Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

jacoco-maven-plugin-0.8.7.jar: 5 vulnerabilities (highest severity is: 9.1) #6

Open
mend-for-jackfan.us.kg bot opened this issue Feb 25, 2025 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend

Comments

@mend-for-jackfan.us.kg
Copy link
Contributor

Vulnerable Library - jacoco-maven-plugin-0.8.7.jar

Path to dependency file: /pom.xml

Path to vulnerable library: /pom.xml

Found in HEAD commit: ecb24b0e0f66b2234caa930989924f614814ff4d

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (jacoco-maven-plugin version) Remediation Possible**
CVE-2021-26291 Critical 9.1 maven-core-3.0.jar Transitive 0.8.8
CVE-2022-4244 High 7.5 plexus-utils-3.0.22.jar Transitive 0.8.9
WS-2016-7057 Medium 5.9 plexus-utils-3.0.22.jar Transitive 0.8.9
WS-2016-7062 Medium 5.3 plexus-utils-3.0.22.jar Transitive 0.8.9
CVE-2022-4245 Medium 4.3 plexus-utils-3.0.22.jar Transitive 0.8.9

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2021-26291

Vulnerable Library - maven-core-3.0.jar

Maven is a project development management and comprehension tool. Based on the concept of a project object model: builds, dependency management, documentation creation, site publication, and distribution publication are all controlled from the declarative file. Maven can be extended by plugins to utilise a number of other development tools for reporting or the build process.

Library home page: http://www.apache.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/maven/maven-core/3.0/maven-core-3.0.jar

Dependency Hierarchy:

  • jacoco-maven-plugin-0.8.7.jar (Root Library)
    • maven-core-3.0.jar (Vulnerable Library)

Found in HEAD commit: ecb24b0e0f66b2234caa930989924f614814ff4d

Found in base branch: main

Vulnerability Details

Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html

Publish Date: 2021-04-23

URL: CVE-2021-26291

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-2f88-5hg8-9x2x

Release Date: 2021-04-23

Fix Resolution (org.apache.maven:maven-core): 3.8.1

Direct dependency fix Resolution (org.jacoco:jacoco-maven-plugin): 0.8.8

⛑️ Automatic Remediation will be attempted for this issue.

CVE-2022-4244

Vulnerable Library - plexus-utils-3.0.22.jar

A collection of various utility classes to ease working with strings, files, command lines, XML and more.

Library home page: http://www.codehaus.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /pom.xml

Dependency Hierarchy:

  • jacoco-maven-plugin-0.8.7.jar (Root Library)
    • maven-plugin-api-3.0.jar
      • maven-model-3.0.jar
        • plexus-utils-3.0.22.jar (Vulnerable Library)

Found in HEAD commit: ecb24b0e0f66b2234caa930989924f614814ff4d

Found in base branch: main

Vulnerability Details

A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.

Publish Date: 2023-09-25

URL: CVE-2022-4244

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2023-09-25

Fix Resolution (org.codehaus.plexus:plexus-utils): 3.0.24

Direct dependency fix Resolution (org.jacoco:jacoco-maven-plugin): 0.8.9

⛑️ Automatic Remediation will be attempted for this issue.

WS-2016-7057

Vulnerable Library - plexus-utils-3.0.22.jar

A collection of various utility classes to ease working with strings, files, command lines, XML and more.

Library home page: http://www.codehaus.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /pom.xml

Dependency Hierarchy:

  • jacoco-maven-plugin-0.8.7.jar (Root Library)
    • maven-plugin-api-3.0.jar
      • maven-model-3.0.jar
        • plexus-utils-3.0.22.jar (Vulnerable Library)

Found in HEAD commit: ecb24b0e0f66b2234caa930989924f614814ff4d

Found in base branch: main

Vulnerability Details

Plexus-utils before 3.0.24 are vulnerable to Directory Traversal

Publish Date: 2016-05-07

URL: WS-2016-7057

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2016-05-07

Fix Resolution (org.codehaus.plexus:plexus-utils): 3.0.24

Direct dependency fix Resolution (org.jacoco:jacoco-maven-plugin): 0.8.9

⛑️ Automatic Remediation will be attempted for this issue.

WS-2016-7062

Vulnerable Library - plexus-utils-3.0.22.jar

A collection of various utility classes to ease working with strings, files, command lines, XML and more.

Library home page: http://www.codehaus.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /pom.xml

Dependency Hierarchy:

  • jacoco-maven-plugin-0.8.7.jar (Root Library)
    • maven-plugin-api-3.0.jar
      • maven-model-3.0.jar
        • plexus-utils-3.0.22.jar (Vulnerable Library)

Found in HEAD commit: ecb24b0e0f66b2234caa930989924f614814ff4d

Found in base branch: main

Vulnerability Details

Security vulnerability found in plexus-utils before 3.0.24. XML injection found in XmlWriterUtil.java.

Publish Date: 2016-05-07

URL: WS-2016-7062

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2016-05-07

Fix Resolution (org.codehaus.plexus:plexus-utils): 3.0.24

Direct dependency fix Resolution (org.jacoco:jacoco-maven-plugin): 0.8.9

⛑️ Automatic Remediation will be attempted for this issue.

CVE-2022-4245

Vulnerable Library - plexus-utils-3.0.22.jar

A collection of various utility classes to ease working with strings, files, command lines, XML and more.

Library home page: http://www.codehaus.org/

Path to dependency file: /pom.xml

Path to vulnerable library: /pom.xml

Dependency Hierarchy:

  • jacoco-maven-plugin-0.8.7.jar (Root Library)
    • maven-plugin-api-3.0.jar
      • maven-model-3.0.jar
        • plexus-utils-3.0.22.jar (Vulnerable Library)

Found in HEAD commit: ecb24b0e0f66b2234caa930989924f614814ff4d

Found in base branch: main

Vulnerability Details

A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.

Publish Date: 2023-09-25

URL: CVE-2022-4245

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.suse.com/show_bug.cgi?id=1205930

Release Date: 2023-09-25

Fix Resolution (org.codehaus.plexus:plexus-utils): 3.0.24

Direct dependency fix Resolution (org.jacoco:jacoco-maven-plugin): 0.8.9

⛑️ Automatic Remediation will be attempted for this issue.


⛑️Automatic Remediation will be attempted for this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend
Projects
None yet
Development

No branches or pull requests

0 participants