Code Monkey home page Code Monkey logo

whitesource-demo's People

Contributors

mixellent avatar

Watchers

 avatar

whitesource-demo's Issues

CVE-2017-18367 (Medium) detected in github.com/seccomp/libseccomp-golang-v0.9.0

CVE-2017-18367 - Medium Severity Vulnerability

Vulnerable Library - github.com/seccomp/libseccomp-golang-v0.9.0

The libseccomp golang bindings repository

Library home page: https://proxy.golang.org/github.com/seccomp/libseccomp-golang/@v/v0.9.0.zip

Dependency Hierarchy:

  • github.com/opencontainers/runc-v0.1.1 (Root Library)
    • github.com/opencontainers/runc/libcontainer/specconv-v0.1.1
      • github.com/opencontainers/runc/libcontainer/seccomp-v0.1.1
        • github.com/seccomp/libseccomp-golang-v0.9.0 (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

Publish Date: 2019-04-24

URL: CVE-2017-18367

CVSS 3 Score Details (4.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://osv.dev/vulnerability/GO-2020-0007

Release Date: 2019-04-24

Fix Resolution: v0.9.1

CVE-2019-16869 (High) detected in netty-all-4.0.33.Final.jar

CVE-2019-16869 - High Severity Vulnerability

Vulnerable Library - netty-all-4.0.33.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /pom.xml

Path to vulnerable library: /canner/.m2/repository/io/netty/netty-all/4.0.33.Final/netty-all-4.0.33.Final.jar

Dependency Hierarchy:

  • netty-all-4.0.33.Final.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.

Publish Date: 2019-09-26

URL: CVE-2019-16869

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16869

Release Date: 2019-09-26

Fix Resolution: 4.1.42.Final


⛑️ Automatic Remediation is available for this issue

CVE-2018-14721 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2018-14721 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.

Publish Date: 2019-01-02

URL: CVE-2018-14721

CVSS 3 Score Details (10.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721

Release Date: 2019-01-02

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.3

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.18.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-6817 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2016-6817 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.

Publish Date: 2017-08-10

URL: CVE-2016-6817

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6817

Release Date: 2016-11-22

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.8

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.4.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-5650 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2017-5650 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads.

Publish Date: 2017-04-17

URL: CVE-2017-5650

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5650

Release Date: 2017-04-17

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.13

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.6.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2019-14379 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2019-14379 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.

Publish Date: 2019-07-29

URL: CVE-2019-14379

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379

Release Date: 2019-07-29

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.4

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.0.0.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2019-12086 (High) detected in jackson-databind-2.8.1.jar

CVE-2019-12086 - High Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.

Publish Date: 2019-05-17

URL: CVE-2019-12086

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086

Release Date: 2019-05-17

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.4

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.0.0.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-19362 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2018-19362 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.

Publish Date: 2019-01-02

URL: CVE-2018-19362

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362

Release Date: 2019-01-02

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.3

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.18.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-7525 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2017-7525 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.

Publish Date: 2018-02-06

URL: CVE-2017-7525

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525

Release Date: 2018-02-06

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.9

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.5.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2019-0199 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2019-0199 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

Publish Date: 2019-04-10

URL: CVE-2019-0199

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://tomcat.apache.org/security-9.html

Release Date: 2019-04-10

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.38

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.20.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2019-5736 (High) detected in github.com/opencontainers/runc/libcontainer/nsenter-v0.1.1

CVE-2019-5736 - High Severity Vulnerability

Vulnerable Library - github.com/opencontainers/runc/libcontainer/nsenter-v0.1.1

CLI tool for spawning and running containers according to the OCI specification

Dependency Hierarchy:

  • github.com/opencontainers/runc-v0.1.1 (Root Library)
    • github.com/opencontainers/runc/libcontainer/nsenter-v0.1.1 (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

Publish Date: 2019-02-11

URL: CVE-2019-5736

CVSS 3 Score Details (8.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-5736

Release Date: 2019-02-11

Fix Resolution: v1.0.0-rc7

CVE-2020-10693 (Medium) detected in hibernate-validator-5.2.4.Final.jar

CVE-2020-10693 - Medium Severity Vulnerability

Vulnerable Library - hibernate-validator-5.2.4.Final.jar

Hibernate's Bean Validation (JSR-303) reference implementation.

