b0dc90a73ba745bcade4961a3ee3/jackson-databind-2.9.0.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-recorder-2.3.0.jar
      • jackson-databind-2.9.0.jar (Vulnerable Library)
jackson-databind-2.9.3.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /openapi-client/jaxrs-cxf-client/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.3/jackson-databind-2.9.3.jar

Dependency Hierarchy:

  • swagger-jaxrs-1.5.18.jar (Root Library)
    • jackson-databind-2.9.3.jar (Vulnerable Library)
jackson-databind-2.9.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /swagger-client/jaxrs-cxf/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.4/jackson-databind-2.9.4.jar

Dependency Hierarchy:

  • swagger-jaxrs2-2.0.0.jar (Root Library)
    • jackson-databind-2.9.4.jar (Vulnerable Library)
jackson-databind-2.9.10.4.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.10.4.jar

Dependency Hierarchy:

  • json4s-jackson_2.13-3.6.8.jar (Root Library)
    • jackson-databind-2.9.10.4.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource.

Publish Date: 2021-01-06

URL: CVE-2020-36188

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-01-06

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (com.fasterxml.jackson.module:jackson-module-scala_2.11): 2.10.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.0.RELEASE

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger:swagger-inflector): 2.0.5

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.5

Direct dependency fix Resolution (io.swagger:swagger-core): 1.5.11

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.5

Direct dependency fix Resolution (org.http4s:http4s-server-metrics_2.11): 0.18.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger:swagger-jaxrs): 1.5.19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (io.swagger.core.v3:swagger-jaxrs2): 2.1.0

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.10.8

Direct dependency fix Resolution (org.json4s:json4s-jackson_2.13): 3.6.11


Step up your Open Source Security Game with Mend here

CVE-2021-37137 (High) detected in multiple libraries

CVE-2021-37137 - High Severity Vulnerability

Vulnerable Libraries - netty-codec-4.1.63.Final.jar, netty-codec-4.1.30.Final.jar, netty-codec-4.0.51.Final.jar

netty-codec-4.1.63.Final.jar

Library home page: https://netty.io/

Path to dependency file: /swagger-client/kotlin-server/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.63.Final/d4d2fccea88c80e56d59ce1053c53df0f9f4f5db/netty-codec-4.1.63.Final.jar

Dependency Hierarchy:

  • ktor-server-netty-1.5.4.jar (Root Library)
    • netty-codec-http2-4.1.63.Final.jar
      • netty-codec-4.1.63.Final.jar (Vulnerable Library)
netty-codec-4.1.30.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /swagger-client/micronaut/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec/4.1.30.Final/netty-codec-4.1.30.Final.jar

Dependency Hierarchy:

  • micronaut-http-client-1.1.4.jar (Root Library)
    • micronaut-http-netty-1.1.4.jar
      • netty-codec-http-4.1.30.Final.jar
        • netty-codec-4.1.30.Final.jar (Vulnerable Library)
netty-codec-4.0.51.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.0.51.Final/d23fcf04e4e515df86801fb9cbc281c9b4810310/netty-codec-4.0.51.Final.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-app-2.3.0.jar
      • gatling-http-2.3.0.jar
        • async-http-client-2.0.35.jar
          • netty-resolver-dns-2.0.35.jar
            • netty-codec-dns-2.0.35.jar
              • netty-codec-4.0.51.Final.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.

