*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS.
Vulnerable Library - webgoat-server-v8.1.0.jar
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar
Found in HEAD commit: fbca9ba603e60373d9b92714517262109b92e2bc
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2019-0490
### Vulnerable Library - jcommander-1.35.jarA Java framework to parse command line options with annotations.
Library home page: http://beust.com/
Path to dependency file: /webgoat-integration-tests/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar
Dependency Hierarchy: - webgoat-server-v8.1.0.jar (Root Library) - webgoat-container-v8.1.0.jar - asciidoctorj-1.5.8.1.jar - :x: **jcommander-1.35.jar** (Vulnerable Library)
Found in HEAD commit: fbca9ba603e60373d9b92714517262109b92e2bc
Found in base branch: master
### Reachability AnalysisThe vulnerable code is not reachable.
### Vulnerability DetailsInclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS.
Publish Date: 2019-02-19
URL: WS-2019-0490
### CVSS 3 Score Details (8.1)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2019-02-19
Fix Resolution: com.beust:jcommander:1.75