diff --git "a/java/java-sec-code/depscan-universal.vdr.json" "b/java/java-sec-code/depscan-universal.vdr.json" --- "a/java/java-sec-code/depscan-universal.vdr.json" +++ "b/java/java-sec-code/depscan-universal.vdr.json" @@ -1 +1 @@ -{"bomFormat":"CycloneDX","specVersion":"1.6","serialNumber":"urn:uuid:dc31a3d8-54ca-41f6-8c95-57e869855b1d","version":2,"metadata":{"timestamp":"2025-04-29T18:29:31Z","tools":{"components":[{"type":"application","name":"owasp-depscan","version":"6.0.0","purl":"pkg:pypi/owasp-depscan@6.0.0","bom-ref":"pkg:pypi/owasp-depscan@6.0.0"}]}},"components":[{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-web","version":"1.5.1.RELEASE","description":"Starter for building web, including RESTful, applications using Spring\n\t\tMVC. Uses Tomcat as the default embedded container","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-web/1.5.1.RELEASE/spring-boot-starter-web-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-web/1.5.1.RELEASE/spring-boot-starter-web-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-web/1.5.1.RELEASE/spring-boot-starter-web-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-web/1.5.1.RELEASE/spring-boot-starter-web-1.5.1.RELEASE.jar"}]},"tags":["framework","tomcat"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter","version":"1.5.1.RELEASE","description":"Core starter, including auto-configuration support, logging and YAML","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter/1.5.1.RELEASE/spring-boot-starter-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter/1.5.1.RELEASE/spring-boot-starter-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter/1.5.1.RELEASE/spring-boot-starter-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter/1.5.1.RELEASE/spring-boot-starter-1.5.1.RELEASE.jar"}]},"tags":["framework","logging"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot","version":"1.5.1.RELEASE","description":"Spring Boot","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/spring-projects/spring-boot"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot/1.5.1.RELEASE/spring-boot-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot/1.5.1.RELEASE/spring-boot-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot/1.5.1.RELEASE/spring-boot-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot/1.5.1.RELEASE/spring-boot-1.5.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-autoconfigure","version":"1.5.1.RELEASE","description":"Spring Boot AutoConfigure","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/spring-projects/spring-boot"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-autoconfigure/1.5.1.RELEASE/spring-boot-autoconfigure-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-autoconfigure/1.5.1.RELEASE/spring-boot-autoconfigure-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-autoconfigure/1.5.1.RELEASE/spring-boot-autoconfigure-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-autoconfigure/1.5.1.RELEASE/spring-boot-autoconfigure-1.5.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-logging","version":"1.5.1.RELEASE","description":"Starter for logging using Logback. Default logging starter","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-logging/1.5.1.RELEASE/spring-boot-starter-logging-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-logging/1.5.1.RELEASE/spring-boot-starter-logging-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-logging/1.5.1.RELEASE/spring-boot-starter-logging-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-logging/1.5.1.RELEASE/spring-boot-starter-logging-1.5.1.RELEASE.jar"}]},"tags":["framework","logging"]},{"publisher":"QOS.ch","group":"ch.qos.logback","name":"logback-classic","version":"1.1.9","description":"logback-classic module","scope":"required","purl":"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/ceki/logback"}],"type":"library","bom-ref":"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ch/qos/logback/logback-classic/1.1.9/logback-classic-1.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ch/qos/logback/logback-classic/1.1.9/logback-classic-1.1.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ch/qos/logback/logback-classic/1.1.9/logback-classic-1.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ch/qos/logback/logback-classic/1.1.9/logback-classic-1.1.9.jar"}]},"tags":["sql","xml"]},{"publisher":"QOS.ch","group":"ch.qos.logback","name":"logback-core","version":"1.1.9","description":"logback-core module","scope":"required","purl":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/ceki/logback"}],"type":"library","bom-ref":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ch/qos/logback/logback-core/1.1.9/logback-core-1.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ch/qos/logback/logback-core/1.1.9/logback-core-1.1.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ch/qos/logback/logback-core/1.1.9/logback-core-1.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ch/qos/logback/logback-core/1.1.9/logback-core-1.1.9.jar"}]},"tags":["driver","registry","sql","xml"]},{"publisher":"QOS.ch","group":"org.slf4j","name":"jul-to-slf4j","version":"1.7.22","description":"JUL to SLF4J bridge","scope":"required","purl":"pkg:maven/org.slf4j/jul-to-slf4j@1.7.22?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/qos-ch/slf4j"}],"type":"framework","bom-ref":"pkg:maven/org.slf4j/jul-to-slf4j@1.7.22?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/jul-to-slf4j/1.7.22/jul-to-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/jul-to-slf4j/1.7.22/jul-to-slf4j-1.7.22.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/jul-to-slf4j/1.7.22/jul-to-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/jul-to-slf4j/1.7.22/jul-to-slf4j-1.7.22.jar"}]},"tags":["framework","slf4j"]},{"publisher":"QOS.ch","group":"org.slf4j","name":"log4j-over-slf4j","version":"1.7.22","description":"Log4j implemented over SLF4J","scope":"required","purl":"pkg:maven/org.slf4j/log4j-over-slf4j@1.7.22?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/qos-ch/slf4j"}],"type":"framework","bom-ref":"pkg:maven/org.slf4j/log4j-over-slf4j@1.7.22?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/log4j-over-slf4j/1.7.22/log4j-over-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/log4j-over-slf4j/1.7.22/log4j-over-slf4j-1.7.22.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/log4j-over-slf4j/1.7.22/log4j-over-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/log4j-over-slf4j/1.7.22/log4j-over-slf4j-1.7.22.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-tomcat","version":"1.5.1.RELEASE","description":"Starter for using Tomcat as the embedded servlet container. Default\n\t\tservlet container starter used by spring-boot-starter-web","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-tomcat/1.5.1.RELEASE/spring-boot-starter-tomcat-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-tomcat/1.5.1.RELEASE/spring-boot-starter-tomcat-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-tomcat/1.5.1.RELEASE/spring-boot-starter-tomcat-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-tomcat/1.5.1.RELEASE/spring-boot-starter-tomcat-1.5.1.RELEASE.jar"}]},"tags":["framework","tomcat"]},{"group":"org.apache.tomcat.embed","name":"tomcat-embed-core","version":"8.5.11","description":"Core Tomcat implementation","scope":"required","purl":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-core/8.5.11/tomcat-embed-core-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-core/8.5.11/tomcat-embed-core-8.5.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-core/8.5.11/tomcat-embed-core-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-core/8.5.11/tomcat-embed-core-8.5.11.jar"}]},"tags":["framework","tomcat"]},{"group":"org.apache.tomcat.embed","name":"tomcat-embed-el","version":"8.5.11","description":"Core Tomcat implementation","scope":"required","purl":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-el@8.5.11?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-el@8.5.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-el/8.5.11/tomcat-embed-el-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-el/8.5.11/tomcat-embed-el-8.5.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-el/8.5.11/tomcat-embed-el-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-el/8.5.11/tomcat-embed-el-8.5.11.jar"}]},"tags":["framework","tomcat"]},{"group":"org.apache.tomcat.embed","name":"tomcat-embed-websocket","version":"8.5.11","description":"Core Tomcat implementation","scope":"required","purl":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-websocket/8.5.11/tomcat-embed-websocket-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-websocket/8.5.11/tomcat-embed-websocket-8.5.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-websocket/8.5.11/tomcat-embed-websocket-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-websocket/8.5.11/tomcat-embed-websocket-8.5.11.jar"}]},"tags":["framework","tomcat"]},{"group":"org.hibernate","name":"hibernate-validator","version":"5.3.4.Final","description":"Hibernate's Bean Validation (JSR-303) reference implementation.","scope":"required","purl":"pkg:maven/org.hibernate/hibernate-validator@5.3.4.Final?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/hibernate/hibernate-validator"}],"type":"framework","bom-ref":"pkg:maven/org.hibernate/hibernate-validator@5.3.4.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hibernate/hibernate-validator/5.3.4.Final/hibernate-validator-5.3.4.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hibernate/hibernate-validator/5.3.4.Final/hibernate-validator-5.3.4.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hibernate/hibernate-validator/5.3.4.Final/hibernate-validator-5.3.4.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hibernate/hibernate-validator/5.3.4.Final/hibernate-validator-5.3.4.Final.jar"}]},"tags":["framework","validation"]},{"group":"javax.validation","name":"validation-api","version":"1.1.0.Final","description":"\n Bean Validation API\n ","scope":"required","purl":"pkg:maven/javax.validation/validation-api@1.1.0.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/beanvalidation/beanvalidation-api"}],"type":"library","bom-ref":"pkg:maven/javax.validation/validation-api@1.1.0.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar"}]},"tags":["validation"]},{"publisher":"JBoss by Red Hat","group":"org.jboss.logging","name":"jboss-logging","version":"3.3.0.Final","description":"The JBoss Logging Framework","scope":"required","purl":"pkg:maven/org.jboss.logging/jboss-logging@3.3.0.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/jboss-logging/jboss-logging"}],"type":"framework","bom-ref":"pkg:maven/org.jboss.logging/jboss-logging@3.3.0.