ghc-automation-staging-parallel-4-p1 / 3429894_423

0 stars 0 forks source link

CVE-2020-9488 (Low) detected in log4j-core-2.8.2.jar - autoclosed #4

Closed staging-whitesource-for-github-com[bot] closed 15 hours ago

staging-whitesource-for-github-com[bot] commented 16 hours ago

CVE-2020-9488 - Low Severity Vulnerability

Vulnerable Library - log4j-core-2.8.2.jar

The Apache Log4j Implementation

Library home page: https://logging.apache.org/log4j/2.x/log4j-core/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/logging/log4j/log4j-core/2.8.2/log4j-core-2.8.2.jar

Dependency Hierarchy: - :x: **log4j-core-2.8.2.jar** (Vulnerable Library)

Found in HEAD commit: 5bc6fe48e5aaed9f06a3b0f912fd63a40cb2eda7

Found in base branch: main

Vulnerability Details

Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1

Publish Date: 2020-04-27

URL: CVE-2020-9488

CVSS 3 Score Details (3.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://reload4j.qos.ch/

Release Date: 2020-04-27

Fix Resolution: 2.12.2


:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

staging-whitesource-for-github-com[bot] commented 15 hours ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.