sdk-java
sdk-java copied to clipboard
temporal-spring-boot-autoconfigure-alpha-1.17.0-SNAPSHOT: 5 vulnerabilities (highest severity is: 7.5)
Vulnerable Library - temporal-spring-boot-autoconfigure-alpha-1.17.0-SNAPSHOT
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar
Found in HEAD commit: 2c29eda4558f4063804c816481a9f9acf132f65c
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in | Remediation Available | |
|---|---|---|---|---|---|---|
| CVE-2022-25857 | 7.5 | snakeyaml-1.30.jar | Transitive | N/A | ❌ | |
| CVE-2022-38749 | 6.5 | snakeyaml-1.30.jar | Transitive | N/A | ❌ | |
| CVE-2022-38752 | 6.5 | snakeyaml-1.30.jar | Transitive | N/A | ❌ | |
| CVE-2022-38751 | 6.5 | snakeyaml-1.30.jar | Transitive | N/A | ❌ | |
| CVE-2022-38750 | 5.5 | snakeyaml-1.30.jar | Transitive | N/A | ❌ |
Details
CVE-2022-25857
Vulnerable Library - snakeyaml-1.30.jar
YAML 1.1 parser and emitter for Java
Library home page: https://bitbucket.org/snakeyaml/snakeyaml
Path to dependency file: /temporal-spring-boot-starter-alpha/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar
Dependency Hierarchy:
- temporal-spring-boot-autoconfigure-alpha-1.17.0-SNAPSHOT (Root Library)
- spring-boot-dependencies-2.7.4.pom
- :x: snakeyaml-1.30.jar (Vulnerable Library)
- spring-boot-dependencies-2.7.4.pom
Found in HEAD commit: 2c29eda4558f4063804c816481a9f9acf132f65c
Found in base branch: master
Vulnerability Details
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
Publish Date: 2022-08-30
URL: CVE-2022-25857
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857
Release Date: 2022-08-30
Fix Resolution: org.yaml:snakeyaml:1.31
CVE-2022-38749
Vulnerable Library - snakeyaml-1.30.jar
YAML 1.1 parser and emitter for Java
Library home page: https://bitbucket.org/snakeyaml/snakeyaml
Path to dependency file: /temporal-spring-boot-starter-alpha/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar
Dependency Hierarchy:
- temporal-spring-boot-autoconfigure-alpha-1.17.0-SNAPSHOT (Root Library)
- spring-boot-dependencies-2.7.4.pom
- :x: snakeyaml-1.30.jar (Vulnerable Library)
- spring-boot-dependencies-2.7.4.pom
Found in HEAD commit: 2c29eda4558f4063804c816481a9f9acf132f65c
Found in base branch: master
Vulnerability Details
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Publish Date: 2022-09-05
URL: CVE-2022-38749
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027
Release Date: 2022-09-05
Fix Resolution: org.yaml:snakeyaml:1.31
CVE-2022-38752
Vulnerable Library - snakeyaml-1.30.jar
YAML 1.1 parser and emitter for Java
Library home page: https://bitbucket.org/snakeyaml/snakeyaml
Path to dependency file: /temporal-spring-boot-starter-alpha/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar
Dependency Hierarchy:
- temporal-spring-boot-autoconfigure-alpha-1.17.0-SNAPSHOT (Root Library)
- spring-boot-dependencies-2.7.4.pom
- :x: snakeyaml-1.30.jar (Vulnerable Library)
- spring-boot-dependencies-2.7.4.pom
Found in HEAD commit: 2c29eda4558f4063804c816481a9f9acf132f65c
Found in base branch: master
Vulnerability Details
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
Publish Date: 2022-09-05
URL: CVE-2022-38752
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-9w3m-gqgf-c4p9
Release Date: 2022-09-05
Fix Resolution: org.yaml:snakeyaml:1.32
CVE-2022-38751
Vulnerable Library - snakeyaml-1.30.jar
YAML 1.1 parser and emitter for Java
Library home page: https://bitbucket.org/snakeyaml/snakeyaml
Path to dependency file: /temporal-spring-boot-starter-alpha/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar
Dependency Hierarchy:
- temporal-spring-boot-autoconfigure-alpha-1.17.0-SNAPSHOT (Root Library)
- spring-boot-dependencies-2.7.4.pom
- :x: snakeyaml-1.30.jar (Vulnerable Library)
- spring-boot-dependencies-2.7.4.pom
Found in HEAD commit: 2c29eda4558f4063804c816481a9f9acf132f65c
Found in base branch: master
Vulnerability Details
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Publish Date: 2022-09-05
URL: CVE-2022-38751
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039
Release Date: 2022-09-05
Fix Resolution: org.yaml:snakeyaml:1.31
CVE-2022-38750
Vulnerable Library - snakeyaml-1.30.jar
YAML 1.1 parser and emitter for Java
Library home page: https://bitbucket.org/snakeyaml/snakeyaml
Path to dependency file: /temporal-spring-boot-starter-alpha/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar
Dependency Hierarchy:
- temporal-spring-boot-autoconfigure-alpha-1.17.0-SNAPSHOT (Root Library)
- spring-boot-dependencies-2.7.4.pom
- :x: snakeyaml-1.30.jar (Vulnerable Library)
- spring-boot-dependencies-2.7.4.pom
Found in HEAD commit: 2c29eda4558f4063804c816481a9f9acf132f65c
Found in base branch: master
Vulnerability Details
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Publish Date: 2022-09-05
URL: CVE-2022-38750
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027
Release Date: 2022-09-05
Fix Resolution: org.yaml:snakeyaml:1.31
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.