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar"}]},"tags":["framework","logging"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-web","version":"4.3.6.RELEASE","description":"Spring Web","scope":"required","purl":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-web/4.3.6.RELEASE/spring-web-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-web/4.3.6.RELEASE/spring-web-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-web/4.3.6.RELEASE/spring-web-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-web/4.3.6.RELEASE/spring-web-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-webmvc","version":"4.3.6.RELEASE","description":"Spring Web MVC","scope":"required","purl":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-webmvc/4.3.6.RELEASE/spring-webmvc-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-webmvc/4.3.6.RELEASE/spring-webmvc-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-webmvc/4.3.6.RELEASE/spring-webmvc-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-webmvc/4.3.6.RELEASE/spring-webmvc-4.3.6.RELEASE.jar"}]},"tags":["framework","web"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-thymeleaf","version":"1.5.1.RELEASE","description":"Starter for building MVC web applications using Thymeleaf views","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-thymeleaf@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-thymeleaf@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-thymeleaf/1.5.1.RELEASE/spring-boot-starter-thymeleaf-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-thymeleaf/1.5.1.RELEASE/spring-boot-starter-thymeleaf-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-thymeleaf/1.5.1.RELEASE/spring-boot-starter-thymeleaf-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-thymeleaf/1.5.1.RELEASE/spring-boot-starter-thymeleaf-1.5.1.RELEASE.jar"}]},"tags":["framework","mvc","web"]},{"publisher":"The THYMELEAF team","group":"org.thymeleaf","name":"thymeleaf-spring4","version":"2.1.5.RELEASE","description":"XML/XHTML/HTML5 template engine for Java","scope":"required","purl":"pkg:maven/org.thymeleaf/thymeleaf-spring4@2.1.5.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:thymeleaf/thymeleaf-spring.git"}],"type":"framework","bom-ref":"pkg:maven/org.thymeleaf/thymeleaf-spring4@2.1.5.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/thymeleaf/thymeleaf-spring4/2.1.5.RELEASE/thymeleaf-spring4-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/thymeleaf/thymeleaf-spring4/2.1.5.RELEASE/thymeleaf-spring4-2.1.5.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/thymeleaf/thymeleaf-spring4/2.1.5.RELEASE/thymeleaf-spring4-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/thymeleaf/thymeleaf-spring4/2.1.5.RELEASE/thymeleaf-spring4-2.1.5.RELEASE.jar"}]},"tags":["framework","template"]},{"publisher":"The THYMELEAF team","group":"org.thymeleaf","name":"thymeleaf","version":"2.1.5.RELEASE","description":"XML/XHTML/HTML5 template engine for Java","scope":"required","purl":"pkg:maven/org.thymeleaf/thymeleaf@2.1.5.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:thymeleaf/thymeleaf.git"}],"type":"framework","bom-ref":"pkg:maven/org.thymeleaf/thymeleaf@2.1.5.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/thymeleaf/thymeleaf/2.1.5.RELEASE/thymeleaf-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/thymeleaf/thymeleaf/2.1.5.RELEASE/thymeleaf-2.1.5.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/thymeleaf/thymeleaf/2.1.5.RELEASE/thymeleaf-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/thymeleaf/thymeleaf/2.1.5.RELEASE/thymeleaf-2.1.5.RELEASE.jar"}]},"tags":["framework","template"]},{"publisher":"OpenSymphony","group":"ognl","name":"ognl","version":"3.0.8","description":"OGNL - Object Graph Navigation Library","scope":"required","purl":"pkg:maven/ognl/ognl@3.0.8?type=jar","type":"library","bom-ref":"pkg:maven/ognl/ognl@3.0.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ognl/ognl/3.0.8/ognl-3.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ognl/ognl/3.0.8/ognl-3.0.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ognl/ognl/3.0.8/ognl-3.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ognl/ognl/3.0.8/ognl-3.0.8.jar"}]},"tags":["graph"]},{"publisher":"The UNBESCAPE team","group":"org.unbescape","name":"unbescape","version":"1.1.0.RELEASE","description":"Advanced yet easy-to-use escape/unescape library for Java","scope":"required","purl":"pkg:maven/org.unbescape/unbescape@1.1.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:unbescape/unbescape.git"}],"type":"library","bom-ref":"pkg:maven/org.unbescape/unbescape@1.1.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/unbescape/unbescape/1.1.0.RELEASE/unbescape-1.1.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/unbescape/unbescape/1.1.0.RELEASE/unbescape-1.1.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/unbescape/unbescape/1.1.0.RELEASE/unbescape-1.1.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/unbescape/unbescape/1.1.0.RELEASE/unbescape-1.1.0.RELEASE.jar"}]},"tags":["xml"]},{"group":"nz.net.ultraq.thymeleaf","name":"thymeleaf-layout-dialect","version":"1.4.0","description":"A dialect for Thymeleaf that allows you to use layout/decorator templates to style your content.","scope":"required","purl":"pkg:maven/nz.net.ultraq.thymeleaf/thymeleaf-layout-dialect@1.4.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/ultraq/thymeleaf-layout-dialect"}],"type":"framework","bom-ref":"pkg:maven/nz.net.ultraq.thymeleaf/thymeleaf-layout-dialect@1.4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/nz/net/ultraq/thymeleaf/thymeleaf-layout-dialect/1.4.0/thymeleaf-layout-dialect-1.4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/nz/net/ultraq/thymeleaf/thymeleaf-layout-dialect/1.4.0/thymeleaf-layout-dialect-1.4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/nz/net/ultraq/thymeleaf/thymeleaf-layout-dialect/1.4.0/thymeleaf-layout-dialect-1.4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/nz/net/ultraq/thymeleaf/thymeleaf-layout-dialect/1.4.0/thymeleaf-layout-dialect-1.4.0.jar"}]},"tags":["framework","templates"]},{"publisher":"Apache Software Foundation","group":"org.codehaus.groovy","name":"groovy","version":"2.4.7","description":"Groovy: A powerful, dynamic language for the JVM","scope":"required","purl":"pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/apache/groovy.git"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/groovy/groovy/2.4.7/groovy-2.4.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/groovy/groovy/2.4.7/groovy-2.4.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/groovy/groovy/2.4.7/groovy-2.4.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/groovy/groovy/2.4.7/groovy-2.4.7.jar"}]},"tags":["registry","xml"]},{"publisher":"Oracle Corporation","group":"mysql","name":"mysql-connector-java","version":"8.0.12","description":"JDBC Type 4 driver for MySQL","scope":"required","purl":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/mysql/mysql-connector-j"}],"type":"library","bom-ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/mysql/mysql-connector-java/8.0.12/mysql-connector-java-8.0.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/mysql/mysql-connector-java/8.0.12/mysql-connector-java-8.0.12.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/mysql/mysql-connector-java/8.0.12/mysql-connector-java-8.0.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/mysql/mysql-connector-java/8.0.12/mysql-connector-java-8.0.12.jar"}]},"tags":["algorithm","driver","network","sql","xml"]},{"publisher":"Google","group":"com.google.protobuf","name":"protobuf-java","version":"2.6.0","description":"\n Protocol Buffers are a way of encoding structured data in an efficient yet\n extensible format.\n ","scope":"required","purl":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","externalReferences":[{"type":"vcs","url":"http://code.google.com/p/protobuf/source/browse"}],"type":"library","bom-ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/protobuf/protobuf-java/2.6.0/protobuf-java-2.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/protobuf/protobuf-java/2.6.0/protobuf-java-2.6.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/protobuf/protobuf-java/2.6.0/protobuf-java-2.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/protobuf/protobuf-java/2.6.0/protobuf-java-2.6.0.jar"}]},"tags":["registry"]},{"publisher":"Alibaba Group","group":"com.alibaba","name":"fastjson","version":"1.2.24","description":"\n\t\tFastjson is a JSON processor (JSON parser + JSON generator) written in Java\n\t","scope":"required","purl":"pkg:maven/com.alibaba/fastjson@1.2.24?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/alibaba/fastjson"}],"type":"library","bom-ref":"pkg:maven/com.alibaba/fastjson@1.2.24?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/alibaba/fastjson/1.2.24/fastjson-1.2.24.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/alibaba/fastjson/1.2.24/fastjson-1.2.24.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/alibaba/fastjson/1.2.24/fastjson-1.2.24.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/alibaba/fastjson/1.2.24/fastjson-1.2.24.jar"}]},"tags":["json"]},{"publisher":"JDOM","group":"org.jdom","name":"jdom2","version":"2.0.6","description":"\n\t\tA complete, Java-based solution for accessing, manipulating, \n\t\tand outputting XML data\n\t","scope":"required","purl":"pkg:maven/org.jdom/jdom2@2.0.6?type=jar","type":"library","bom-ref":"pkg:maven/org.jdom/jdom2@2.0.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar"}]},"tags":["xml"]},{"group":"org.dom4j","name":"dom4j","version":"2.1.0","description":"flexible XML framework for Java","scope":"required","purl":"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","type":"framework","bom-ref":"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/dom4j/dom4j/2.1.0/dom4j-2.1.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/dom4j/dom4j/2.1.0/dom4j-2.1.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/dom4j/dom4j/2.1.0/dom4j-2.1.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/dom4j/dom4j/2.1.0/dom4j-2.1.0.jar"}]},"tags":["framework","xml"]},{"publisher":"Codehaus","group":"jaxen","name":"jaxen","version":"1.1.6","description":"Jaxen is a universal Java XPath engine.","scope":"required","purl":"pkg:maven/jaxen/jaxen@1.1.6?type=jar","externalReferences":[{"type":"vcs","url":"http://fisheye.codehaus.org/browse/jaxen/"}],"type":"library","bom-ref":"pkg:maven/jaxen/jaxen@1.1.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/jaxen/jaxen/1.1.6/jaxen-1.1.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/jaxen/jaxen/1.1.6/jaxen-1.1.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/jaxen/jaxen/1.1.6/jaxen-1.1.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/jaxen/jaxen/1.1.6/jaxen-1.1.6.jar"}]}},{"group":"com.google.guava","name":"guava","version":"23.0","description":"\n Guava is a suite of core and expanded libraries that include\n utility classes, google's collections, io classes, and much\n much more.\n ","scope":"required","purl":"pkg:maven/com.google.guava/guava@23.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/google/guava"}],"type":"library","bom-ref":"pkg:maven/com.google.guava/guava@23.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/guava/guava/23.0/guava-23.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/guava/guava/23.0/guava-23.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/guava/guava/23.0/guava-23.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/guava/guava/23.0/guava-23.0.jar"}]},"tags":["network","registry","stripe","xml"]},{"group":"com.google.code.findbugs","name":"jsr305","version":"1.3.9","description":"JSR305 Annotations for Findbugs","scope":"required","purl":"pkg:maven/com.google.code.findbugs/jsr305@1.3.9?type=jar","externalReferences":[{"type":"vcs","url":"http://findbugs.googlecode.com/svn/trunk/"}],"type":"library","bom-ref":"pkg:maven/com.google.code.findbugs/jsr305@1.3.