forked from Dynatrace/dynatrace-service-broker
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 92 vulnerabilities (highest severity is: 10.0) reachable #234
Labels
Mend: dependency security vulnerability
Security vulnerability detected by Mend
Comments
mend-for-github-com
bot
added
the
Mend: dependency security vulnerability
Security vulnerability detected by Mend
label
Mar 20, 2023
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 16 vulnerabilities (highest severity is: 9.8)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 92 vulnerabilities (highest severity is: 10.0)
Aug 30, 2023
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 92 vulnerabilities (highest severity is: 10.0)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 93 vulnerabilities (highest severity is: 10.0)
Dec 5, 2023
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 93 vulnerabilities (highest severity is: 10.0)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 94 vulnerabilities (highest severity is: 10.0)
Dec 6, 2023
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 94 vulnerabilities (highest severity is: 10.0)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 94 vulnerabilities (highest severity is: 9.8)
Dec 20, 2023
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 94 vulnerabilities (highest severity is: 9.8)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 95 vulnerabilities (highest severity is: 9.8)
Dec 31, 2023
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 95 vulnerabilities (highest severity is: 9.8)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 95 vulnerabilities (highest severity is: 10.0)
Feb 28, 2024
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 95 vulnerabilities (highest severity is: 10.0)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 94 vulnerabilities (highest severity is: 10.0)
Apr 12, 2024
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 94 vulnerabilities (highest severity is: 10.0)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 95 vulnerabilities (highest severity is: 10.0)
Jul 18, 2024
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 95 vulnerabilities (highest severity is: 10.0)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 96 vulnerabilities (highest severity is: 10.0)
Aug 16, 2024
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 96 vulnerabilities (highest severity is: 10.0)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 97 vulnerabilities (highest severity is: 10.0)
Oct 18, 2024
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 97 vulnerabilities (highest severity is: 10.0)
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 97 vulnerabilities (highest severity is: 10.0) reachable
Nov 1, 2024
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 97 vulnerabilities (highest severity is: 10.0) reachable
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 99 vulnerabilities (highest severity is: 10.0) reachable
Dec 22, 2024
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 99 vulnerabilities (highest severity is: 10.0) reachable
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 100 vulnerabilities (highest severity is: 10.0) reachable
Dec 24, 2024
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 100 vulnerabilities (highest severity is: 10.0) reachable
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 99 vulnerabilities (highest severity is: 10.0) reachable
Jan 19, 2025
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 99 vulnerabilities (highest severity is: 10.0) reachable
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 97 vulnerabilities (highest severity is: 10.0) reachable
Jan 19, 2025
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 97 vulnerabilities (highest severity is: 10.0) reachable
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 87 vulnerabilities (highest severity is: 9.8) reachable
Jan 20, 2025
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 87 vulnerabilities (highest severity is: 9.8) reachable
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 86 vulnerabilities (highest severity is: 9.8) reachable
Jan 21, 2025
mend-for-github-com
bot
changed the title
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 86 vulnerabilities (highest severity is: 9.8) reachable
spring-boot-starter-actuator-1.1.9.RELEASE.jar: 92 vulnerabilities (highest severity is: 10.0) reachable
Jan 22, 2025
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Mend: dependency security vulnerability
Security vulnerability detected by Mend
0 participants
Vulnerable Library - spring-boot-starter-actuator-1.1.9.RELEASE.jar
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.4/jackson-databind-2.3.4.jar
Found in HEAD commit: 075c652078643180fb05751cdbc793df371d6844
Vulnerabilities
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Reachable
Unreachable
Unreachable
Unreachable
Unreachable
Unreachable
Unreachable
Unreachable
Unreachable
Unreachable
Unreachable
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2018-14721
Vulnerable Library - jackson-databind-2.3.4.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://fasterxml.com/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.4/jackson-databind-2.3.4.jar
Dependency Hierarchy:
Found in HEAD commit: 075c652078643180fb05751cdbc793df371d6844
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
FasterXML jackson-databind 2.x before 2.6.7.3,2.7.9.5,2.8.11.3,2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
Publish Date: 2019-01-02
URL: CVE-2018-14721
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.8%
CVSS 3 Score Details (10.0)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2019-01-02
Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.3
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-actuator): 1.4.0.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2022-22965
Vulnerable Library - spring-beans-4.0.8.RELEASE.jar
Spring Beans
Library home page: http://projects.spring.io/spring-framework
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-beans/4.0.8.RELEASE/spring-beans-4.0.8.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: 075c652078643180fb05751cdbc793df371d6844
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
Mend Note: Converted from WS-2022-0107, on 2022-11-07.
Publish Date: 2022-04-01
URL: CVE-2022-22965
Threat Assessment
Exploit Maturity: High
EPSS: 97.399994%
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement
Release Date: 2022-04-01
Fix Resolution (org.springframework:spring-beans): 5.2.20.RELEASE
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-actuator): 2.4.0
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2020-9548
Vulnerable Library - jackson-databind-2.3.4.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://fasterxml.com/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.4/jackson-databind-2.3.4.jar
Dependency Hierarchy:
Found in HEAD commit: 075c652078643180fb05751cdbc793df371d6844
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
Publish Date: 2020-03-02
URL: CVE-2020-9548
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.5%
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548
Release Date: 2020-03-02
Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-actuator): 1.4.0.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2020-9547
Vulnerable Library - jackson-databind-2.3.4.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://fasterxml.com/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.4/jackson-databind-2.3.4.jar
Dependency Hierarchy:
Found in HEAD commit: 075c652078643180fb05751cdbc793df371d6844
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
Publish Date: 2020-03-02
URL: CVE-2020-9547
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.4%
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://osv.dev/vulnerability/GHSA-q93h-jc49-78gg
Release Date: 2020-03-02
Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-actuator): 1.4.0.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2020-8840
Vulnerable Library - jackson-databind-2.3.4.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://fasterxml.com/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.4/jackson-databind-2.3.4.jar
Dependency Hierarchy:
Found in HEAD commit: 075c652078643180fb05751cdbc793df371d6844
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
Publish Date: 2020-02-10
URL: CVE-2020-8840
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.9%
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2020-02-10
Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-actuator): 1.4.0.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2019-20330
Vulnerable Library - jackson-databind-2.3.4.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://fasterxml.com/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.4/jackson-databind-2.3.4.jar
Dependency Hierarchy:
Found in HEAD commit: 075c652078643180fb05751cdbc793df371d6844
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
Publish Date: 2020-01-03
URL: CVE-2019-20330
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.6%
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2020-01-03
Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-actuator): 1.4.0.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2019-17531
Vulnerable Library - jackson-databind-2.3.4.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://fasterxml.com/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.4/jackson-databind-2.3.4.jar
Dependency Hierarchy:
Found in HEAD commit: 075c652078643180fb05751cdbc793df371d6844
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.
Publish Date: 2019-10-12
URL: CVE-2019-17531
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.6%
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531
Release Date: 2019-10-12
Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-actuator): 1.4.0.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2019-17267
Vulnerable Library - jackson-databind-2.3.4.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://fasterxml.com/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.3.4/jackson-databind-2.3.4.jar
Dependency Hierarchy:
Found in HEAD commit: 075c652078643180fb05751cdbc793df371d6844
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
Publish Date: 2019-10-06
URL: CVE-2019-17267
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.6%
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2019-10-06
Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.6.7.4
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-actuator): 1.4.0.RELEASE
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: