dmyers87 / camunda-message-streaming

Allows BPMN designers to declaratively define what values, from an incoming JSON based message, will be used to correlate to a Process or a Process Instance (e.g. Execution)
Apache License 2.0
0 stars 0 forks source link

CVE-2019-14900 (Medium) detected in hibernate-core-5.4.12.Final.jar #5

Open mend-for-github-com[bot] opened 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2019-14900 - Medium Severity Vulnerability

Vulnerable Library - hibernate-core-5.4.12.Final.jar

Hibernate's core ORM functionality

Library home page: http://hibernate.org

Path to dependency file: /messaging/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/hibernate/hibernate-core/5.4.12.Final/hibernate-core-5.4.12.Final.jar,/home/wss-scanner/.m2/repository/org/hibernate/hibernate-core/5.4.12.Final/hibernate-core-5.4.12.Final.jar,/home/wss-scanner/.m2/repository/org/hibernate/hibernate-core/5.4.12.Final/hibernate-core-5.4.12.Final.jar

Dependency Hierarchy: - camunda-message-streaming-0.6.8-SNAPSHOT.jar (Root Library) - spring-boot-starter-data-jpa-2.2.5.RELEASE.jar - :x: **hibernate-core-5.4.12.Final.jar** (Vulnerable Library)

Found in HEAD commit: 41e27a1fe9f0949f331a284bafd06fdaefba62e0

Found in base branch: develop

Vulnerability Details

A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

Publish Date: 2020-07-06

URL: CVE-2019-14900

CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14900

Release Date: 2020-07-06

Fix Resolution: org.hibernate:hibernate-core:5.4.18.Final