Open mend-for-github-com[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
:information_source: This issue was automatically re-opened by WhiteSource because the vulnerable library in the specific branch(es) has been detected in the WhiteSource inventory.
CVE-2015-6420 - High Severity Vulnerability
Vulnerable Libraries - commons-collections4-4.0.jar, commons-collections-3.1.jar
commons-collections4-4.0.jar
The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.
Path to dependency file: /pom.xml
Path to vulnerable library: /pache/commons/commons-collections4/4.0/commons-collections4-4.0.jar
Dependency Hierarchy: - :x: **commons-collections4-4.0.jar** (Vulnerable Library)
commons-collections-3.1.jar
Types that extend and augment the Java Collections Framework.
Path to dependency file: /pom.xml
Path to vulnerable library: /ns-collections/commons-collections/3.1/commons-collections-3.1.jar
Dependency Hierarchy: - :x: **commons-collections-3.1.jar** (Vulnerable Library)
Found in HEAD commit: 8e3a1e1b8d8f62ed86ec27f3a50f080a66037011
Found in base branch: main
Vulnerability Details
Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
Publish Date: 2015-12-15
URL: CVE-2015-6420
CVSS 3 Score Details (7.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/apache/commons-collections/tree/collections-3.2.2,https://github.com/apache/commons-collections/tree/collections-4.1
Release Date: 2015-12-15
Fix Resolution: 3.2.2