VivekBuzruk / Hygieia

CapitalOne DevOps Dashboard
http://hygieia.github.io/Hygieia
Apache License 2.0
0 stars 0 forks source link

CVE-2020-5405 (Medium) detected in spring-cloud-config-client-1.3.1.RELEASE.jar - autoclosed #97

Closed mend-bolt-for-github[bot] closed 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2020-5405 - Medium Severity Vulnerability

Vulnerable Library - spring-cloud-config-client-1.3.1.RELEASE.jar

This project is a Spring configuration client.

Library home page: https://spring.io

Path to dependency file: Hygieia/UI-tests/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/cloud/spring-cloud-config-client/1.3.1.RELEASE/spring-cloud-config-client-1.3.1.RELEASE.jar

Dependency Hierarchy: - core-3.1.5.jar (Root Library) - spring-cloud-starter-config-1.3.1.RELEASE.jar - :x: **spring-cloud-config-client-1.3.1.RELEASE.jar** (Vulnerable Library)

Found in HEAD commit: 3c4f119e4343cf7fa276bb4756361b926902248e

Found in base branch: master

Vulnerability Details

Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.

Publish Date: 2020-03-05

URL: CVE-2020-5405

CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5405

Release Date: 2020-03-05

Fix Resolution: org.springframework.cloud:spring-cloud-config-client:2.1.7.RELEASE,2.2.2.RELEASE;org.springframework.cloud:spring-cloud-config-server:2.1.7.RELEASE,2.2.2.RELEASE


Step up your Open Source Security Game with WhiteSource here

mend-bolt-for-github[bot] commented 3 years ago

:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.