-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Description
Vulnerable Library - kerb-admin-2.0.3.jar
Path to dependency file: /test/fixtures/hdfs-fixture/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jline/jline/3.22.0/512dde71f1ba9cb87f318e4e1e3acc77dc67a712/jline-3.22.0.jar
Found in HEAD commit: cc98dbe411df77b04e82507b3d29e90e54bc87d3
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (kerb-admin version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2023-5685 | 7.5 | xnio-api-3.8.8.Final.jar | Transitive | N/A* | ❌ | |
| CVE-2023-50572 | 5.5 | jline-3.22.0.jar | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-5685
Vulnerable Library - xnio-api-3.8.8.Final.jar
The API JAR of the XNIO project
Library home page: http://www.jboss.org/xnio
Path to dependency file: /test/fixtures/hdfs-fixture/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jboss.xnio/xnio-api/3.8.8.Final/1ba9c8b9a8dea1c6cd656155943e6d4c2c631fa7/xnio-api-3.8.8.Final.jar
Dependency Hierarchy:
- kerb-admin-2.0.3.jar (Root Library)
- ❌ xnio-api-3.8.8.Final.jar (Vulnerable Library)
Found in HEAD commit: cc98dbe411df77b04e82507b3d29e90e54bc87d3
Found in base branch: main
Vulnerability Details
A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).
Publish Date: 2024-03-22
URL: CVE-2023-5685
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
CVE-2023-50572
Vulnerable Library - jline-3.22.0.jar
Path to dependency file: /test/fixtures/hdfs-fixture/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jline/jline/3.22.0/512dde71f1ba9cb87f318e4e1e3acc77dc67a712/jline-3.22.0.jar
Dependency Hierarchy:
- kerb-admin-2.0.3.jar (Root Library)
- ❌ jline-3.22.0.jar (Vulnerable Library)
Found in HEAD commit: cc98dbe411df77b04e82507b3d29e90e54bc87d3
Found in base branch: main
Vulnerability Details
An issue in the component GroovyEngine.execute of jline-groovy v3.24.1 allows attackers to cause an OOM (OutofMemory) error.
Publish Date: 2023-12-29
URL: CVE-2023-50572
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2023-12-29
Fix Resolution: org.jline:jline-console:3.25.0,org.jline:jline:3.25.0
Metadata
Metadata
Assignees
Labels
Type
Projects
Status