Dima2021 / WebGoat_8.1.0

Other
0 stars 0 forks source link

webgoat-server-v8.1.0.jar: 1 vulnerabilities (highest severity is: 8.1) non-reachable #10

Open mend-for-github-com[bot] opened 1 year ago

mend-for-github-com[bot] commented 1 year ago
Vulnerable Library - webgoat-server-v8.1.0.jar

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar

Found in HEAD commit: fbca9ba603e60373d9b92714517262109b92e2bc

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (webgoat-server-v8.1.0.jar version) Remediation Possible** Reachability
WS-2019-0490 High 8.1 jcommander-1.35.jar Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

WS-2019-0490 ### Vulnerable Library - jcommander-1.35.jar

A Java framework to parse command line options with annotations.

Library home page: http://beust.com/

Path to dependency file: /webgoat-integration-tests/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar

Dependency Hierarchy: - webgoat-server-v8.1.0.jar (Root Library) - webgoat-container-v8.1.0.jar - asciidoctorj-1.5.8.1.jar - :x: **jcommander-1.35.jar** (Vulnerable Library)

Found in HEAD commit: fbca9ba603e60373d9b92714517262109b92e2bc

Found in base branch: master

### Reachability Analysis

The vulnerable code is not reachable.

### Vulnerability Details

Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS.

Publish Date: 2019-02-19

URL: WS-2019-0490

### CVSS 3 Score Details (8.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2019-02-19

Fix Resolution: com.beust:jcommander:1.75