Open mend-bolt-for-github[bot] opened 3 years ago
The Apache PDFBox library is an open source Java tool for working with PDF documents.
Library home page: http://pdfbox.apache.org
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/pdfbox/pdfbox/2.0.12/pdfbox-2.0.12.jar,/target/libs/compile/pdfbox-2.0.12.jar
Dependency Hierarchy: - :x: **pdfbox-2.0.12.jar** (Vulnerable Library)
Found in HEAD commit: a0333a35ad0999ab53fcccf6540d431239f0b20a
Found in base branch: main
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
Publish Date: 2021-06-12
URL: CVE-2021-31812
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31812
Release Date: 2021-06-12
Fix Resolution: 2.0.24
Step up your Open Source Security Game with Mend here
CVE-2021-31812 - Medium Severity Vulnerability
Vulnerable Library - pdfbox-2.0.12.jar
The Apache PDFBox library is an open source Java tool for working with PDF documents.
Library home page: http://pdfbox.apache.org
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/pdfbox/pdfbox/2.0.12/pdfbox-2.0.12.jar,/target/libs/compile/pdfbox-2.0.12.jar
Dependency Hierarchy: - :x: **pdfbox-2.0.12.jar** (Vulnerable Library)
Found in HEAD commit: a0333a35ad0999ab53fcccf6540d431239f0b20a
Found in base branch: main
Vulnerability Details
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
Publish Date: 2021-06-12
URL: CVE-2021-31812
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31812
Release Date: 2021-06-12
Fix Resolution: 2.0.24
Step up your Open Source Security Game with Mend here