snowdensb / nifi

Apache NiFi
https://nifi.apache.org/
Apache License 2.0
0 stars 0 forks source link

easy-rules-mvel-4.1.0.jar: 1 vulnerabilities (highest severity is: 7.8) #503

Open mend-for-github-com[bot] opened 5 months ago

mend-for-github-com[bot] commented 5 months ago
Vulnerable Library - easy-rules-mvel-4.1.0.jar

MVEL integration module

Library home page: http://www.github.com/j-easy/easy-rules

Path to dependency file: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml

Path to vulnerable library: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (easy-rules-mvel version) Remediation Possible** Reachability
CVE-2023-50571 High 7.8 easy-rules-mvel-4.1.0.jar Direct N/A

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-50571 ### Vulnerable Library - easy-rules-mvel-4.1.0.jar

MVEL integration module

Library home page: http://www.github.com/j-easy/easy-rules

Path to dependency file: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml

Path to vulnerable library: /nifi-nar-bundles/nifi-easyrules-bundle/nifi-easyrules-service/pom.xml

Dependency Hierarchy: - :x: **easy-rules-mvel-4.1.0.jar** (Vulnerable Library)

Found in base branch: main

### Vulnerability Details

easy-rules-mvel v4.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component MVELRule.

Publish Date: 2023-12-29

URL: CVE-2023-50571

### CVSS 3 Score Details (7.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.