SmartBear / ready-jira-plugin

Provides ReadyAPI - Jira integration based on Jira rest API
4 stars 7 forks source link

CVE-2021-31684 (High) detected in json-smart-2.4.2.jar - autoclosed #170

Closed mend-for-github-com[bot] closed 2 years ago

mend-for-github-com[bot] commented 3 years ago

CVE-2021-31684 - High Severity Vulnerability

Vulnerable Library - json-smart-2.4.2.jar

JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.

Library home page: https://urielch.github.io/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/net/minidev/json-smart/2.4.2/json-smart-2.4.2.jar

Dependency Hierarchy: - ready-api-soapui-ng-3.8.1.jar (Root Library) - ready-api-security-3.8.1.jar - ready-api-core-3.8.1.jar - :x: **json-smart-2.4.2.jar** (Vulnerable Library)

Found in HEAD commit: a834837c98361a3f555adaf04830435cba57bcea

Found in base branch: master

Vulnerability Details

A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions 1.3 and 2.4 which causes a denial of service (DOS) via a crafted web request.

Publish Date: 2021-06-01

URL: CVE-2021-31684

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31684

Release Date: 2021-06-01

Fix Resolution: net.minidev:json-smart:1.3.3,2.4.5

mend-for-github-com[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.