SimaTankSAAS / nifi-1.4.0

Apache License 2.0
0 stars 1 forks source link

commons-collections4-4.0.jar: 1 vulnerabilities (highest severity is: 9.8) #75

Open mend-for-github-com[bot] opened 8 months ago

mend-for-github-com[bot] commented 8 months ago
Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://www.apache.org/

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-security/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Found in HEAD commit: 0707e245fb382da58db8bb8ec5ccff5d9ae55c39

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (commons-collections4 version) Remediation Possible**
CVE-2015-7501 Critical 9.8 commons-collections4-4.0.jar Direct 4.1

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2015-7501 ### Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://www.apache.org/

Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-web/nifi-web-security/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Dependency Hierarchy: - :x: **commons-collections4-4.0.jar** (Vulnerable Library)

Found in HEAD commit: 0707e245fb382da58db8bb8ec5ccff5d9ae55c39

Found in base branch: master

### Vulnerability Details

Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Publish Date: 2017-11-09

URL: CVE-2015-7501

### CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1279330

Release Date: 2017-11-09

Fix Resolution: 4.1

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.