Library home page: http://hibernate.org/validator

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/hibernate/hibernate-validator/5.2.4.Final/hibernate-validator-5.2.4.Final.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • hibernate-validator-5.2.4.Final.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages.

Publish Date: 2020-05-06

URL: CVE-2020-10693

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://in.relation.to/2020/05/07/hibernate-validator-615-6020-released/

Release Date: 2020-05-06

Fix Resolution (org.hibernate:hibernate-validator): 6.0.0.Alpha1

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.0.0.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-7675 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2017-7675 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.

Publish Date: 2017-08-11

URL: CVE-2017-7675

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://tomcat.apache.org/security-8.html

Release Date: 2017-08-10

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.16

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.5.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-8014 (Critical) detected in tomcat-embed-core-8.5.4.jar

CVE-2018-8014 - Critical Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

Publish Date: 2018-05-16

URL: CVE-2018-8014

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8014

Release Date: 2018-05-16

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.32

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.15.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-1272 (High) detected in spring-core-4.3.2.RELEASE.jar

CVE-2018-1272 - High Severity Vulnerability

Vulnerable Library - spring-core-4.3.2.RELEASE.jar

Spring Core

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/4.3.2.RELEASE/spring-core-4.3.2.RELEASE.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-1.4.0.RELEASE.jar
      • spring-core-4.3.2.RELEASE.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.

Publish Date: 2018-04-06

URL: CVE-2018-1272

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://tanzu.vmware.com/security/cve-2018-1272

Release Date: 2018-04-05

Fix Resolution (org.springframework:spring-core): 4.3.15.RELEASE

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.11.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-14720 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2018-14720 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.

Publish Date: 2019-01-02

URL: CVE-2018-14720

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-14720

Release Date: 2019-01-02

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.3

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.18.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-14718 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2018-14718 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.

Publish Date: 2019-01-02

URL: CVE-2018-14718

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-14718

Release Date: 2019-01-02

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.3

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.18.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-4970 (High) detected in netty-all-4.0.33.Final.jar

CVE-2016-4970 - High Severity Vulnerability

Vulnerable Library - netty-all-4.0.33.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /pom.xml

Path to vulnerable library: /canner/.m2/repository/io/netty/netty-all/4.0.33.Final/netty-all-4.0.33.Final.jar

Dependency Hierarchy:

  • netty-all-4.0.33.Final.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

handler/ssl/OpenSslEngine.java in Netty 4.0.x before 4.0.37.Final and 4.1.x before 4.1.1.Final allows remote attackers to cause a denial of service (infinite loop).

Publish Date: 2017-04-13

URL: CVE-2016-4970

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4970

Release Date: 2017-04-13

Fix Resolution: 4.0.37.Final


⛑️ Automatic Remediation is available for this issue

CVE-2019-16884 (High) detected in github.com/opencontainers/runc/libcontainer-v0.1.1

CVE-2019-16884 - High Severity Vulnerability

Vulnerable Library - github.com/opencontainers/runc/libcontainer-v0.1.1

CLI tool for spawning and running containers according to the OCI specification

Dependency Hierarchy:

  • github.com/opencontainers/runc-v0.1.1 (Root Library)
    • github.com/opencontainers/runc/libcontainer-v0.1.1 (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

Publish Date: 2019-09-25

URL: CVE-2019-16884

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16884

Release Date: 2019-09-25

Fix Resolution: v1.0.0-rc9

CVE-2017-5664 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2017-5664 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method.

Publish Date: 2017-06-06

URL: CVE-2017-5664

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664

Release Date: 2017-06-06

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.15

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.7.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2019-10202 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2019-10202 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike.

Publish Date: 2019-10-01

URL: CVE-2019-10202

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4

Release Date: 2019-10-01

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.9.9

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.6.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-12617 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2017-12617 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Publish Date: 2017-10-04

URL: CVE-2017-12617

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617

Release Date: 2017-10-03

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.23

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.8.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-7536 (High) detected in hibernate-validator-5.2.4.Final.jar

CVE-2017-7536 - High Severity Vulnerability

Vulnerable Library - hibernate-validator-5.2.4.Final.jar

Hibernate's Bean Validation (JSR-303) reference implementation.

Library home page: http://hibernate.org/validator

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/hibernate/hibernate-validator/5.2.4.Final/hibernate-validator-5.2.4.Final.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • hibernate-validator-5.2.4.Final.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().

