Open mend-for-github-com[bot] opened 1 year ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
Vulnerable Library - spring-kafka-2.8.11.jar
Spring Kafka Support
Path to dependency file: /springboot/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework.kafka/spring-kafka/2.8.11/7068d24ea230111777ce60232fa39d4e570d4709/spring-kafka-2.8.11.jar
Found in HEAD commit: [d9d6bd3ab59971d099644378433aab2e4f88ed1a](https://github.com/temporalio/samples-java/commit/d9d6bd3ab59971d099644378433aab2e4f88ed1a)
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-34040
### Vulnerable Library - spring-kafka-2.8.11.jarSpring Kafka Support
Path to dependency file: /springboot/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework.kafka/spring-kafka/2.8.11/7068d24ea230111777ce60232fa39d4e570d4709/spring-kafka-2.8.11.jar
Dependency Hierarchy: * :x: **spring-kafka-2.8.11.jar** (Vulnerable Library)
Found in HEAD commit: [d9d6bd3ab59971d099644378433aab2e4f88ed1a](https://github.com/temporalio/samples-java/commit/d9d6bd3ab59971d099644378433aab2e4f88ed1a)
Found in base branch: main
### Vulnerability DetailsIn Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers. Specifically, an application is vulnerable when all of the following are true: * The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true. * The user allows untrusted sources to publish to a Kafka topic By default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.
Publish Date: 2023-08-24
URL: [CVE-2023-34040](https://www.mend.io/vulnerability-database/CVE-2023-34040)
### CVSS 3 Score Details (7.8)Base Score Metrics: * Exploitability Metrics: * Attack Vector: Local * Attack Complexity: Low * Privileges Required: Low * User Interaction: None * Scope: Unchanged * Impact Metrics: * Confidentiality Impact: High * Integrity Impact: High * Availability Impact: High
For more information on CVSS3 Scores, click [here](https://www.first.org/cvss/calculator/3.0). ### Suggested FixType: Upgrade version
Origin: [https://spring.io/security/cve-2023-34040](https://spring.io/security/cve-2023-34040)
Release Date: 2023-08-24
Fix Resolution: 2.9.11
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.