The scope of this CVE affected version is [,4.5.13)
After further analysis, in this project, the main Api called is <org.apache.http.client.utils.URIUtils: org.apache.http.HttpHost extractHost(java.net.URI)>
<org.apache.http.client.utils.URIUtils: org.apache.http.HttpHost extractHost(java.net.URI)>
at <org.apache.http.impl.client.DecompressingHttpClient: org.apache.http.HttpHost getHttpHost(org.apache.http.client.methods.HttpUriRequest)> (org.apache.http.impl.client.DecompressingHttpClient.java:[137]) in /.m2/repository/org/apache/httpcomponents/httpclient/4.5.10/httpclient-4.5.10.jar
at <org.apache.http.impl.client.DecompressingHttpClient: java.lang.Object execute(org.apache.http.client.methods.HttpUriRequest,org.apache.http.client.ResponseHandler)> (org.apache.http.impl.client.DecompressingHttpClient.java:[192]) in /.m2/repository/org/apache/httpcomponents/httpclient/4.5.10/httpclient-4.5.10.jar
at <com.espertech.esperio.http.EsperIOHTTPUpdateListener: void processEvent(com.espertech.esper.common.client.EventBean)> (com.espertech.esperio.http.EsperIOHTTPUpdateListener.java:[105]) in /detect/unzip/esper-release_8.7.0/esperio/esperio-http/target/classes
at <com.espertech.esperio.http.EsperIOHTTPUpdateListener: void update(com.espertech.esper.common.client.EventBean[],com.espertech.esper.common.client.EventBean[],com.espertech.esper.runtime.client.EPStatement,com.espertech.esper.runtime.client.EPRuntime)> (com.espertech.esperio.http.EsperIOHTTPUpdateListener.java:[72]) in /detect/unzip/esper-release_8.7.0/esperio/esperio-http/target/classes
Hi, In esper-release_8.7.0/esperio/esperio-http,there is a dependency org.apache.httpcomponents:httpclient:4.5.10 that calls the risk method.
CVE-2020-13956
The scope of this CVE affected version is [,4.5.13)
After further analysis, in this project, the main Api called is <org.apache.http.client.utils.URIUtils: org.apache.http.HttpHost extractHost(java.net.URI)>
Risk method repair link : GitHub
CVE Bug Invocation Path--
Path Length : 5
Dependency tree--
Suggested solutions:
Update dependency version to 4.5.13 or higher
Thank you very much.