amaybaum-dev / verademo

A deliberately insecure Java web application
MIT License
0 stars 3 forks source link

commons-collections4-4.0.jar: 3 vulnerabilities (highest severity is: 9.8) unreachable #14

Open dev-mend-for-github-com[bot] opened 1 year ago

dev-mend-for-github-com[bot] commented 1 year ago
Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://commons.apache.org/proper/commons-collections/

Path to dependency file: /app/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (commons-collections4 version) Remediation Possible** Reachability
CVE-2015-7501 Critical 9.8 commons-collections4-4.0.jar Direct 4.1

Unreachable

CVE-2015-4852 Critical 9.8 commons-collections4-4.0.jar Direct 4.1

Unreachable

CVE-2015-6420 High 7.3 commons-collections4-4.0.jar Direct 4.1

Unreachable

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2015-7501 ### Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://commons.apache.org/proper/commons-collections/

Path to dependency file: /app/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Dependency Hierarchy: - :x: **commons-collections4-4.0.jar** (Vulnerable Library)

Found in base branch: main

### Reachability Analysis

The vulnerable code is unreachable

### Vulnerability Details

Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Publish Date: 2017-11-09

URL: CVE-2015-7501

### CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1279330

Release Date: 2017-11-09

Fix Resolution: 4.1

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.
CVE-2015-4852 ### Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://commons.apache.org/proper/commons-collections/

Path to dependency file: /app/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Dependency Hierarchy: - :x: **commons-collections4-4.0.jar** (Vulnerable Library)

Found in base branch: main

### Reachability Analysis

The vulnerable code is unreachable

### Vulnerability Details

The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.

Publish Date: 2015-11-18

URL: CVE-2015-4852

### CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.openwall.com/lists/oss-security/2015/11/17/19

Release Date: 2015-11-18

Fix Resolution: 4.1

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.
CVE-2015-6420 ### Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://commons.apache.org/proper/commons-collections/

Path to dependency file: /app/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Dependency Hierarchy: - :x: **commons-collections4-4.0.jar** (Vulnerable Library)

Found in base branch: main

### Reachability Analysis

The vulnerable code is unreachable

### Vulnerability Details

Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Publish Date: 2015-12-15

URL: CVE-2015-6420

### CVSS 3 Score Details (7.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2015-12-15

Fix Resolution: 4.1

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.