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar"}]}},{"group":"com.google.errorprone","name":"error_prone_annotations","version":"2.0.18","scope":"required","purl":"pkg:maven/com.google.errorprone/error_prone_annotations@2.0.18?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/google/error-prone"}],"type":"library","bom-ref":"pkg:maven/com.google.errorprone/error_prone_annotations@2.0.18?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar"}]}},{"group":"com.google.j2objc","name":"j2objc-annotations","version":"1.1","description":"\n A set of annotations that provide additional information to the J2ObjC\n translator to modify the result of translation.\n ","scope":"required","purl":"pkg:maven/com.google.j2objc/j2objc-annotations@1.1?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.sonatype.org/spice/tags/oss-parent-7"}],"type":"library","bom-ref":"pkg:maven/com.google.j2objc/j2objc-annotations@1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/j2objc/j2objc-annotations/1.1/j2objc-annotations-1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/j2objc/j2objc-annotations/1.1/j2objc-annotations-1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/j2objc/j2objc-annotations/1.1/j2objc-annotations-1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/j2objc/j2objc-annotations/1.1/j2objc-annotations-1.1.jar"}]}},{"group":"org.codehaus.mojo","name":"animal-sniffer-annotations","version":"1.14","description":"\n Animal Sniffer Parent project.\n ","scope":"required","purl":"pkg:maven/org.codehaus.mojo/animal-sniffer-annotations@1.14?type=jar","externalReferences":[{"type":"vcs","url":"http://fisheye.codehaus.org/browse/mojo/tags/animal-sniffer-parent-1.14"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.mojo/animal-sniffer-annotations@1.14?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/mojo/animal-sniffer-annotations/1.14/animal-sniffer-annotations-1.14.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/mojo/animal-sniffer-annotations/1.14/animal-sniffer-annotations-1.14.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/mojo/animal-sniffer-annotations/1.14/animal-sniffer-annotations-1.14.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/mojo/animal-sniffer-annotations/1.14/animal-sniffer-annotations-1.14.jar"}]}},{"publisher":"Apache Software Foundation","group":"commons-collections","name":"commons-collections","version":"3.1","description":"Types that extend and augment the Java Collections Framework.","scope":"required","purl":"pkg:maven/commons-collections/commons-collections@3.1?type=jar","type":"framework","bom-ref":"pkg:maven/commons-collections/commons-collections@3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-collections/commons-collections/3.1/commons-collections-3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-collections/commons-collections/3.1/commons-collections-3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-collections/commons-collections/3.1/commons-collections-3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-collections/commons-collections/3.1/commons-collections-3.1.jar"}]},"tags":["framework"]},{"group":"commons-lang","name":"commons-lang","version":"2.4","description":"\n Commons Lang, a package of Java utility classes for the\n classes that are in java.lang's hierarchy, or are considered to be so\n standard as to justify existence in java.lang.\n ","scope":"required","purl":"pkg:maven/commons-lang/commons-lang@2.4?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/lang/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-lang/commons-lang@2.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-lang/commons-lang/2.4/commons-lang-2.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-lang/commons-lang/2.4/commons-lang-2.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-lang/commons-lang/2.4/commons-lang-2.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-lang/commons-lang/2.4/commons-lang-2.4.jar"}]}},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"httpclient","version":"4.5.12","description":"\n Apache HttpComponents Client\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpclient/4.5.12/httpclient-4.5.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpclient/4.5.12/httpclient-4.5.12.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpclient/4.5.12/httpclient-4.5.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpclient/4.5.12/httpclient-4.5.12.jar"}]},"tags":["framework"]},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"httpcore","version":"4.4.6","description":"\n Apache HttpComponents Core (blocking I/O)\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/httpcore@4.4.6?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/repos/asf/httpcomponents/httpcore/tags/4.4.6"}],"type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/httpcore@4.4.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpcore/4.4.6/httpcore-4.4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpcore/4.4.6/httpcore-4.4.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpcore/4.4.6/httpcore-4.4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpcore/4.4.6/httpcore-4.4.6.jar"}]},"tags":["framework"]},{"group":"commons-codec","name":"commons-codec","version":"1.10","description":"\r\n The Apache Commons Codec package contains simple encoder and decoders for\r\n various formats such as Base64 and Hexadecimal. In addition to these\r\n widely used encoders and decoders, the codec package also maintains a\r\n collection of phonetic encoding utilities.\r\n ","scope":"required","purl":"pkg:maven/commons-codec/commons-codec@1.10?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/codec/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-codec/commons-codec@1.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-codec/commons-codec/1.10/commons-codec-1.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-codec/commons-codec/1.10/commons-codec-1.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-codec/commons-codec/1.10/commons-codec-1.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-codec/commons-codec/1.10/commons-codec-1.10.jar"}]},"tags":["codec"]},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"fluent-hc","version":"4.3.6","description":"\n HttpComponents Client fluent API\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/fluent-hc@4.3.6?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/repos/asf/httpcomponents/httpclient/tags/4.3.6"}],"type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/fluent-hc@4.3.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/fluent-hc/4.3.6/fluent-hc-4.3.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/fluent-hc/4.3.6/fluent-hc-4.3.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/fluent-hc/4.3.6/fluent-hc-4.3.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/fluent-hc/4.3.6/fluent-hc-4.3.6.jar"}]},"tags":["framework"]},{"group":"commons-logging","name":"commons-logging","version":"1.1.3","description":"Commons Logging is a thin adapter allowing configurable bridging to other,\n well known logging systems.","scope":"required","purl":"pkg:maven/commons-logging/commons-logging@1.1.3?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/commons/proper/logging/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-logging/commons-logging@1.1.3?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-logging/commons-logging/1.1.3/commons-logging-1.1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-logging/commons-logging/1.1.3/commons-logging-1.1.3.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-logging/commons-logging/1.1.3/commons-logging-1.1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-logging/commons-logging/1.1.3/commons-logging-1.1.3.jar"}]},"tags":["logging"]},{"group":"org.apache.logging.log4j","name":"log4j-core","version":"2.9.1","description":"The Apache Log4j Implementation","scope":"required","purl":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","externalReferences":[{"type":"vcs","url":"https://git-wip-us.apache.org/repos/asf?p=logging-log4j2.git;a=summary"}],"type":"framework","bom-ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/logging/log4j/log4j-core/2.9.1/log4j-core-2.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/logging/log4j/log4j-core/2.9.1/log4j-core-2.9.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/logging/log4j/log4j-core/2.9.1/log4j-core-2.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/logging/log4j/log4j-core/2.9.1/log4j-core-2.9.1.jar"}]},"tags":["framework"]},{"group":"org.apache.logging.log4j","name":"log4j-api","version":"2.9.1","description":"The Apache Log4j API","scope":"required","purl":"pkg:maven/org.apache.logging.log4j/log4j-api@2.9.1?type=jar","externalReferences":[{"type":"vcs","url":"https://git-wip-us.apache.org/repos/asf?p=logging-log4j2.git;a=summary"}],"type":"framework","bom-ref":"pkg:maven/org.apache.logging.log4j/log4j-api@2.9.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/logging/log4j/log4j-api/2.9.1/log4j-api-2.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/logging/log4j/log4j-api/2.9.1/log4j-api-2.9.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/logging/log4j/log4j-api/2.9.1/log4j-api-2.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/logging/log4j/log4j-api/2.9.1/log4j-api-2.9.1.jar"}]},"tags":["framework"]},{"group":"com.squareup.okhttp","name":"okhttp","version":"2.5.0","description":"An HTTP+SPDY client for Android and Java applications","scope":"required","purl":"pkg:maven/com.squareup.okhttp/okhttp@2.5.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/square/okhttp/"}],"type":"library","bom-ref":"pkg:maven/com.squareup.okhttp/okhttp@2.5.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/squareup/okhttp/okhttp/2.5.0/okhttp-2.5.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/squareup/okhttp/okhttp/2.5.0/okhttp-2.5.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/squareup/okhttp/okhttp/2.5.0/okhttp-2.5.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/squareup/okhttp/okhttp/2.5.0/okhttp-2.5.0.jar"}]},"tags":["network"]},{"group":"com.squareup.okio","name":"okio","version":"1.6.0","description":"A modern I/O API for Java","scope":"required","purl":"pkg:maven/com.squareup.okio/okio@1.6.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/square/okio/"}],"type":"library","bom-ref":"pkg:maven/com.squareup.okio/okio@1.6.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/squareup/okio/okio/1.6.0/okio-1.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/squareup/okio/okio/1.6.0/okio-1.6.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/squareup/okio/okio/1.6.0/okio-1.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/squareup/okio/okio/1.6.0/okio-1.6.0.jar"}]},"tags":["api"]},{"group":"org.apache.commons","name":"commons-digester3","version":"3.2","description":"\n The Apache Commons Digester package lets you configure an XML to Java\n object mapping module which triggers certain actions called rules whenever\n a particular pattern of nested XML elements is recognized.\n ","scope":"required","purl":"pkg:maven/org.apache.commons/commons-digester3@3.2?