Closed mend-bolt-for-github[bot] closed 3 years ago
This issue/pull request has been marked as needs attention
as it has been left pending without new activity for 4 days. Tagging @shalakadharap @amitwac2608 @nileshgovande for appropriate assignment. Sorry for the delay & Thank you for contributing to CORTX. We will get back to you as soon as possible.
WS-2017-3734 - Medium Severity Vulnerability
Vulnerable Library - httpclient-4.5.2.jar
Apache HttpComponents Client
Path to dependency file: cortx-s3server/auth-utils/jclient/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.2/httpclient-4.5.2.jar
Dependency Hierarchy: - aws-java-sdk-s3-1.11.37.jar (Root Library) - aws-java-sdk-core-1.11.37.jar - :x: **httpclient-4.5.2.jar** (Vulnerable Library)
Found in HEAD commit: fde64200b4f94603ae17220b98da6422a531445e
Found in base branch: main
Vulnerability Details
Apache httpclient before 4.5.3 are vulnerable to Directory Traversal. The user-provided path was able to override the specified host, resulting in giving network access to a sensitive environment.
Publish Date: 2017-01-21
URL: WS-2017-3734
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://issues.apache.org/jira/browse/HTTPCLIENT-1803
Release Date: 2017-01-21
Fix Resolution: org.apache.httpcomponents:httpclient:4.5.3
Step up your Open Source Security Game with WhiteSource here