Open mend-for-github-com[bot] opened 1 year ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
Vulnerable Library - NuGet.Services.Configuration-2.86.0
Path to dependency file: /tests/VerifyMicrosoftPackage.Facts/VerifyMicrosoftPackage.Facts.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.rest.clientruntime/2.3.20/microsoft.rest.clientruntime.2.3.20.nupkg
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-26907
### Vulnerable Library - microsoft.rest.clientruntime.2.3.20.nupkgInfrastructure for error handling, tracing, and HttpClient pipeline configuration. Required by clien...
Library home page: https://api.nuget.org/packages/microsoft.rest.clientruntime.2.3.20.nupkg
Path to dependency file: /tests/VerifyMicrosoftPackage.Facts/VerifyMicrosoftPackage.Facts.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.rest.clientruntime/2.3.20/microsoft.rest.clientruntime.2.3.20.nupkg
Dependency Hierarchy: - NuGet.Services.Configuration-2.86.0 (Root Library) - NuGet.Services.KeyVault-2.86.0 - microsoft.azure.keyvault.3.0.5.nupkg - microsoft.rest.clientruntime.azure.3.3.18.nupkg - :x: **microsoft.rest.clientruntime.2.3.20.nupkg** (Vulnerable Library)
Found in base branch: main
### Vulnerability DetailsAzure SDK for .NET Information Disclosure Vulnerability
Publish Date: 2022-04-15
URL: CVE-2022-26907
### Threat AssessmentExploit Maturity: Not Defined
EPSS: 0.3%
### CVSS 4 Score Details (6.0)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A
For more information on CVSS4 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2022-26907
Release Date: 2022-04-15
Fix Resolution: Microsoft.Rest.ClientRuntime - 2.3.24