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/digester/tags/DIGESTER3_3_2_RC2"}],"type":"framework","bom-ref":"pkg:maven/org.apache.commons/commons-digester3@3.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/commons/commons-digester3/3.2/commons-digester3-3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/commons/commons-digester3/3.2/commons-digester3-3.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/commons/commons-digester3/3.2/commons-digester3-3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/commons/commons-digester3/3.2/commons-digester3-3.2.jar"}]},"tags":["framework","xml"]},{"group":"cglib","name":"cglib","version":"2.2.2","description":"Code generation library","scope":"required","purl":"pkg:maven/cglib/cglib@2.2.2?type=jar","externalReferences":[{"type":"vcs","url":"http://cglib.cvs.sourceforge.net/cglib"}],"type":"library","bom-ref":"pkg:maven/cglib/cglib@2.2.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/cglib/cglib/2.2.2/cglib-2.2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/cglib/cglib/2.2.2/cglib-2.2.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/cglib/cglib/2.2.2/cglib-2.2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/cglib/cglib/2.2.2/cglib-2.2.2.jar"}]}},{"publisher":"ObjectWeb","group":"asm","name":"asm","version":"3.3.1","description":"A very small and fast Java bytecode manipulation framework","scope":"required","purl":"pkg:maven/asm/asm@3.3.1?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.forge.objectweb.org/cgi-bin/viewcvs.cgi/asm/trunk/"}],"type":"framework","bom-ref":"pkg:maven/asm/asm@3.3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/asm/asm/3.3.1/asm-3.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/asm/asm/3.3.1/asm-3.3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/asm/asm/3.3.1/asm-3.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/asm/asm/3.3.1/asm-3.3.1.jar"}]},"tags":["bytecode","framework"]},{"group":"org.jolokia","name":"jolokia-core","version":"1.6.0","description":"jar file containing servlet and helper classes","scope":"required","purl":"pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar","type":"library","bom-ref":"pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar"}]},"tags":["network"]},{"group":"com.googlecode.json-simple","name":"json-simple","version":"1.1.1","description":"A simple Java toolkit for JSON","scope":"required","purl":"pkg:maven/com.googlecode.json-simple/json-simple@1.1.1?type=jar","externalReferences":[{"type":"vcs","url":"http://json-simple.googlecode.com/svn/trunk/"}],"type":"library","bom-ref":"pkg:maven/com.googlecode.json-simple/json-simple@1.1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar"}]}},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-actuator","version":"1.5.1.RELEASE","description":"Starter for using Spring Boot's Actuator which provides production\n\t\tready features to help you monitor and manage your application","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-actuator@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-actuator@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-actuator/1.5.1.RELEASE/spring-boot-starter-actuator-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-actuator/1.5.1.RELEASE/spring-boot-starter-actuator-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-actuator/1.5.1.RELEASE/spring-boot-starter-actuator-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-actuator/1.5.1.RELEASE/spring-boot-starter-actuator-1.5.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-actuator","version":"1.5.1.RELEASE","description":"Spring Boot Actuator","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/spring-projects/spring-boot"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-actuator/1.5.1.RELEASE/spring-boot-actuator-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-actuator/1.5.1.RELEASE/spring-boot-actuator-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-actuator/1.5.1.RELEASE/spring-boot-actuator-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-actuator/1.5.1.RELEASE/spring-boot-actuator-1.5.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.cloud","name":"spring-cloud-starter-netflix-eureka-client","version":"1.4.0.RELEASE","description":"Spring Cloud Starter Netflix Eureka Client","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-eureka-client/1.4.0.RELEASE/spring-cloud-starter-netflix-eureka-client-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-eureka-client/1.4.0.RELEASE/spring-cloud-starter-netflix-eureka-client-1.4.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-eureka-client/1.4.0.RELEASE/spring-cloud-starter-netflix-eureka-client-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-eureka-client/1.4.0.RELEASE/spring-cloud-starter-netflix-eureka-client-1.4.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.cloud","name":"spring-cloud-starter","version":"1.1.3.RELEASE","description":"Spring Cloud Starter","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-starter@1.1.3.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-commons"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-starter@1.1.3.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter/1.1.3.RELEASE/spring-cloud-starter-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter/1.1.3.RELEASE/spring-cloud-starter-1.1.3.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter/1.1.3.RELEASE/spring-cloud-starter-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter/1.1.3.RELEASE/spring-cloud-starter-1.1.3.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"org.springframework.cloud","name":"spring-cloud-context","version":"1.1.3.RELEASE","description":"Spring Cloud Context","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-context@1.1.3.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-commons"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-context@1.1.3.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-context/1.1.3.RELEASE/spring-cloud-context-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-context/1.1.3.RELEASE/spring-cloud-context-1.1.3.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-context/1.1.3.RELEASE/spring-cloud-context-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-context/1.1.3.RELEASE/spring-cloud-context-1.1.3.RELEASE.jar"}]},"tags":["cloud","framework"]},{"publisher":"spring.io","group":"org.springframework.security","name":"spring-security-crypto","version":"4.2.1.RELEASE","description":"spring-security-crypto","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-crypto/4.2.1.RELEASE/spring-security-crypto-4.2.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-crypto/4.2.1.RELEASE/spring-security-crypto-4.2.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-crypto/4.2.1.RELEASE/spring-security-crypto-4.2.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-crypto/4.2.1.RELEASE/spring-security-crypto-4.2.1.RELEASE.jar"}]},"tags":["framework"]},{"group":"org.springframework.cloud","name":"spring-cloud-commons","version":"1.1.3.RELEASE","description":"Spring Cloud Commons","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-commons@1.1.3.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-commons"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-commons@1.1.3.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-commons/1.1.3.RELEASE/spring-cloud-commons-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-commons/1.1.3.RELEASE/spring-cloud-commons-1.1.3.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-commons/1.1.3.RELEASE/spring-cloud-commons-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-commons/1.1.3.RELEASE/spring-cloud-commons-1.1.3.RELEASE.jar"}]},"tags":["cloud","framework"]},{"publisher":"SpringSource","group":"org.springframework.security","name":"spring-security-rsa","version":"1.0.3.RELEASE","description":"Spring Security RSA is a small utility library for RSA ciphers.\n\tIt belongs to the family of Spring Security crypto libraries that handle encoding and decoding text as\n\ta general, useful thing to be able to do.","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/spring-projects/spring-security-rsa"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-rsa/1.0.3.RELEASE/spring-security-rsa-1.0.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-rsa/1.0.3.RELEASE/spring-security-rsa-1.0.3.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-rsa/1.0.3.RELEASE/spring-security-rsa-1.0.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-rsa/1.0.3.RELEASE/spring-security-rsa-1.0.3.RELEASE.jar"}]},"tags":["crypto","framework","security"]},{"group":"org.bouncycastle","name":"bcpkix-jdk15on","version":"1.55","description":"The Bouncy Castle Java APIs for CMS, PKCS, EAC, TSP, CMP, CRMF, OCSP, and certificate generation. This jar contains APIs for JDK 1.5 to JDK 1.8. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs.","scope":"required","purl":"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/bcgit/bc-java"}],"type":"framework","bom-ref":"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/bouncycastle/bcpkix-jdk15on/1.55/bcpkix-jdk15on-1.55.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/bouncycastle/bcpkix-jdk15on/1.55/bcpkix-jdk15on-1.55.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/bouncycastle/bcpkix-jdk15on/1.55/bcpkix-jdk15on-1.55.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/bouncycastle/bcpkix-jdk15on/1.55/bcpkix-jdk15on-1.55.jar"}]},"tags":["certificate","framework"]},{"group":"org.bouncycastle","name":"bcprov-jdk15on","version":"1.55","description":"The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.","scope":"required","purl":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/bcgit/bc-java"}],"type":"framework","bom-ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar"}]},"tags":["api","crypto","framework","jce"]},{"group":"org.springframework.cloud","name":"spring-cloud-netflix-core","version":"1.2.0.RELEASE","description":"Spring Cloud Netflix Core","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-netflix-core@1.2.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-netflix"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-netflix-core@1.2.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-netflix-core/1.2.0.RELEASE/spring-cloud-netflix-core-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-netflix-core/1.2.0.RELEASE/spring-cloud-netflix-core-1.2.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-netflix-core/1.2.0.RELEASE/spring-cloud-netflix-core-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-netflix-core/1.2.0.RELEASE/spring-cloud-netflix-core-1.2.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"org.springframework.cloud","name":"spring-cloud-netflix-eureka-client","version":"1.2.0.RELEASE","description":"Spring Cloud Netflix Eureka Client","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-netflix-eureka-client@1.2.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-netflix"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-netflix-eureka-client@1.2.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-netflix-eureka-client/1.2.0.RELEASE/spring-cloud-netflix-eureka-client-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-netflix-eureka-client/1.2.0.RELEASE/spring-cloud-netflix-eureka-client-1.2.