MangoMessengerAPI icon indicating copy to clipboard operation
MangoMessengerAPI copied to clipboard

microsoft.applicationinsights.aspnetcore.2.21.0.nupkg: 2 vulnerabilities (highest severity is: 8.1)

Open mend-bolt-for-github[bot] opened this issue 8 months ago • 0 comments

Vulnerable Library - microsoft.applicationinsights.aspnetcore.2.21.0.nupkg

Path to dependency file: /MangoAPI.Presentation/MangoAPI.Presentation.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.extensions.caching.memory/6.0.1/microsoft.extensions.caching.memory.6.0.1.nupkg

Found in HEAD commit: 0c9bb5bd04415d4d387e12646c7ce749fd8ffae2

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (microsoft.applicationinsights.aspnetcore.2.21.0.nupkg version) Remediation Possible**
CVE-2021-24112 High 8.1 system.drawing.common.4.7.0.nupkg Transitive N/A*
CVE-2024-43483 High 7.5 microsoft.extensions.caching.memory.6.0.1.nupkg Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2021-24112

Vulnerable Library - system.drawing.common.4.7.0.nupkg

Provides access to GDI+ graphics functionality.

Commonly Used Types: System.Drawing.Bitmap System.D...

Library home page: https://api.nuget.org/packages/system.drawing.common.4.7.0.nupkg

Path to dependency file: /MangoAPI.BusinessLogic/MangoAPI.BusinessLogic.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.drawing.common/4.7.0/system.drawing.common.4.7.0.nupkg

Dependency Hierarchy:

  • microsoft.applicationinsights.aspnetcore.2.21.0.nupkg (Root Library)
    • microsoft.applicationinsights.perfcountercollector.2.21.0.nupkg
      • system.diagnostics.performancecounter.4.7.0.nupkg
        • system.configuration.configurationmanager.4.7.0.nupkg
          • system.security.permissions.4.7.0.nupkg
            • system.windows.extensions.4.7.0.nupkg
              • :x: system.drawing.common.4.7.0.nupkg (Vulnerable Library)

Found in HEAD commit: 0c9bb5bd04415d4d387e12646c7ce749fd8ffae2

Found in base branch: main

Vulnerability Details

.NET Core Remote Code Execution Vulnerability

Publish Date: 2021-02-25

URL: CVE-2021-24112

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-rxg9-xrhp-64gj

Release Date: 2021-02-25

Fix Resolution: System.Drawing.Common - 4.7.2,5.0.3

Step up your Open Source Security Game with Mend here

CVE-2024-43483

Vulnerable Library - microsoft.extensions.caching.memory.6.0.1.nupkg

In-memory cache implementation of Microsoft.Extensions.Caching.Memory.IMemoryCache.

Library home page: https://api.nuget.org/packages/microsoft.extensions.caching.memory.6.0.1.nupkg

Path to dependency file: /MangoAPI.IntegrationTests/MangoAPI.IntegrationTests.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.extensions.caching.memory/6.0.1/microsoft.extensions.caching.memory.6.0.1.nupkg

Dependency Hierarchy:

  • microsoft.applicationinsights.aspnetcore.2.21.0.nupkg (Root Library)
    • microsoft.applicationinsights.perfcountercollector.2.21.0.nupkg
      • :x: microsoft.extensions.caching.memory.6.0.1.nupkg (Vulnerable Library)

Found in HEAD commit: 0c9bb5bd04415d4d387e12646c7ce749fd8ffae2

Found in base branch: main

Vulnerability Details

.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability

Publish Date: 2024-10-08

URL: CVE-2024-43483

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/dotnet/runtime/security/advisories/GHSA-qj66-m88j-hmgj

Release Date: 2024-10-08

Fix Resolution: System.IO.Packaging - 6.0.1,8.0.1,9.0.0-rc.2.24473.5, Microsoft.Extensions.Caching.Memory - 6.0.2,8.0.1,9.0.0-rc.2.24473.5, System.Security.Cryptography.Cose - 8.0.1,9.0.0-rc.2.24473.5

Step up your Open Source Security Game with Mend here