interserver / mailbaby-api-samples

API Samples for MailBaby
MIT License
1 stars 1 forks source link

CVE-2023-46122 (High) detected in io_2.13-1.6.0.jar - autoclosed #361

Closed mend-bolt-for-github[bot] closed 5 months ago

mend-bolt-for-github[bot] commented 7 months ago

CVE-2023-46122 - High Severity Vulnerability

Vulnerable Library - io_2.13-1.6.0.jar

IO module for sbt

Path to dependency file: /openapi-client/scala-gatling/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.scala-sbt/io_2.13/1.6.0/bed648d37cb5d63e672219e50576af18d540bb79/io_2.13-1.6.0.jar

Dependency Hierarchy: - zinc_2.13-1.6.1.jar (Root Library) - zinc-compile-core_2.13-1.6.1.jar - :x: **io_2.13-1.6.0.jar** (Vulnerable Library)

Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c

Found in base branch: master

Vulnerability Details

sbt is a build tool for Scala, Java, and others. Given a specially crafted zip or JAR file, `IO.unzip` allows writing of arbitrary file. This would have potential to overwrite `/root/.ssh/authorized_keys`. Within sbt's main code, `IO.unzip` is used in `pullRemoteCache` task and `Resolvers.remote`; however many projects use `IO.unzip(...)` directly to implement custom tasks. This vulnerability has been patched in version 1.9.7.

Publish Date: 2023-10-23

URL: CVE-2023-46122

CVSS 3 Score Details (7.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-46122

Release Date: 2023-10-23

Fix Resolution (org.scala-sbt:io_2.13): 1.9.7

Direct dependency fix Resolution (org.scala-sbt:zinc_2.13): 1.9.6


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 5 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.