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-netflix-eureka-client/1.2.0.RELEASE/spring-cloud-netflix-eureka-client-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-netflix-eureka-client/1.2.0.RELEASE/spring-cloud-netflix-eureka-client-1.2.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"com.netflix.eureka","name":"eureka-client","version":"1.4.11","description":"eureka-client","scope":"required","purl":"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/Netflix/eureka.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/eureka/eureka-client/1.4.11/eureka-client-1.4.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/eureka/eureka-client/1.4.11/eureka-client-1.4.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/eureka/eureka-client/1.4.11/eureka-client-1.4.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/eureka/eureka-client/1.4.11/eureka-client-1.4.11.jar"}]},"tags":["cloud","registry","xml"]},{"group":"org.codehaus.jettison","name":"jettison","version":"1.3.7","description":"A StAX implementation for JSON.","scope":"required","purl":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","externalReferences":[{"type":"vcs","url":"scm:svn:https://svn.codehaus.org/jettison/tags/jettison-1.3.7"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/jettison/jettison/1.3.7/jettison-1.3.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/jettison/jettison/1.3.7/jettison-1.3.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/jettison/jettison/1.3.7/jettison-1.3.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/jettison/jettison/1.3.7/jettison-1.3.7.jar"}]},"tags":["json"]},{"group":"stax","name":"stax-api","version":"1.0.1","description":"StAX API is the standard java XML processing API defined by JSR-173","scope":"required","purl":"pkg:maven/stax/stax-api@1.0.1?type=jar","type":"library","bom-ref":"pkg:maven/stax/stax-api@1.0.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/stax/stax-api/1.0.1/stax-api-1.0.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/stax/stax-api/1.0.1/stax-api-1.0.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/stax/stax-api/1.0.1/stax-api-1.0.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/stax/stax-api/1.0.1/stax-api-1.0.1.jar"}]},"tags":["api","xml"]},{"group":"com.netflix.netflix-commons","name":"netflix-eventbus","version":"0.3.0","description":"netflix-eventbus","scope":"required","purl":"pkg:maven/com.netflix.netflix-commons/netflix-eventbus@0.3.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/netflix-commons.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.netflix-commons/netflix-eventbus@0.3.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-eventbus/0.3.0/netflix-eventbus-0.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-eventbus/0.3.0/netflix-eventbus-0.3.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-eventbus/0.3.0/netflix-eventbus-0.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-eventbus/0.3.0/netflix-eventbus-0.3.0.jar"}]}},{"group":"com.netflix.netflix-commons","name":"netflix-infix","version":"0.3.0","description":"netflix-infix","scope":"required","purl":"pkg:maven/com.netflix.netflix-commons/netflix-infix@0.3.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/netflix-commons.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.netflix-commons/netflix-infix@0.3.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-infix/0.3.0/netflix-infix-0.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-infix/0.3.0/netflix-infix-0.3.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-infix/0.3.0/netflix-infix-0.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-infix/0.3.0/netflix-infix-0.3.0.jar"}]}},{"group":"commons-jxpath","name":"commons-jxpath","version":"1.3","description":"A Java-based implementation of XPath 1.0 that, in addition to XML processing, can inspect/modify Java object graphs (the library's explicit purpose) and even mixed Java/XML structures.","scope":"required","purl":"pkg:maven/commons-jxpath/commons-jxpath@1.3?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/commons/proper/jxpath/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-jxpath/commons-jxpath@1.3?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-jxpath/commons-jxpath/1.3/commons-jxpath-1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-jxpath/commons-jxpath/1.3/commons-jxpath-1.3.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-jxpath/commons-jxpath/1.3/commons-jxpath-1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-jxpath/commons-jxpath/1.3/commons-jxpath-1.3.jar"}]},"tags":["xml"]},{"publisher":"Joda.org","group":"joda-time","name":"joda-time","version":"2.9.7","description":"Date and time library to replace JDK date handling","scope":"required","purl":"pkg:maven/joda-time/joda-time@2.9.7?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/JodaOrg/joda-time"}],"type":"library","bom-ref":"pkg:maven/joda-time/joda-time@2.9.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/joda-time/joda-time/2.9.7/joda-time-2.9.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/joda-time/joda-time/2.9.7/joda-time-2.9.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/joda-time/joda-time/2.9.7/joda-time-2.9.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/joda-time/joda-time/2.9.7/joda-time-2.9.7.jar"}]}},{"group":"org.antlr","name":"antlr-runtime","version":"3.4","description":"A framework for constructing recognizers, compilers, and translators from grammatical descriptions containing Java, C#, C++, or Python actions.","scope":"required","purl":"pkg:maven/org.antlr/antlr-runtime@3.4?type=jar","externalReferences":[{"type":"vcs","url":"http://fisheye2.cenqua.com/browse/antlr"}],"type":"framework","bom-ref":"pkg:maven/org.antlr/antlr-runtime@3.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/antlr/antlr-runtime/3.4/antlr-runtime-3.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/antlr/antlr-runtime/3.4/antlr-runtime-3.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/antlr/antlr-runtime/3.4/antlr-runtime-3.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/antlr/antlr-runtime/3.4/antlr-runtime-3.4.jar"}]},"tags":["framework"]},{"group":"org.antlr","name":"stringtemplate","version":"3.2.1","description":"StringTemplate is a java template engine for generating source code,\r\nweb pages, emails, or any other formatted text output.\r\n\r\nStringTemplate is particularly good at multi-targeted code generators,\r\nmultiple site skins, and internationalization/localization. \r\n\r\nIt evolved over years of effort developing jGuru.com. \r\n\r\nStringTemplate also generates the stringtemplate website: http://www.stringtemplate.org\r\nand powers the ANTLR v3 code generator. Its distinguishing characteristic \r\nis that unlike other engines, it strictly enforces model-view separation.\r\n\r\nStrict separation makes websites and code generators more flexible\r\nand maintainable; it also provides an excellent defense against malicious\r\ntemplate authors.\r\n\r\nThere are currently about 600 StringTemplate source downloads a month.\r\n ","scope":"required","purl":"pkg:maven/org.antlr/stringtemplate@3.2.1?type=jar","externalReferences":[{"type":"vcs","url":"http://fisheye2.cenqua.com/browse/stringtemplate"}],"type":"library","bom-ref":"pkg:maven/org.antlr/stringtemplate@3.2.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar"}]},"tags":["template"]},{"group":"antlr","name":"antlr","version":"2.7.7","description":"\n A framework for constructing recognizers, compilers,\n and translators from grammatical descriptions containing\n Java, C#, C++, or Python actions.\n ","scope":"required","purl":"pkg:maven/antlr/antlr@2.7.7?type=jar","type":"framework","bom-ref":"pkg:maven/antlr/antlr@2.7.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/antlr/antlr/2.7.7/antlr-2.7.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/antlr/antlr/2.7.7/antlr-2.7.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/antlr/antlr/2.7.7/antlr-2.7.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/antlr/antlr/2.7.7/antlr-2.7.7.jar"}]},"tags":["framework"]},{"group":"com.google.code.gson","name":"gson","version":"2.8.0","description":"Gson JSON library","scope":"required","purl":"pkg:maven/com.google.code.gson/gson@2.8.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/google/gson/"}],"type":"library","bom-ref":"pkg:maven/com.google.code.gson/gson@2.8.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/code/gson/gson/2.8.0/gson-2.8.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/code/gson/gson/2.8.0/gson-2.8.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/code/gson/gson/2.8.0/gson-2.8.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/code/gson/gson/2.8.0/gson-2.8.0.jar"}]},"tags":["json"]},{"group":"org.apache.commons","name":"commons-math","version":"2.2","description":"The Math project is a library of lightweight, self-contained mathematics and statistics components addressing the most common practical problems not immediately available in the Java programming language or commons-lang.","scope":"required","purl":"pkg:maven/org.apache.commons/commons-math@2.2?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/math/trunk"}],"type":"framework","bom-ref":"pkg:maven/org.apache.commons/commons-math@2.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/commons/commons-math/2.2/commons-math-2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/commons/commons-math/2.2/commons-math-2.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/commons/commons-math/2.2/commons-math-2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/commons/commons-math/2.2/commons-math-2.2.jar"}]},"tags":["framework"]},{"group":"com.netflix.archaius","name":"archaius-core","version":"0.7.4","description":"archaius-core","scope":"required","purl":"pkg:maven/com.netflix.archaius/archaius-core@0.7.4?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/archaius.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.archaius/archaius-core@0.7.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/archaius/archaius-core/0.7.4/archaius-core-0.7.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/archaius/archaius-core/0.7.4/archaius-core-0.7.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/archaius/archaius-core/0.7.4/archaius-core-0.7.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/archaius/archaius-core/0.7.4/archaius-core-0.7.4.jar"}]}},{"publisher":"Sun Microsystems, Inc","group":"javax.ws.rs","name":"jsr311-api","version":"1.1.1","scope":"required","purl":"pkg:maven/javax.ws.rs/jsr311-api@1.1.1?type=jar","type":"library","bom-ref":"pkg:maven/javax.ws.rs/jsr311-api@1.1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar"}]},"tags":["matrix"]},{"group":"com.netflix.servo","name":"servo-core","version":"0.10.1","description":"servo-core","scope":"required","purl":"pkg:maven/com.netflix.servo/servo-core@0.10.1?type=jar","externalReferences":[{"type":"vcs","url":"scm:https://github.com/Netflix/servo.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.servo/servo-core@0.10.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/servo/servo-core/0.10.1/servo-core-0.10.