SmartBear / ready-jira-plugin

Provides ReadyAPI - Jira integration based on Jira rest API
4 stars 7 forks source link

WS-2019-0509 (Medium) detected in bcprov-jdk15on-1.46.jar, bcprov-jdk14-138.jar - autoclosed #160

Closed mend-for-github-com[bot] closed 3 years ago

mend-for-github-com[bot] commented 3 years ago

WS-2019-0509 - Medium Severity Vulnerability

Vulnerable Libraries - bcprov-jdk15on-1.46.jar, bcprov-jdk14-138.jar

bcprov-jdk15on-1.46.jar

The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.7.

Library home page: http://www.bouncycastle.org/java.html

Path to dependency file: ready-jira-plugin/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.46/bcprov-jdk15on-1.46.jar

Dependency Hierarchy: - ready-api-soapui-pro-3.5.0.jar (Root Library) - bctsp-jdk15on-1.46.jar - :x: **bcprov-jdk15on-1.46.jar** (Vulnerable Library)

bcprov-jdk14-138.jar

The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. The package is organised so that it contains a light-weight API suitable for use in any environment (including the newly released J2ME) with the additional infrastructure to conform the algorithms to the JCE framework.

Library home page: http://www.bouncycastle.org/java.html

Path to dependency file: ready-jira-plugin/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk14/1.38/bcprov-jdk14-1.38.jar,/home/wss-scanner/.m2/repository/bouncycastle/bcprov-jdk14/138/bcprov-jdk14-138.jar

Dependency Hierarchy: - ready-api-soapui-pro-3.5.0.jar (Root Library) - flying-saucer-pdf-9.0.7.jar - itext-2.1.7.jar - bctsp-jdk14-1.38.jar - :x: **bcprov-jdk14-138.jar** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Bouncy Castle through 1.68 is vulnerable to Denial of Service (DoS). The Dump.class file utilizes the FileInputStream object when reading from user-provided files, but doesn't close these streams properly.

Publish Date: 2019-12-24

URL: WS-2019-0509

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

mend-for-github-com[bot] commented 3 years ago

:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.