snowdensb / nifi

Apache NiFi
https://nifi.apache.org/
Apache License 2.0
0 stars 0 forks source link

json-path-2.6.0.jar: 1 vulnerabilities (highest severity is: 5.3) #518

Open mend-for-github-com[bot] opened 4 months ago

mend-for-github-com[bot] commented 4 months ago
Vulnerable Library - json-path-2.6.0.jar

Java port of Stefan Goessner JsonPath.

Library home page: https://github.com/jayway/JsonPath

Path to dependency file: /nifi-nar-bundles/nifi-elasticsearch-bundle/nifi-elasticsearch-restapi-processors/pom.xml

Path to vulnerable library: /r/.m2/repository/com/jayway/jsonpath/json-path/2.6.0/json-path-2.6.0.jar,/r/.m2/repository/com/jayway/jsonpath/json-path/2.6.0/json-path-2.6.0.jar,/r/.m2/repository/com/jayway/jsonpath/json-path/2.6.0/json-path-2.6.0.jar,/r/.m2/repository/com/jayway/jsonpath/json-path/2.6.0/json-path-2.6.0.jar

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (json-path version) Remediation Possible** Reachability
CVE-2023-51074 Medium 5.3 json-path-2.6.0.jar Direct 2.9.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-51074 ### Vulnerable Library - json-path-2.6.0.jar

Java port of Stefan Goessner JsonPath.

Library home page: https://github.com/jayway/JsonPath

Path to dependency file: /nifi-nar-bundles/nifi-elasticsearch-bundle/nifi-elasticsearch-restapi-processors/pom.xml

Path to vulnerable library: /r/.m2/repository/com/jayway/jsonpath/json-path/2.6.0/json-path-2.6.0.jar,/r/.m2/repository/com/jayway/jsonpath/json-path/2.6.0/json-path-2.6.0.jar,/r/.m2/repository/com/jayway/jsonpath/json-path/2.6.0/json-path-2.6.0.jar,/r/.m2/repository/com/jayway/jsonpath/json-path/2.6.0/json-path-2.6.0.jar

Dependency Hierarchy: - :x: **json-path-2.6.0.jar** (Vulnerable Library)

Found in base branch: main

### Vulnerability Details

json-path v2.8.0 was discovered to contain a stack overflow via the Criteria.parse() method.

Publish Date: 2023-12-27

URL: CVE-2023-51074

### CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-51074

Release Date: 2023-12-27

Fix Resolution: 2.9.0

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.