Publish Date: 2018-01-10

URL: CVE-2017-7536

CVSS 3 Score Details (7.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7536

Release Date: 2017-06-27

Fix Resolution (org.hibernate:hibernate-validator): 5.3.0.Alpha1

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.0.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-7674 (Medium) detected in tomcat-embed-core-8.5.4.jar

CVE-2017-7674 - Medium Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.

Publish Date: 2017-08-11

URL: CVE-2017-7674

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674

Release Date: 2017-08-10

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.16

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.5.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-8745 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2016-8745 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

Publish Date: 2017-08-10

URL: CVE-2016-8745

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745

Release Date: 2017-01-05

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.9

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.4.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-19361 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2018-19361 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.

Publish Date: 2019-01-02

URL: CVE-2018-19361

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19361

Release Date: 2019-01-02

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.3

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.18.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-5968 (High) detected in jackson-databind-2.8.1.jar

CVE-2018-5968 - High Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.

Publish Date: 2018-01-22

URL: CVE-2018-5968

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5968

Release Date: 2018-01-22

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.1

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.11.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2019-12814 (Medium) detected in jackson-databind-2.8.1.jar

CVE-2019-12814 - Medium Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.

Publish Date: 2019-06-19

URL: CVE-2019-12814

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-06-19

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.4

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.0.0.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-6794 (Medium) detected in tomcat-embed-core-8.5.4.jar

CVE-2016-6794 - Medium Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.

Publish Date: 2017-08-10

URL: CVE-2016-6794

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794

Release Date: 2016-10-27

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.5

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.1.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-5651 (Critical) detected in tomcat-embed-core-8.5.4.jar

CVE-2017-5651 - Critical Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up.

Publish Date: 2017-04-17

URL: CVE-2017-5651

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5651

Release Date: 2017-04-17

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.13

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.6.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-7489 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2018-7489 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.

Publish Date: 2018-02-26

URL: CVE-2018-7489

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-7489

Release Date: 2018-02-26

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.11.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2019-10072 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2019-10072 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

Publish Date: 2019-06-21

URL: CVE-2019-10072

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.41

Release Date: 2019-06-21

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.41

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.22.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2019-12384 (Medium) detected in jackson-databind-2.8.1.jar

CVE-2019-12384 - Medium Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.

Publish Date: 2019-06-24

URL: CVE-2019-12384

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384

Release Date: 2019-06-24

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.4

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.0.0.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-0762 (Medium) detected in tomcat-embed-core-8.5.4.jar

CVE-2016-0762 - Medium Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.

Publish Date: 2017-08-10

URL: CVE-2016-0762

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009@%3Cannounce.tomcat.apache.org%3E

Release Date: 2016-10-27

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.5

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.1.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-12023 (High) detected in jackson-databind-2.8.1.jar

CVE-2018-12023 - High Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.

Publish Date: 2019-03-21

URL: CVE-2018-12023

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022

Release Date: 2019-03-17

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.2

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.14.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-5645 (Critical) detected in log4j-core-2.6.1.jar

CVE-2017-5645 - Critical Severity Vulnerability

Vulnerable Library - log4j-core-2.6.1.jar

The Apache Log4j Implementation

Path to dependency file: /pom.xml

Path to vulnerable library: /canner/.m2/repository/org/apache/logging/log4j/log4j-core/2.6.1/log4j-core-2.6.1.jar

Dependency Hierarchy:

  • log4j-core-2.6.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

Publish Date: 2017-04-17

URL: CVE-2017-5645

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5645

Release Date: 2017-04-17

Fix Resolution: 2.8.2


⛑️ Automatic Remediation is available for this issue

CVE-2018-19360 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2018-19360 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.

Publish Date: 2019-01-02

URL: CVE-2018-19360

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360

Release Date: 2019-01-02

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.3

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.18.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-11307 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2018-11307 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.

Publish Date: 2019-07-09

URL: CVE-2018-11307

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-07-09

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.2

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.14.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-8867 (High) detected in github.com/opencontainers/runc/libcontainer/system-v0.1.1

CVE-2016-8867 - High Severity Vulnerability

Vulnerable Library - github.com/opencontainers/runc/libcontainer/system-v0.1.1

CLI tool for spawning and running containers according to the OCI specification

Dependency Hierarchy:

  • github.com/opencontainers/runc-v0.1.1 (Root Library)
    • github.com/opencontainers/runc/libcontainer/system-v0.1.1 (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes.