Publish Date: 2021-10-19

URL: CVE-2021-37137

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-9vjp-v76f-g363

Release Date: 2021-10-19

Fix Resolution (io.netty:netty-codec): 4.1.68.Final

Direct dependency fix Resolution (io.ktor:ktor-server-netty): 1.6.5

Fix Resolution (io.netty:netty-codec): 4.1.68.Final

Direct dependency fix Resolution (io.micronaut:micronaut-http-client): 3.0.2

Fix Resolution (io.netty:netty-codec): 4.1.68.Final

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.7.0


Step up your Open Source Security Game with Mend here

CVE-2017-15288 (High) detected in scala-compiler-2.11.0.jar, scala-compiler-2.10.0.jar

CVE-2017-15288 - High Severity Vulnerability

Vulnerable Libraries - scala-compiler-2.11.0.jar, scala-compiler-2.10.0.jar

scala-compiler-2.11.0.jar

Compiler for the Scala Programming Language

Library home page: http://www.scala-lang.org/

Path to dependency file: /swagger-client/scala/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/scala-lang/scala-compiler/2.11.0/scala-compiler-2.11.0.jar

Dependency Hierarchy:

  • swagger-async-httpclient_2.11-0.3.5.jar (Root Library)
    • json4s-jackson_2.11-3.2.10.jar
      • json4s-core_2.11-3.2.10.jar
        • scalap-2.11.0.jar
          • scala-compiler-2.11.0.jar (Vulnerable Library)
scala-compiler-2.10.0.jar

Compiler for the Scala Programming Language

Library home page: http://www.scala-lang.org/

Path to dependency file: /swagger-client/scala/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.scala-lang/scala-compiler/2.10.0/fec8066cd2b4f8dc7ff7ba7a8e0a792939d9f9a/scala-compiler-2.10.0.jar

Dependency Hierarchy:

  • swagger-async-httpclient_2.10-0.3.5.jar (Root Library)
    • json4s-jackson_2.10-3.2.10.jar
      • json4s-core_2.10-3.2.10.jar
        • scalap-2.10.0.jar
          • scala-compiler-2.10.0.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.

Publish Date: 2017-11-15

URL: CVE-2017-15288

CVSS 3 Score Details (7.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-15288

Release Date: 2017-11-15

Fix Resolution: 2.10.7,2.11.12,2.12.4


Step up your Open Source Security Game with Mend here

CVE-2021-21295 (Medium) detected in netty-codec-http-4.1.30.Final.jar, netty-codec-http-4.0.51.Final.jar

CVE-2021-21295 - Medium Severity Vulnerability

Vulnerable Libraries - netty-codec-http-4.1.30.Final.jar, netty-codec-http-4.0.51.Final.jar

netty-codec-http-4.1.30.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /swagger-client/micronaut/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.30.Final/netty-codec-http-4.1.30.Final.jar

Dependency Hierarchy:

  • micronaut-http-client-1.1.4.jar (Root Library)
    • micronaut-http-netty-1.1.4.jar
      • netty-codec-http-4.1.30.Final.jar (Vulnerable Library)
netty-codec-http-4.0.51.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec-http/4.0.51.Final/1c8074c311dd2f1273c722477b232cdb74dcd844/netty-codec-http-4.0.51.Final.jar

Dependency Hierarchy:

  • gatling-charts-highcharts-2.3.0.jar (Root Library)
    • gatling-app-2.3.0.jar
      • gatling-http-2.3.0.jar
        • async-http-client-2.0.35.jar
          • netty-codec-http-4.0.51.Final.jar (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by Http2MultiplexHandler as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (HttpRequest, HttpContent, etc.) via Http2StreamFrameToHttpObjectCodec and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: HTTP2MultiplexCodec or Http2FrameCodec is used, Http2StreamFrameToHttpObjectCodec is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom ChannelInboundHandler that is put in the ChannelPipeline behind Http2StreamFrameToHttpObjectCodec.

Publish Date: 2021-03-09

URL: CVE-2021-21295

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-wm47-8v5p-wjpj

Release Date: 2021-03-09

Fix Resolution (io.netty:netty-codec-http): 4.1.60.Final

Direct dependency fix Resolution (io.micronaut:micronaut-http-client): 2.5.4

Fix Resolution (io.netty:netty-codec-http): 4.1.60.Final

Direct dependency fix Resolution (io.gatling.highcharts:gatling-charts-highcharts): 3.6.0


Step up your Open Source Security Game with Mend here

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.