Open mend-for-github-com[bot] opened 10 months ago
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/squareup/okio/okio/2.8.0/okio-2.8.0.jar
Found in HEAD commit: f9c5b88a3d18cef84a8997c01f4fec22923dd942
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
A modern I/O API for Java
Library home page: https://github.com/square/okio/
Dependency Hierarchy: - opentelemetry-exporter-otlp-1.16.0.jar (Root Library) - opentelemetry-exporter-otlp-common-1.16.0.jar - okhttp-4.9.3.jar - :x: **okio-2.8.0.jar** (Vulnerable Library)
Found in base branch: main
GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This may lead to denial of service of the Okio client when handling a crafted GZIP archive, by using the GzipSource class.
Publish Date: 2023-07-12
URL: CVE-2023-3635
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-3635
Release Date: 2023-07-12
Fix Resolution (com.squareup.okio:okio): 3.0.0-alpha.10
Direct dependency fix Resolution (io.opentelemetry:opentelemetry-exporter-otlp): 1.17.0
:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.
Vulnerable Library - opentelemetry-exporter-otlp-1.16.0.jar
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/squareup/okio/okio/2.8.0/okio-2.8.0.jar
Found in HEAD commit: f9c5b88a3d18cef84a8997c01f4fec22923dd942
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-3635
### Vulnerable Library - okio-2.8.0.jarA modern I/O API for Java
Library home page: https://github.com/square/okio/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/squareup/okio/okio/2.8.0/okio-2.8.0.jar
Dependency Hierarchy: - opentelemetry-exporter-otlp-1.16.0.jar (Root Library) - opentelemetry-exporter-otlp-common-1.16.0.jar - okhttp-4.9.3.jar - :x: **okio-2.8.0.jar** (Vulnerable Library)
Found in HEAD commit: f9c5b88a3d18cef84a8997c01f4fec22923dd942
Found in base branch: main
### Vulnerability DetailsGzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This may lead to denial of service of the Okio client when handling a crafted GZIP archive, by using the GzipSource class.
Publish Date: 2023-07-12
URL: CVE-2023-3635
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-3635
Release Date: 2023-07-12
Fix Resolution (com.squareup.okio:okio): 3.0.0-alpha.10
Direct dependency fix Resolution (io.opentelemetry:opentelemetry-exporter-otlp): 1.17.0
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.