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/servo/servo-core/0.10.1/servo-core-0.10.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/servo/servo-core/0.10.1/servo-core-0.10.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/servo/servo-core/0.10.1/servo-core-0.10.1.jar"}]},"tags":["registry"]},{"group":"com.netflix.servo","name":"servo-internal","version":"0.10.1","description":"servo-internal","scope":"required","purl":"pkg:maven/com.netflix.servo/servo-internal@0.10.1?type=jar","externalReferences":[{"type":"vcs","url":"scm:https://github.com/Netflix/servo.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.servo/servo-internal@0.10.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/servo/servo-internal/0.10.1/servo-internal-0.10.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/servo/servo-internal/0.10.1/servo-internal-0.10.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/servo/servo-internal/0.10.1/servo-internal-0.10.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/servo/servo-internal/0.10.1/servo-internal-0.10.1.jar"}]}},{"publisher":"Oracle Corporation","group":"com.sun.jersey","name":"jersey-core","version":"1.19.1","description":"\n Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)\n production quality Reference Implementation for building\n RESTful Web services.\n ","scope":"required","purl":"pkg:maven/com.sun.jersey/jersey-core@1.19.1?type=jar","externalReferences":[{"type":"vcs","url":"http://java.net/projects/jersey/sources/svn/show/tags/1.19.1"}],"type":"framework","bom-ref":"pkg:maven/com.sun.jersey/jersey-core@1.19.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/jersey-core/1.19.1/jersey-core-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/jersey-core/1.19.1/jersey-core-1.19.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/jersey-core/1.19.1/jersey-core-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/jersey-core/1.19.1/jersey-core-1.19.1.jar"}]},"tags":["framework","web"]},{"publisher":"Oracle Corporation","group":"com.sun.jersey","name":"jersey-client","version":"1.19.1","description":"\n Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)\n production quality Reference Implementation for building\n RESTful Web services.\n ","scope":"required","purl":"pkg:maven/com.sun.jersey/jersey-client@1.19.1?type=jar","externalReferences":[{"type":"vcs","url":"http://java.net/projects/jersey/sources/svn/show/tags/1.19.1"}],"type":"framework","bom-ref":"pkg:maven/com.sun.jersey/jersey-client@1.19.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/jersey-client/1.19.1/jersey-client-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/jersey-client/1.19.1/jersey-client-1.19.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/jersey-client/1.19.1/jersey-client-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/jersey-client/1.19.1/jersey-client-1.19.1.jar"}]},"tags":["framework","web"]},{"group":"com.sun.jersey.contribs","name":"jersey-apache-client4","version":"1.19.1","description":"\n Projects that provide additional functionality to jersey, like integration\n with other projects/frameworks.\n ","scope":"required","purl":"pkg:maven/com.sun.jersey.contribs/jersey-apache-client4@1.19.1?type=jar","type":"framework","bom-ref":"pkg:maven/com.sun.jersey.contribs/jersey-apache-client4@1.19.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/contribs/jersey-apache-client4/1.19.1/jersey-apache-client4-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/contribs/jersey-apache-client4/1.19.1/jersey-apache-client4-1.19.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/contribs/jersey-apache-client4/1.19.1/jersey-apache-client4-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/contribs/jersey-apache-client4/1.19.1/jersey-apache-client4-1.19.1.jar"}]},"tags":["framework"]},{"publisher":"Google, Inc.","group":"com.google.inject","name":"guice","version":"4.0","description":"\n Guice is a lightweight dependency injection framework for Java 6 and above\n ","scope":"required","purl":"pkg:maven/com.google.inject/guice@4.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/google/guice"}],"type":"framework","bom-ref":"pkg:maven/com.google.inject/guice@4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/guice/4.0/guice-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/guice/4.0/guice-4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/guice/4.0/guice-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/guice/4.0/guice-4.0.jar"}]},"tags":["framework","injection"]},{"group":"javax.inject","name":"javax.inject","version":"1","description":"The javax.inject API","scope":"required","purl":"pkg:maven/javax.inject/javax.inject@1?type=jar","externalReferences":[{"type":"vcs","url":"http://code.google.com/p/atinject/source/checkout"}],"type":"library","bom-ref":"pkg:maven/javax.inject/javax.inject@1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/inject/javax.inject/1/javax.inject-1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/inject/javax.inject/1/javax.inject-1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/inject/javax.inject/1/javax.inject-1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/inject/javax.inject/1/javax.inject-1.jar"}]}},{"group":"com.netflix.governator","name":"governator-api","version":"1.12.10","description":"governator-api","scope":"required","purl":"pkg:maven/com.netflix.governator/governator-api@1.12.10?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/governator.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.governator/governator-api@1.12.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator-api/1.12.10/governator-api-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator-api/1.12.10/governator-api-1.12.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator-api/1.12.10/governator-api-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator-api/1.12.10/governator-api-1.12.10.jar"}]}},{"group":"com.netflix.eureka","name":"eureka-core","version":"1.4.11","description":"eureka-core","scope":"required","purl":"pkg:maven/com.netflix.eureka/eureka-core@1.4.11?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/Netflix/eureka.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.eureka/eureka-core@1.4.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/eureka/eureka-core/1.4.11/eureka-core-1.4.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/eureka/eureka-core/1.4.11/eureka-core-1.4.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/eureka/eureka-core/1.4.11/eureka-core-1.4.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/eureka/eureka-core/1.4.11/eureka-core-1.4.11.jar"}]},"tags":["network","registry"]},{"group":"com.netflix.governator","name":"governator","version":"1.12.10","description":"governator","scope":"required","purl":"pkg:maven/com.netflix.governator/governator@1.12.10?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/governator.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.governator/governator@1.12.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator/1.12.10/governator-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator/1.12.10/governator-1.12.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator/1.12.10/governator-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator/1.12.10/governator-1.12.10.jar"}]},"tags":["driver","framework"]},{"group":"com.netflix.governator","name":"governator-core","version":"1.12.10","description":"governator-core","scope":"required","purl":"pkg:maven/com.netflix.governator/governator-core@1.12.10?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/governator.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.governator/governator-core@1.12.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator-core/1.12.10/governator-core-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator-core/1.12.10/governator-core-1.12.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator-core/1.12.10/governator-core-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator-core/1.12.10/governator-core-1.12.10.jar"}]}},{"group":"com.google.inject.extensions","name":"guice-multibindings","version":"4.0","scope":"required","purl":"pkg:maven/com.google.inject.extensions/guice-multibindings@4.0?type=jar","type":"library","bom-ref":"pkg:maven/com.google.inject.extensions/guice-multibindings@4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-multibindings/4.0/guice-multibindings-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-multibindings/4.0/guice-multibindings-4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-multibindings/4.0/guice-multibindings-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-multibindings/4.0/guice-multibindings-4.0.jar"}]}},{"group":"com.google.inject.extensions","name":"guice-grapher","version":"4.0","scope":"required","purl":"pkg:maven/com.google.inject.extensions/guice-grapher@4.0?type=jar","type":"library","bom-ref":"pkg:maven/com.google.inject.extensions/guice-grapher@4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-grapher/4.0/guice-grapher-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-grapher/4.0/guice-grapher-4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-grapher/4.0/guice-grapher-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-grapher/4.0/guice-grapher-4.0.jar"}]}},{"group":"com.google.inject.extensions","name":"guice-assistedinject","version":"4.0","scope":"required","purl":"pkg:maven/com.google.inject.extensions/guice-assistedinject@4.0?type=jar","type":"library","bom-ref":"pkg:maven/com.google.inject.extensions/guice-assistedinject@4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-assistedinject/4.0/guice-assistedinject-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-assistedinject/4.0/guice-assistedinject-4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-assistedinject/4.0/guice-assistedinject-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-assistedinject/4.0/guice-assistedinject-4.0.jar"}]}},{"publisher":"ObjectWeb","group":"org.ow2.asm","name":"asm","version":"5.0.4","description":"A very small and fast Java bytecode manipulation framework","scope":"required","purl":"pkg:maven/org.ow2.asm/asm@5.0.4?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.forge.objectweb.org/cgi-bin/viewcvs.cgi/asm/trunk/"}],"type":"framework","bom-ref":"pkg:maven/org.ow2.asm/asm@5.0.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/ow2/asm/asm/5.0.4/asm-5.0.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/ow2/asm/asm/5.0.4/asm-5.0.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/ow2/asm/asm/5.0.4/asm-5.0.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/ow2/asm/asm/5.0.4/asm-5.0.4.jar"}]},"tags":["bytecode","framework"]},{"publisher":"Codehaus","group":"org.codehaus.woodstox","name":"woodstox-core-asl","version":"4.4.1","description":"Woodstox is a high-performance XML processor that\nimplements Stax (JSR-173) and SAX2 APIs","scope":"required","purl":"pkg:maven/org.codehaus.woodstox/woodstox-core-asl@4.4.1?type=jar","externalReferences":[{"type":"vcs","url":"http://xircles.codehaus.org/projects/woodstox/repos/primary/repo"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.woodstox/woodstox-core-asl@4.4.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/woodstox/woodstox-core-asl/4.4.1/woodstox-core-asl-4.4.