The Apache Software Foundation provides support for the Apache community of open-source software projects.
The Apache projects are characterized by a collaborative, consensus based development process, an open and
pragmatic software license, and a desire to create high quality software that leads the way in its field.
We consider ourselves not simply a group of projects sharing a server, but rather a community of developers
and users.
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/sshd/sshd-core/1.7.0/sshd-core-1.7.0.jar,/WEB-INF/lib/sshd-core-1.7.0.jar,/canner/.m2/repository/org/apache/sshd/sshd-core/1.7.0/sshd-core-1.7.0.jar
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.
In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks.
This issue affects Apache MINA: from 1.0 before 2.10. Users are recommended to upgrade to 2.10
CVE-2023-35887 - Medium Severity Vulnerability
Vulnerable Library - sshd-core-1.7.0.jar
The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.
Library home page: http://www.apache.org/
Path to dependency file: /war/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/sshd/sshd-core/1.7.0/sshd-core-1.7.0.jar,/WEB-INF/lib/sshd-core-1.7.0.jar,/canner/.m2/repository/org/apache/sshd/sshd-core/1.7.0/sshd-core-1.7.0.jar
Dependency Hierarchy: - :x: **sshd-core-1.7.0.jar** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA. In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks. This issue affects Apache MINA: from 1.0 before 2.10. Users are recommended to upgrade to 2.10
Publish Date: 2023-07-10
URL: CVE-2023-35887
CVSS 3 Score Details (4.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2
Release Date: 2023-07-10
Fix Resolution: 2.9.3
Step up your Open Source Security Game with Mend here