ghuangsnl / spring-boot

Spring Boot
https://spring.io/projects/spring-boot
Apache License 2.0
0 stars 0 forks source link

CVE-2023-34623 (High) detected in jtidy-r938.jar #262

Open mend-bolt-for-github[bot] opened 7 months ago

mend-bolt-for-github[bot] commented 7 months ago

CVE-2023-34623 - High Severity Vulnerability

Vulnerable Library - jtidy-r938.jar

JTidy is a Java port of HTML Tidy, a HTML syntax checker and pretty printer. Like its non-Java cousin, JTidy can be used as a tool for cleaning up malformed and faulty HTML. In addition, JTidy provides a DOM interface to the document that is being processed, which effectively makes you able to use JTidy as a DOM parser for real-world HTML.

Library home page: http://jtidy.sourceforge.net

Path to vulnerable library: /spring-boot-project/spring-boot-dependencies/build/local-m2-repository/net/sf/jtidy/jtidy/r938/jtidy-r938.jar

Dependency Hierarchy: - :x: **jtidy-r938.jar** (Vulnerable Library)

Found in HEAD commit: 275c27d9dd5c88d8db426ebfb734d89d3f8e7412

Found in base branch: master

Vulnerability Details

An issue was discovered jtidy thru r938 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.

Publish Date: 2023-06-14

URL: CVE-2023-34623

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2023-06-14

Fix Resolution: com.github.jtidy:jtidy:1.0.4


Step up your Open Source Security Game with Mend here