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/woodstox/woodstox-core-asl/4.4.1/woodstox-core-asl-4.4.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/woodstox/woodstox-core-asl/4.4.1/woodstox-core-asl-4.4.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/woodstox/woodstox-core-asl/4.4.1/woodstox-core-asl-4.4.1.jar"}]},"tags":["xml"]},{"group":"javax.xml.stream","name":"stax-api","version":"1.0-2","description":"\n StAX is a standard XML processing API that allows you to stream XML data from and to your application.\n ","scope":"required","purl":"pkg:maven/javax.xml.stream/stax-api@1.0-2?type=jar","type":"library","bom-ref":"pkg:maven/javax.xml.stream/stax-api@1.0-2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/xml/stream/stax-api/1.0-2/stax-api-1.0-2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/xml/stream/stax-api/1.0-2/stax-api-1.0-2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/xml/stream/stax-api/1.0-2/stax-api-1.0-2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/xml/stream/stax-api/1.0-2/stax-api-1.0-2.jar"}]},"tags":["api","stream","xml"]},{"publisher":"fasterxml.com","group":"org.codehaus.woodstox","name":"stax2-api","version":"3.1.4","description":"tax2 API is an extension to basic Stax 1.0 API that adds significant new functionality, such as full-featured bi-direction validation interface and high-performance Typed Access API.\n ","scope":"required","purl":"pkg:maven/org.codehaus.woodstox/stax2-api@3.1.4?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/FasterXML/stax2-api"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.woodstox/stax2-api@3.1.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar"}]},"tags":["api","validation"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.cloud","name":"spring-cloud-starter-netflix-archaius","version":"1.4.0.RELEASE","description":"Spring Cloud Starter Netflix Archaius","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-archaius@1.4.0.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-archaius@1.4.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-archaius/1.4.0.RELEASE/spring-cloud-starter-netflix-archaius-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-archaius/1.4.0.RELEASE/spring-cloud-starter-netflix-archaius-1.4.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-archaius/1.4.0.RELEASE/spring-cloud-starter-netflix-archaius-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-archaius/1.4.0.RELEASE/spring-cloud-starter-netflix-archaius-1.4.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"commons-configuration","name":"commons-configuration","version":"1.8","description":"\r\n Tools to assist in the reading of configuration/preferences files in\r\n various formats\r\n ","scope":"required","purl":"pkg:maven/commons-configuration/commons-configuration@1.8?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/configuration/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-configuration/commons-configuration@1.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-configuration/commons-configuration/1.8/commons-configuration-1.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-configuration/commons-configuration/1.8/commons-configuration-1.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-configuration/commons-configuration/1.8/commons-configuration-1.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-configuration/commons-configuration/1.8/commons-configuration-1.8.jar"}]},"tags":["tools"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.cloud","name":"spring-cloud-starter-netflix-ribbon","version":"1.4.0.RELEASE","description":"Spring Cloud Starter Netflix Ribbon","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-ribbon@1.4.0.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-ribbon@1.4.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-ribbon/1.4.0.RELEASE/spring-cloud-starter-netflix-ribbon-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-ribbon/1.4.0.RELEASE/spring-cloud-starter-netflix-ribbon-1.4.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-ribbon/1.4.0.RELEASE/spring-cloud-starter-netflix-ribbon-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-ribbon/1.4.0.RELEASE/spring-cloud-starter-netflix-ribbon-1.4.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"com.netflix.ribbon","name":"ribbon","version":"2.2.0","description":"ribbon","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon/2.2.0/ribbon-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon/2.2.0/ribbon-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon/2.2.0/ribbon-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon/2.2.0/ribbon-2.2.0.jar"}]},"tags":["matrix"]},{"group":"com.netflix.ribbon","name":"ribbon-transport","version":"2.2.0","description":"ribbon-transport","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-transport@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-transport@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-transport/2.2.0/ribbon-transport-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-transport/2.2.0/ribbon-transport-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-transport/2.2.0/ribbon-transport-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-transport/2.2.0/ribbon-transport-2.2.0.jar"}]}},{"group":"io.reactivex","name":"rxnetty-contexts","version":"0.4.9","description":"rxnetty-contexts","scope":"required","purl":"pkg:maven/io.reactivex/rxnetty-contexts@0.4.9?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:ReactiveX/RxNetty.git"}],"type":"framework","bom-ref":"pkg:maven/io.reactivex/rxnetty-contexts@0.4.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty-contexts/0.4.9/rxnetty-contexts-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty-contexts/0.4.9/rxnetty-contexts-0.4.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty-contexts/0.4.9/rxnetty-contexts-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty-contexts/0.4.9/rxnetty-contexts-0.4.9.jar"}]},"tags":["framework"]},{"group":"io.reactivex","name":"rxnetty-servo","version":"0.4.9","description":"rxnetty-servo","scope":"required","purl":"pkg:maven/io.reactivex/rxnetty-servo@0.4.9?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:ReactiveX/RxNetty.git"}],"type":"framework","bom-ref":"pkg:maven/io.reactivex/rxnetty-servo@0.4.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty-servo/0.4.9/rxnetty-servo-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty-servo/0.4.9/rxnetty-servo-0.4.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty-servo/0.4.9/rxnetty-servo-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty-servo/0.4.9/rxnetty-servo-0.4.9.jar"}]},"tags":["framework"]},{"group":"com.netflix.hystrix","name":"hystrix-core","version":"1.5.5","description":"hystrix-core","scope":"required","purl":"pkg:maven/com.netflix.hystrix/hystrix-core@1.5.5?type=jar","type":"library","bom-ref":"pkg:maven/com.netflix.hystrix/hystrix-core@1.5.5?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/hystrix/hystrix-core/1.5.5/hystrix-core-1.5.5.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/hystrix/hystrix-core/1.5.5/hystrix-core-1.5.5.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/hystrix/hystrix-core/1.5.5/hystrix-core-1.5.5.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/hystrix/hystrix-core/1.5.5/hystrix-core-1.5.5.jar"}]},"tags":["stripe"]},{"group":"org.hdrhistogram","name":"HdrHistogram","version":"2.1.9","description":"\n HdrHistogram supports the recording and analyzing sampled data value\n counts across a configurable integer value range with configurable value\n precision within the range. Value precision is expressed as the number of\n significant digits in the value recording, and provides control over value\n quantization behavior across the value range and the subsequent value\n resolution at any given level.\n ","scope":"required","purl":"pkg:maven/org.hdrhistogram/HdrHistogram@2.1.9?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git://github.com/HdrHistogram/HdrHistogram.git"}],"type":"library","bom-ref":"pkg:maven/org.hdrhistogram/HdrHistogram@2.1.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hdrhistogram/HdrHistogram/2.1.9/HdrHistogram-2.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hdrhistogram/HdrHistogram/2.1.9/HdrHistogram-2.1.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hdrhistogram/HdrHistogram/2.1.9/HdrHistogram-2.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hdrhistogram/HdrHistogram/2.1.9/HdrHistogram-2.1.9.jar"}]}},{"group":"io.reactivex","name":"rxnetty","version":"0.4.9","description":"rxnetty","scope":"required","purl":"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:ReactiveX/RxNetty.git"}],"type":"framework","bom-ref":"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty/0.4.9/rxnetty-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty/0.4.9/rxnetty-0.4.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty/0.4.9/rxnetty-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty/0.4.9/rxnetty-0.4.9.jar"}]},"tags":["framework"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-codec-http","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-codec-http/4.0.27.Final/netty-codec-http-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-codec-http/4.0.27.Final/netty-codec-http-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-codec-http/4.0.27.Final/netty-codec-http-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-codec-http/4.0.27.Final/netty-codec-http-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-codec","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-codec/4.0.27.Final/netty-codec-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-codec/4.0.27.Final/netty-codec-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-codec/4.0.27.Final/netty-codec-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-codec/4.0.27.Final/netty-codec-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-handler","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-handler/4.0.27.Final/netty-handler-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-handler/4.0.27.Final/netty-handler-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-handler/4.0.27.Final/netty-handler-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-handler/4.0.27.Final/netty-handler-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-transport-native-epoll","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-transport-native-epoll@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-transport-native-epoll@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-transport-native-epoll/4.0.27.Final/netty-transport-native-epoll-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-transport-native-epoll/4.0.27.Final/netty-transport-native-epoll-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-transport-native-epoll/4.0.27.Final/netty-transport-native-epoll-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-transport-native-epoll/4.0.27.Final/netty-transport-native-epoll-4.0.27.Final.jar"}]},"tags":["event-driven","framework","native","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-common","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-common/4.0.27.Final/netty-common-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