Open mend-bolt-for-github[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2020-10727 - Medium Severity Vulnerability
Vulnerable Libraries - artemis-server-2.8.0.jar, artemis-core-client-2.8.0.jar
artemis-server-2.8.0.jar
The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.
Library home page: https://www.apache.org/
Path to dependency file: /packages/cactus-plugin-ledger-connector-corda/src/main-server/kotlin/gen/kotlin-spring/build.gradle.kts
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.activemq/artemis-server/2.8.0/25753412d8801cc83f51dfe7666cd0484a0dbedd/artemis-server-2.8.0.jar
Dependency Hierarchy: - corda-rpc-4.5.jar (Root Library) - corda-node-api-4.5.jar - artemis-amqp-protocol-2.8.0.jar - :x: **artemis-server-2.8.0.jar** (Vulnerable Library)
artemis-core-client-2.8.0.jar
The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.
Library home page: https://www.apache.org/
Path to dependency file: /packages/cactus-plugin-ledger-connector-corda/src/main-server/kotlin/gen/kotlin-spring/build.gradle.kts
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.activemq/artemis-core-client/2.8.0/a0b28fe187d8d6264ac6f3c92d2fcc18e1e8d2d6/artemis-core-client-2.8.0.jar
Dependency Hierarchy: - corda-rpc-4.5.jar (Root Library) - corda-node-api-4.5.jar - :x: **artemis-core-client-2.8.0.jar** (Vulnerable Library)
Found in HEAD commit: ceec9f73fd05cfdbf0061d53c9d0c42d43e85d22
Found in base branch: master
Vulnerability Details
A flaw was found in ActiveMQ Artemis management API from version 2.7.0 up until 2.12.0, where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the `resetUsers` operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.
Publish Date: 2020-06-26
URL: CVE-2020-10727
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10727
Release Date: 2020-06-26
Fix Resolution (org.apache.activemq:artemis-server): 2.12.0
Direct dependency fix Resolution (net.corda:corda-rpc): 4.6
Fix Resolution (org.apache.activemq:artemis-core-client): 2.12.0
Direct dependency fix Resolution (net.corda:corda-rpc): 4.6
Step up your Open Source Security Game with Mend here