jgeraigery / Singularity-4567321

Scheduler (HTTP API and webapp) for running Mesos tasks—long running processes, one-off tasks, and scheduled jobs. #hubspot-open-source
http://getsingularity.com/
Apache License 2.0
0 stars 0 forks source link

okhttp-3.12.1.jar: 1 vulnerabilities (highest severity is: 4.7) reachable #252

Open mend-for-github-com[bot] opened 4 months ago

mend-for-github-com[bot] commented 4 months ago
Vulnerable Library - okhttp-3.12.1.jar

An HTTP+HTTP/2 client for Android and Java applications

Library home page: https://github.com/square/okhttp

Path to dependency file: /EmbedSingularityExample/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/squareup/okhttp3/okhttp/3.12.1/okhttp-3.12.1.jar

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (okhttp version) Remediation Possible** Reachability
CVE-2023-0833 Medium 4.7 Not Defined 0.0% okhttp-3.12.1.jar Direct 4.9.2

Reachable

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-0833 ### Vulnerable Library - okhttp-3.12.1.jar

An HTTP+HTTP/2 client for Android and Java applications

Library home page: https://github.com/square/okhttp

Path to dependency file: /EmbedSingularityExample/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/squareup/okhttp3/okhttp/3.12.1/okhttp-3.12.1.jar

Dependency Hierarchy: - :x: **okhttp-3.12.1.jar** (Vulnerable Library)

Found in base branch: master

### Reachability Analysis This vulnerability is potentially reachable ``` com.hubspot.singularity.scheduler.SingularityHealthchecker (Application) -> okhttp3.RealCall (Extension) -> okhttp3.internal.cache.CacheInterceptor (Extension) -> ❌ okhttp3.internal.cache.CacheInterceptor$1 (Vulnerable Component) ```

### Vulnerability Details

A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.

Publish Date: 2023-09-27

URL: CVE-2023-0833

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.0%

### CVSS 3 Score Details (4.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2023-09-27

Fix Resolution: 4.9.2

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.