operatorfabric-core
operatorfabric-core copied to clipboard
CVE-2023-46122 (High) detected in io_2.13-1.9.1.jar
CVE-2023-46122 - High Severity Vulnerability
Vulnerable Library - io_2.13-1.9.1.jar
IO module for sbt
Library home page: https://github.com/sbt/io
Path to dependency file: /src/test/gatling/gatlingTests.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.scala-sbt/io_2.13/1.9.1/ea166891cd1713dd95289fbfb791e60a5decaf3c/io_2.13-1.9.1.jar
Dependency Hierarchy:
- zinc_2.13-1.9.3.jar (Root Library)
- zinc-core_2.13-1.9.3.jar
- :x: io_2.13-1.9.1.jar (Vulnerable Library)
- zinc-core_2.13-1.9.3.jar
Found in HEAD commit: 618b3c3a2d5e3ed5d1a5d21480c82309130389a5
Found in base branch: develop
Vulnerability Details
sbt is a build tool for Scala, Java, and others. Given a specially crafted zip or JAR file, IO.unzip allows writing of arbitrary file. This would have potential to overwrite /root/.ssh/authorized_keys. Within sbt's main code, IO.unzip is used in pullRemoteCache task and Resolvers.remote; however many projects use IO.unzip(...) directly to implement custom tasks. This vulnerability has been patched in version 1.9.7.
Publish Date: 2023-10-23
URL: CVE-2023-46122
CVSS 3 Score Details (7.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-46122
Release Date: 2023-10-23
Fix Resolution (org.scala-sbt:io_2.13): 1.9.7
Direct dependency fix Resolution (org.scala-sbt:zinc_2.13): 1.9.6
Step up your Open Source Security Game with Mend here