Open mend-for-github-com[bot] opened 5 months ago
MVEL integration module
Library home page: http://www.github.com/j-easy/easy-rules
Path to dependency file: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml
Path to vulnerable library: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Dependency Hierarchy: - :x: **easy-rules-mvel-4.1.0.jar** (Vulnerable Library)
Found in base branch: main
easy-rules-mvel v4.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component MVELRule.
Publish Date: 2023-12-29
URL: CVE-2023-50571
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
Vulnerable Library - easy-rules-mvel-4.1.0.jar
MVEL integration module
Library home page: http://www.github.com/j-easy/easy-rules
Path to dependency file: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml
Path to vulnerable library: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-50571
### Vulnerable Library - easy-rules-mvel-4.1.0.jarMVEL integration module
Library home page: http://www.github.com/j-easy/easy-rules
Path to dependency file: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml
Path to vulnerable library: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml
Dependency Hierarchy: - :x: **easy-rules-mvel-4.1.0.jar** (Vulnerable Library)
Found in base branch: main
### Vulnerability Detailseasy-rules-mvel v4.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component MVELRule.
Publish Date: 2023-12-29
URL: CVE-2023-50571
### CVSS 3 Score Details (7.8)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.