safat / conductor

Conductor is a microservices orchestration engine - https://netflix.github.io/conductor/
Apache License 2.0
1 stars 0 forks source link

CVE-2022-40159 (Medium) detected in commons-jxpath-1.3.jar #279

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2022-40159 - Medium Severity Vulnerability

Vulnerable Library - commons-jxpath-1.3.jar

A Java-based implementation of XPath 1.0 that, in addition to XML processing, can inspect/modify Java object graphs (the library's explicit purpose) and even mixed Java/XML structures.

Path to dependency file: /test-harness/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/commons-jxpath/commons-jxpath/1.3/c22d7d0f0f40eb7059a23cfa61773a416768b137/commons-jxpath-1.3.jar

Dependency Hierarchy: - dyno-queues-redis-2.0.13.jar (Root Library) - dyno-jedis-1.7.2-rc2.jar - dyno-contrib-1.7.2-rc2.jar - eureka-client-1.8.6.jar - netflix-eventbus-0.3.0.jar - netflix-infix-0.3.0.jar - :x: **commons-jxpath-1.3.jar** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

** DISPUTED ** This record was originally reported by the oss-fuzz project who failed to consider the security context in which JXPath is intended to be used and failed to contact the JXPath maintainers prior to requesting the CVE allocation. The CVE was then allocated by Google in breach of the CNA rules. After review by the JXPath maintainers, the original report was found to be invalid.

Publish Date: 2022-10-06

URL: CVE-2022-40159

CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with Mend here