KouShenhai / KCloud-Platform-IoT

KCloud-Platform-IoT(阻塞式)(老寇IoT云平台)是一个企业级微服务架构的IoT云平台。采用DDD(领域驱动设计)思想,基于Spring Boot 3.4.0、Spring Cloud 2024.0.0、Spring Cloud Alibaba 2023.0.1.3 最新版本开发的云服务多租户IoT平台,家人们,点个star!拜托啦~
https://koushenhai.github.io/KCloud-Platform-IoT
Apache License 2.0
472 stars 120 forks source link

snail-job-server-web-1.2.0.jar: 1 vulnerabilities (highest severity is: 7.5) #2910

Closed mend-bolt-for-github[bot] closed 16 hours ago

mend-bolt-for-github[bot] commented 17 hours ago
Vulnerable Library - snail-job-server-web-1.2.0.jar

Path to dependency file: /laokou-cloud/laokou-snail-job/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/typesafe/akka/akka-actor_2.13/2.6.21/akka-actor_2.13-2.6.21.jar,/laokou-cloud/laokou-snail-job/pom.xml

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (snail-job-server-web version) Remediation Possible**
CVE-2023-31442 High 7.5 akka-actor_2.13-2.6.21.jar Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-31442 ### Vulnerable Library - akka-actor_2.13-2.6.21.jar

Akka is a toolkit for building highly concurrent, distributed, and resilient message-driven applications for Java and Scala.

Library home page: https://www.lightbend.com

Path to dependency file: /laokou-cloud/laokou-snail-job/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/typesafe/akka/akka-actor_2.13/2.6.21/akka-actor_2.13-2.6.21.jar,/laokou-cloud/laokou-snail-job/pom.xml

Dependency Hierarchy: - snail-job-server-web-1.2.0.jar (Root Library) - snail-job-server-common-1.2.0.jar - akka-actor-typed_2.13-2.6.21.jar - :x: **akka-actor_2.13-2.6.21.jar** (Vulnerable Library)

Found in base branch: master

### Vulnerability Details

In Lightbend Akka before 2.8.1, the async-dns resolver (used by Discovery in DNS mode and transitively by Cluster Bootstrap) uses predictable DNS transaction IDs when resolving DNS records, making DNS resolution subject to poisoning by an attacker. If the application performing discovery does not validate (e.g., via TLS) the authenticity of the discovered service, this may result in exfiltration of application data (e.g., persistence events may be published to an unintended Kafka broker). If such validation is performed, then the poisoning constitutes a denial of access to the intended service. This affects Akka 2.5.14 through 2.8.0, and Akka Discovery through 2.8.0.

Publish Date: 2023-05-11

URL: CVE-2023-31442

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-31442

Release Date: 2023-05-11

Fix Resolution: com.typesafe.akka:akka-actor:2.8.1

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)