Publish Date: 2016-10-28

URL: CVE-2016-8867

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2016-10-28

Fix Resolution: runc - v1.0.0-rc3

CVE-2018-12022 (High) detected in jackson-databind-2.8.1.jar

CVE-2018-12022 - High Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.

Publish Date: 2019-03-21

URL: CVE-2018-12022

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022

Release Date: 2019-03-17

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.2

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.14.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-6797 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2016-6797 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.

Publish Date: 2017-08-10

URL: CVE-2016-6797

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797

Release Date: 2016-10-27

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.5

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.1.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-5647 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2017-5647 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.

Publish Date: 2017-04-17

URL: CVE-2017-5647

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647

Release Date: 2017-04-17

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.13

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.6.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-17485 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2017-17485 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

Publish Date: 2018-01-10

URL: CVE-2017-17485

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17485

Release Date: 2018-01-10

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.11.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2018-14719 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2018-14719 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.

Publish Date: 2019-01-02

URL: CVE-2018-14719

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-14719

Release Date: 2019-01-02

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.11.4

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.0.0.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-6816 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2016-6816 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

Publish Date: 2017-03-20

URL: CVE-2016-6816

CVSS 3 Score Details (7.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816

Release Date: 2017-03-20

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.8

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.4.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-5388 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2016-5388 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.

Publish Date: 2016-07-19

URL: CVE-2016-5388

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388

Release Date: 2016-07-19

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.5

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.1.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2016-9962 (High) detected in github.com/opencontainers/runc/libcontainer/nsenter-v0.1.1, github.com/opencontainers/runc/libcontainer-v0.1.1

CVE-2016-9962 - High Severity Vulnerability

Vulnerable Libraries - github.com/opencontainers/runc/libcontainer/nsenter-v0.1.1, github.com/opencontainers/runc/libcontainer-v0.1.1

github.com/opencontainers/runc/libcontainer/nsenter-v0.1.1

CLI tool for spawning and running containers according to the OCI specification

Dependency Hierarchy:

  • github.com/opencontainers/runc-v0.1.1 (Root Library)
    • github.com/opencontainers/runc/libcontainer/nsenter-v0.1.1 (Vulnerable Library)
github.com/opencontainers/runc/libcontainer-v0.1.1

CLI tool for spawning and running containers according to the OCI specification

Dependency Hierarchy:

  • github.com/opencontainers/runc-v0.1.1 (Root Library)
    • github.com/opencontainers/runc/libcontainer-v0.1.1 (Vulnerable Library)

Found in base branch: master

Vulnerability Details

RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.

Publish Date: 2017-01-31

URL: CVE-2016-9962

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-9962

Release Date: 2017-01-31

Fix Resolution: 1.12.6

CVE-2017-15095 (Critical) detected in jackson-databind-2.8.1.jar

CVE-2017-15095 - Critical Severity Vulnerability

Vulnerable Library - jackson-databind-2.8.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.1/jackson-databind-2.8.1.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • jackson-databind-2.8.1.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.

Publish Date: 2018-02-06

URL: CVE-2017-15095

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-15095

Release Date: 2017-06-27

Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.8.10

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.5.7.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2020-9484 (High) detected in tomcat-embed-core-8.5.4.jar

CVE-2020-9484 - High Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

Publish Date: 2020-05-20

URL: CVE-2020-9484

CVSS 3 Score Details (7.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484

Release Date: 2020-05-20

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.55

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.1.0.RELEASE


⛑️ Automatic Remediation is available for this issue

CVE-2017-5648 (Critical) detected in tomcat-embed-core-8.5.4.jar

CVE-2017-5648 - Critical Severity Vulnerability

Vulnerable Library - tomcat-embed-core-8.5.4.jar

Core Tomcat implementation

Library home page: http://tomcat.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar

Dependency Hierarchy:

  • spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
    • spring-boot-starter-tomcat-1.4.0.RELEASE.jar
      • tomcat-embed-core-8.5.4.jar (Vulnerable Library)

Found in HEAD commit: 75659f691fb82d67ecd666ba6076394defeb92d0

Found in base branch: master

Vulnerability Details

While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.

Publish Date: 2017-04-17

URL: CVE-2017-5648

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648

Release Date: 2017-04-17

Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 8.5.12

Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 1.4.6.RELEASE


⛑️ Automatic Remediation is available for this issue

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.