billmcchesney1 / singleton

A service that provides support for Software Internationalization and Localization
Other
0 stars 0 forks source link

WS-2019-0490 (High) detected in jcommander-1.35.jar - autoclosed #16

Closed mend-for-github-com[bot] closed 6 months ago

mend-for-github-com[bot] commented 3 years ago

WS-2019-0490 - High Severity Vulnerability

Vulnerable Library - jcommander-1.35.jar

A Java framework to parse command line options with annotations.

Library home page: http://beust.com/

Path to dependency file: /g11n-ws/vip-manager-lite-i18n/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.beust/jcommander/1.35/47592e181b0bdbbeb63029e08c5e74f6803c4edd/jcommander-1.35.jar

Dependency Hierarchy: - asciidoctorj-1.5.6.jar (Root Library) - :x: **jcommander-1.35.jar** (Vulnerable Library)

Found in HEAD commit: 2bb883ae0b199f3e432621e91d0f801cfc406a89

Found in base branch: master

Vulnerability Details

Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS.

Publish Date: 2019-02-19

URL: WS-2019-0490

CVSS 3 Score Details (8.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-02-19

Fix Resolution (com.beust:jcommander): 1.75

Direct dependency fix Resolution (org.asciidoctor:asciidoctorj): 2.3.1


:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

mend-for-github-com[bot] commented 1 year ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.

mend-for-github-com[bot] commented 6 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.