joeyfrog / hooktest

0 stars 0 forks source link

[XRAY] Vulnerability in artifact(s): multi3-3.7-20200212.142315-3.war #95

Open joeyfrog opened 4 years ago

joeyfrog commented 4 years ago

This is an automated issue made via XRAY Github webhook. The deployed artifact(s): multi3-3.7-20200212.142315-3.war Contain the following vaulnerable dependencie(s): commons-email-1.1.jar spring-beans-2.5.6.jar spring-core-2.5.6.jar commons-io-1.4.jar plexus-utils-1.5.1.jar mysql-connector-java-8.0.11.jar mysql-connector-java-8.0.12.jar

Here is the sent JSON from XRAY: [ { "created": "2019-05-05T20:09:26.621Z", "cve": "CVE-2019-2692", "description": "Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "mysql:mysql-connector-java:8.0.12", "name": "mysql-connector-java-8.0.12.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "5b09edb8700512a526eb109c308e9e752d9eb3d915f6b1d33bdbdb9707ed8799" }, { "depth": 0, "display_name": "mysql:mysql-connector-java:8.0.11", "name": "mysql-connector-java-8.0.11.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "0cbe25eb4b4e7a38f52374a46283fc2381c68870581651925db752000c0d053d" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "Low", "summary": "Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "type": "security" }, { "created": "2017-07-05T11:31:13.178Z", "cve": "CVE-2011-2730", "description": "VMware SpringSource Spring Framework before 2.5.6.SEC03, 2.5.7.SR023, and 3.x before 3.0.6, when a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attribute in a (b) spring:bind or (c) spring:nestedpath tag; (3) arguments, (4) code, (5) text, (6) var, (7) scope, or (8) message attribute in a (d) spring:message or (e) spring:theme tag; or (9) var, (10) scope, or (11) value attribute in a (f) spring:transform tag, aka \"Expression Language Injection.\"", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "org.springframework:spring-core:2.5.6", "name": "spring-core-2.5.6.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "cf37656069488043c47f49a5520bb06d6879b63ef6044abb200c51a7ff2d6c49" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "High", "summary": "VMware SpringSource Spring Framework before 2.5.6.SEC03, 2.5.7.SR023, and 3.x before 3.0.6, when a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attribute in a (b) spring:bind or (c) spring:nestedpath tag; (3) arguments, (4) code, (5) text, (6) var, (7) scope, or (8) message attribute in a (d) spring:message or (e) spring:theme tag; or (9) var, (10) scope, or (11) value attribute in a (f) spring:transform tag, aka \"Expression Language Injection.\"", "type": "security" }, { "created": "2019-05-02T14:45:39.455Z", "description": "Apache Maven contains a flaw in org.apache.maven.shared.utils.Expand that allows traversing outside of a restricted path. The issue is due to the extractFile() function in Expand.java not properly sanitizing user input, specifically path traversal style attacks (e.g. '../'). With a specially crafted request, a remote attacker can write arbitrary files.", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "org.codehaus.plexus:plexus-utils:1.5.1", "name": "plexus-utils-1.5.1.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "72582f8ba285601fa753ceeda73ff3cbd94c6e78f52ec611621eaa0186165452" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "Medium", "summary": "Apache Maven org.apache.maven.shared.utils.Expand Expand.java extractFile() Function Traversal Remote File Write", "type": "security" }, { "created": "2018-01-30T08:46:41.791Z", "cve": "CVE-2018-1294", "description": "If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called \"Bounce Address\", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "org.apache.commons:commons-email:1.1", "name": "commons-email-1.1.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "78da962833d83a9df219d07b6c8c60115a0146a7314f8e44df3efdcf15792eaa" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "Medium", "summary": "If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called \"Bounce Address\", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).", "type": "security" }, { "created": "2019-06-10T08:42:32.044Z", "cve": "CVE-2017-1000487", "description": "Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "org.codehaus.plexus:plexus-utils:1.5.1", "name": "plexus-utils-1.5.1.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "72582f8ba285601fa753ceeda73ff3cbd94c6e78f52ec611621eaa0186165452" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "High", "summary": "Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.", "type": "security" }, { "created": "2017-08-17T13:57:52.155Z", "cve": "CVE-2017-9801", "description": "When a call-site passes a subject for an email that contains line-breaks in Apache Commons Email 1.0 through 1.4, the caller can add arbitrary SMTP headers.", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "org.apache.commons:commons-email:1.1", "name": "commons-email-1.1.