The scope of this CVE affected version is [5.3.0.RELEASE, 5.3.2.RELEASE),[5.2.0.RELEASE, 5.2.4.RELEASE),[5.1.0.RELEASE, 5.1.10.RELEASE),[5.0.0.RELEASE, 5.0.16.RELEASE),[4.2.0.RELEASE, 4.2.16.RELEASE)
After further analysis, in this project, the main Api called is
<org.apache.poi.xssf.streaming.SXSSFCell: java.lang.String getStringCellValue()>
at <qunar.tc.qconfig.admin.service.impl.TemplateExcelParseServiceImpl: java.lang.String readCellAsString(org.apache.poi.ss.usermodel.Cell)> (qunar.tc.qconfig.admin.service.impl.TemplateExcelParseServiceImpl.java:[71]) in /detect/unzip/qconfig-master/admin/target/classes
at <qunar.tc.qconfig.admin.service.impl.TemplateExcelParseServiceImpl: java.util.List parse(org.springframework.web.multipart.MultipartFile)> (qunar.tc.qconfig.admin.service.impl.TemplateExcelParseServiceImpl.java:[44]) in /detect/unzip/qconfig-master/admin/target/classes
Hi, In qconfig/admin,there is a dependency org.apache.poi:poi-ooxml:3.9 that calls the risk method.
CVE-2019-12415
The scope of this CVE affected version is [5.3.0.RELEASE, 5.3.2.RELEASE),[5.2.0.RELEASE, 5.2.4.RELEASE),[5.1.0.RELEASE, 5.1.10.RELEASE),[5.0.0.RELEASE, 5.0.16.RELEASE),[4.2.0.RELEASE, 4.2.16.RELEASE)
After further analysis, in this project, the main Api called is
Risk method repair link : GitHub
CVE Bug Invocation Path--
Path Length : 3
Dependency tree--
Suggested solutions:
Update dependency version
Thank you very much.