LynRodWS / alcor

Cloud native SDN platform powered by Kubernetes and Istio
MIT License
0 stars 0 forks source link

CVE-2020-5421 (Medium) detected in multiple libraries #305

Open mend-for-github-com[bot] opened 1 year ago

mend-for-github-com[bot] commented 1 year ago

CVE-2020-5421 - Medium Severity Vulnerability

Vulnerable Libraries - spring-web-5.2.7.RELEASE.jar, spring-web-5.2.4.RELEASE.jar, spring-web-5.2.5.RELEASE.jar, spring-web-5.1.8.RELEASE.jar, spring-web-5.2.6.RELEASE.jar

spring-web-5.2.7.RELEASE.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /services/network_acl_manager/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.7.RELEASE/spring-web-5.2.7.RELEASE.jar

Dependency Hierarchy: - spring-boot-starter-web-2.3.1.RELEASE.jar (Root Library) - :x: **spring-web-5.2.7.RELEASE.jar** (Vulnerable Library)

spring-web-5.2.4.RELEASE.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /services/route_manager/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.4.RELEASE/spring-web-5.2.4.RELEASE.jar

Dependency Hierarchy: - spring-boot-starter-web-2.2.5.RELEASE.jar (Root Library) - :x: **spring-web-5.2.4.RELEASE.jar** (Vulnerable Library)

spring-web-5.2.5.RELEASE.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /services/subnet_manager/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar

Dependency Hierarchy: - spring-boot-starter-web-2.2.6.RELEASE.jar (Root Library) - :x: **spring-web-5.2.5.RELEASE.jar** (Vulnerable Library)

spring-web-5.1.8.RELEASE.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /services/vpc_manager/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.8.RELEASE/spring-web-5.1.8.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.8.RELEASE/spring-web-5.1.8.RELEASE.jar

Dependency Hierarchy: - spring-boot-starter-web-2.1.6.RELEASE.jar (Root Library) - :x: **spring-web-5.1.8.RELEASE.jar** (Vulnerable Library)

spring-web-5.2.6.RELEASE.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /services/security_group_manager/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar

Dependency Hierarchy: - spring-boot-starter-web-2.3.0.RELEASE.jar (Root Library) - :x: **spring-web-5.2.6.RELEASE.jar** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.

Publish Date: 2020-09-19

URL: CVE-2020-5421

CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://tanzu.vmware.com/security/cve-2020-5421

Release Date: 2020-09-19

Fix Resolution (org.springframework:spring-web): 5.2.9.RELEASE

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.3.4.RELEASE

Fix Resolution (org.springframework:spring-web): 5.2.9.RELEASE

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.10.RELEASE

Fix Resolution (org.springframework:spring-web): 5.2.9.RELEASE

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.2.10.RELEASE

Fix Resolution (org.springframework:spring-web): 5.1.18.RELEASE

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.17.RELEASE

Fix Resolution (org.springframework:spring-web): 5.2.9.RELEASE

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.3.4.RELEASE