Path to dependency file: /services/network_config_manager/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar
Uncontrolled Resource Consumption vulnerability in Apache Commons IO.
The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.
This issue affects Apache Commons IO: from 2.0 before 2.14.0.
Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.
CVE-2024-47554 - High Severity Vulnerability
Vulnerable Library - commons-io-2.4.jar
The Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.
Library home page: http://www.apache.org/
Path to dependency file: /services/network_config_manager/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar,/home/wss-scanner/.m2/repository/commons-io/commons-io/2.4/commons-io-2.4.jar
Dependency Hierarchy: - redis-mock-0.1.6.jar (Root Library) - embedded-redis-0.6.jar - :x: **commons-io-2.4.jar** (Vulnerable Library)
Found in HEAD commit: 3c4e28556738e020da91fd03c3aaa5d9a7c1cfed
Found in base branch: master
Vulnerability Details
Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.
Publish Date: 2024-10-03
URL: CVE-2024-47554
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1
Release Date: 2024-10-03
Fix Resolution: commons-io:commons-io:2.14.0