A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.
Vulnerable Library - okhttp-3.12.1.jar
An HTTP+HTTP/2 client for Android and Java applications
Library home page: https://github.com/square/okhttp
Path to dependency file: /EmbedSingularityExample/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/squareup/okhttp3/okhttp/3.12.1/okhttp-3.12.1.jar
Vulnerabilities
Reachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-0833
### Vulnerable Library - okhttp-3.12.1.jarAn HTTP+HTTP/2 client for Android and Java applications
Library home page: https://github.com/square/okhttp
Path to dependency file: /EmbedSingularityExample/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/squareup/okhttp3/okhttp/3.12.1/okhttp-3.12.1.jar
Dependency Hierarchy: - :x: **okhttp-3.12.1.jar** (Vulnerable Library)
Found in base branch: master
### Reachability Analysis This vulnerability is potentially reachable ``` com.hubspot.singularity.scheduler.SingularityHealthchecker (Application) -> okhttp3.RealCall (Extension) -> okhttp3.internal.cache.CacheInterceptor (Extension) -> ❌ okhttp3.internal.cache.CacheInterceptor$1 (Vulnerable Component) ``` ### Vulnerability DetailsA flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.
Publish Date: 2023-09-27
URL: CVE-2023-0833
### Threat AssessmentExploit Maturity: Not Defined
EPSS: 0.0%
### CVSS 3 Score Details (4.7)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2023-09-27
Fix Resolution: 4.9.2
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.