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "78da962833d83a9df219d07b6c8c60115a0146a7314f8e44df3efdcf15792eaa" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "Medium", "summary": "When a call-site passes a subject for an email that contains line-breaks in Apache Commons Email 1.0 through 1.4, the caller can add arbitrary SMTP headers.", "type": "security" }, { "created": "2017-07-05T11:31:13.496Z", "cve": "CVE-2010-1622", "description": "SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "org.springframework:spring-beans:2.5.6", "name": "spring-beans-2.5.6.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "d33246bb33527685d04f23536ebf91b06ad7fa8b371fcbeb12f01523eb610104" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "Medium", "summary": "SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.", "type": "security" }, { "created": "2019-02-11T14:05:22.115Z", "cve": "CVE-2018-3258", "description": "Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "mysql:mysql-connector-java:8.0.12", "name": "mysql-connector-java-8.0.12.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "5b09edb8700512a526eb109c308e9e752d9eb3d915f6b1d33bdbdb9707ed8799" }, { "depth": 0, "display_name": "mysql:mysql-connector-java:8.0.11", "name": "mysql-connector-java-8.0.11.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "0cbe25eb4b4e7a38f52374a46283fc2381c68870581651925db752000c0d053d" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "Medium", "summary": "Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).", "type": "security" }, { "created": "2019-08-27T19:13:50.088Z", "description": "Apache Commons IO contains a flaw in io/FileUtils.java that is due to the program creating directories in an unsafe manner in the window that exists between exists() and mkdirs() invocations. This may allow a remote attacker to potentially write data into an untrusted location.", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "commons-io:commons-io:1.4", "name": "commons-io-1.4.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "a7f713593007813bf07d19bd1df9f81c86c0719e9a0bb2ef1b98b78313fc940d" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "Low", "summary": "Apache Commons IO io/FileUtils.java Unsafe Directory Creation Weakness", "type": "security" }, { "created": "2018-07-12T07:10:39.7Z", "cve": "CVE-2018-1272", "description": "Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "org.springframework:spring-core:2.5.6", "name": "spring-core-2.5.6.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "cf37656069488043c47f49a5520bb06d6879b63ef6044abb200c51a7ff2d6c49" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "Medium", "summary": "Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.", "type": "security" }, { "created": "2018-11-22T13:39:14.353Z", "cve": "CVE-2009-1190", "description": "Algorithmic complexity vulnerability in the java.util.regex.Pattern.compile method in Sun Java Development Kit (JDK) before 1.6, when used with spring.jar in SpringSource Spring Framework 1.1.0 through 2.5.6 and 3.0.0.M1 through 3.0.0.M2 and dm Server 1.0.0 through 1.0.2, allows remote attackers to cause a denial of service (CPU consumption) via serializable data with a long regex string containing multiple optional groups, a related issue to CVE-2004-2540.", "impacted_artifacts": [ { "depth": 0, "display_name": "multi3-3.7-20200212.142315-3.war", "infected_files": [ { "depth": 0, "display_name": "org.springframework:spring-core:2.5.6", "name": "spring-core-2.5.6.jar", "parent_sha": "76bedc0399209810e3136916147e539210423afee8ead293c86021f0b9038b41", "path": "WEB-INF/lib/", "pkg_type": "Maven", "sha256": "cf37656069488043c47f49a5520bb06d6879b63ef6044abb200c51a7ff2d6c49" } ], "name": "multi3-3.7-20200212.142315-3.war", "parent_sha": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32", "path": "dmz-arti/libs-snapshot-local/org/jfrog/test/multi3/3.7-SNAPSHOT/", "pkg_type": "Generic", "sha1": "2335c00abbdd91fcc55d927de0cb058f0b82a6b9", "sha256": "7394e8e5a0f1b1cb7b65db7b7a08a26f00504795c94ad76bd533ccea8237dc32" } ], "provider": "JFrog", "severity": "Medium", "summary": "Algorithmic complexity vulnerability in the java.util.regex.Pattern.compile method in Sun Java Development Kit (JDK) before 1.6, when used with spring.jar in SpringSource Spring Framework 1.1.0 through 2.5.6 and 3.0.0.M1 through 3.0.0.M2 and dm Server 1.0.0 through 1.0.2, allows remote attackers to cause a denial of service (CPU consumption) via serializable data with a long regex string containing multiple optional groups, a related issue to CVE-2004-2540.", "type": "security" } ]

joeyfrog commented 4 years ago

''' asdad '''