berez23 / daf

Data & Analytics Framework (DAF)
BSD 3-Clause "New" or "Revised" License
0 stars 0 forks source link

CVE-2022-45685 (High) detected in jettison-1.1.jar #188

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2022-45685 - High Severity Vulnerability

Vulnerable Library - jettison-1.1.jar

A StAX implementation for JSON.

Path to vulnerable library: /root/.ivy2/cache/org.codehaus.jettison/jettison/bundles/jettison-1.1.jar

Dependency Hierarchy: - hadoop-yarn-server-web-proxy-2.6.0-cdh5.12.0.jar (Root Library) - hadoop-yarn-server-common-2.6.0-cdh5.12.0.jar - hadoop-yarn-common-2.6.0-cdh5.12.0.jar - jersey-json-1.9.jar - :x: **jettison-1.1.jar** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.

Publish Date: 2022-12-13

URL: CVE-2022-45685

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2022-12-13

Fix Resolution (org.codehaus.jettison:jettison): 1.5.2

Direct dependency fix Resolution (org.apache.hadoop:hadoop-yarn-server-web-proxy): 2.6.1


Step up your Open Source Security Game with Mend here