-common/4.0.27.Final/netty-common-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-common/4.0.27.Final/netty-common-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-common/4.0.27.Final/netty-common-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-buffer","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-buffer@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-buffer@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-buffer/4.0.27.Final/netty-buffer-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-buffer/4.0.27.Final/netty-buffer-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-buffer/4.0.27.Final/netty-buffer-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-buffer/4.0.27.Final/netty-buffer-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-transport","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-transport@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-transport@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-transport/4.0.27.Final/netty-transport-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-transport/4.0.27.Final/netty-transport-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-transport/4.0.27.Final/netty-transport-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-transport/4.0.27.Final/netty-transport-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"group":"com.netflix.ribbon","name":"ribbon-core","version":"2.2.0","description":"ribbon-core","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-core@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-core@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-core/2.2.0/ribbon-core-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-core/2.2.0/ribbon-core-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-core/2.2.0/ribbon-core-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-core/2.2.0/ribbon-core-2.2.0.jar"}]}},{"group":"com.netflix.ribbon","name":"ribbon-httpclient","version":"2.2.0","description":"ribbon-httpclient","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-httpclient@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-httpclient@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-httpclient/2.2.0/ribbon-httpclient-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-httpclient/2.2.0/ribbon-httpclient-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-httpclient/2.2.0/ribbon-httpclient-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-httpclient/2.2.0/ribbon-httpclient-2.2.0.jar"}]}},{"group":"com.netflix.netflix-commons","name":"netflix-commons-util","version":"0.1.1","description":"netflix-commons-util developed by Netflix","scope":"required","purl":"pkg:maven/com.netflix.netflix-commons/netflix-commons-util@0.1.1?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:Netflix/netflix-commons.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.netflix-commons/netflix-commons-util@0.1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-commons-util/0.1.1/netflix-commons-util-0.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-commons-util/0.1.1/netflix-commons-util-0.1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-commons-util/0.1.1/netflix-commons-util-0.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-commons-util/0.1.1/netflix-commons-util-0.1.1.jar"}]}},{"group":"com.netflix.ribbon","name":"ribbon-loadbalancer","version":"2.2.0","description":"ribbon-loadbalancer","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-loadbalancer@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-loadbalancer@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-loadbalancer/2.2.0/ribbon-loadbalancer-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-loadbalancer/2.2.0/ribbon-loadbalancer-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-loadbalancer/2.2.0/ribbon-loadbalancer-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-loadbalancer/2.2.0/ribbon-loadbalancer-2.2.0.jar"}]}},{"group":"com.netflix.netflix-commons","name":"netflix-statistics","version":"0.1.1","description":"netflix-statistics developed by Netflix","scope":"required","purl":"pkg:maven/com.netflix.netflix-commons/netflix-statistics@0.1.1?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:Netflix/netflix-commons.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.netflix-commons/netflix-statistics@0.1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-statistics/0.1.1/netflix-statistics-0.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-statistics/0.1.1/netflix-statistics-0.1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-statistics/0.1.1/netflix-statistics-0.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-statistics/0.1.1/netflix-statistics-0.1.1.jar"}]}},{"group":"io.reactivex","name":"rxjava","version":"1.1.10","description":"rxjava","scope":"required","purl":"pkg:maven/io.reactivex/rxjava@1.1.10?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/ReactiveX/RxJava.git"}],"type":"framework","bom-ref":"pkg:maven/io.reactivex/rxjava@1.1.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxjava/1.1.10/rxjava-1.1.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxjava/1.1.10/rxjava-1.1.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxjava/1.1.10/rxjava-1.1.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxjava/1.1.10/rxjava-1.1.10.jar"}]},"tags":["framework"]},{"group":"com.netflix.ribbon","name":"ribbon-eureka","version":"2.2.0","description":"ribbon-eureka","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-eureka@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-eureka@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-eureka/2.2.0/ribbon-eureka-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-eureka/2.2.0/ribbon-eureka-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-eureka/2.2.0/ribbon-eureka-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-eureka/2.2.0/ribbon-eureka-2.2.0.jar"}]}},{"publisher":"FasterXML.com","group":"com.fasterxml.uuid","name":"java-uuid-generator","version":"3.1.4","description":"\nJava UUID Generator (JUG) is a Java library for generating\nUniversally Unique IDentifiers, UUIDs (see http://en.wikipedia.org/wiki/UUID).\nIt can be used either as a component in a bigger application, or as a standalone command line tool.\nJUG generates UUIDs according to the IETF UUID draft specification.\nJUG supports all 3 official UUID generation methods.\n","scope":"required","purl":"pkg:maven/com.fasterxml.uuid/java-uuid-generator@3.1.4?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:cowtowncoder/java-uuid-generator.git"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml.uuid/java-uuid-generator@3.1.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/uuid/java-uuid-generator/3.1.4/java-uuid-generator-3.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/uuid/java-uuid-generator/3.1.4/java-uuid-generator-3.1.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/uuid/java-uuid-generator/3.1.4/java-uuid-generator-3.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/uuid/java-uuid-generator/3.1.4/java-uuid-generator-3.1.4.jar"}]},"tags":["xml"]},{"publisher":"spring.io","group":"org.springframework.security","name":"spring-security-web","version":"4.2.12.RELEASE","description":"spring-security-web","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-web/4.2.12.RELEASE/spring-security-web-4.2.12.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-web/4.2.12.RELEASE/spring-security-web-4.2.12.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-web/4.2.12.RELEASE/spring-security-web-4.2.12.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-web/4.2.12.RELEASE/spring-security-web-4.2.12.RELEASE.jar"}]},"tags":["framework"]},{"group":"aopalliance","name":"aopalliance","version":"1.0","description":"AOP Alliance","scope":"required","purl":"pkg:maven/aopalliance/aopalliance@1.0?type=jar","type":"library","bom-ref":"pkg:maven/aopalliance/aopalliance@1.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/aopalliance/aopalliance/1.0/aopalliance-1.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/aopalliance/aopalliance/1.0/aopalliance-1.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/aopalliance/aopalliance/1.0/aopalliance-1.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/aopalliance/aopalliance/1.0/aopalliance-1.0.jar"}]}},{"publisher":"spring.io","group":"org.springframework.security","name":"spring-security-core","version":"4.2.1.RELEASE","description":"spring-security-core","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-core/4.2.1.RELEASE/spring-security-core-4.2.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-core/4.2.1.RELEASE/spring-security-core-4.2.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-core/4.2.1.RELEASE/spring-security-core-4.2.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-core/4.2.1.RELEASE/spring-security-core-4.2.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-beans","version":"4.3.6.RELEASE","description":"Spring Beans","scope":"required","purl":"pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-beans/4.3.6.RELEASE/spring-beans-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-beans/4.3.6.RELEASE/spring-beans-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-beans/4.3.6.RELEASE/spring-beans-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-beans/4.3.6.RELEASE/spring-beans-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-context","version":"4.3.6.RELEASE","description":"Spring Context","scope":"required","purl":"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-context/4.3.6.RELEASE/spring-context-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-context/4.3.6.RELEASE/spring-context-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-context/4.3.6.RELEASE/spring-context-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-context/4.3.6.RELEASE/spring-context-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-core","version":"4.3.6.RELEASE","description":"Spring Core","scope":"required","purl":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-core/4.3.6.RELEASE/spring-core-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-core/4.3.6.RELEASE/spring-core-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-core/4.3.6.RELEASE/spring-core-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-core/4.3.6.RELEASE/spring-core-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"spring.io","group":"org.springframework.security","name":"spring-security-config","version":"4.2.12.RELEASE","description":"spring-security-config","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-config/4.2.12.RELEASE/spring-security-config-4.2.12.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-config/4.2.12.RELEASE/spring-security-config-4.2.12.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-config/4.2.12.RELEASE/spring-security-config-4.2.12.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-config/4.2.12.RELEASE/spring-security-config-4.2.12.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-aop","version":"4.3.6.RELEASE","description":"Spring AOP","scope":"required","purl":"pkg:maven/org.springframework/spring-aop@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-aop@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-aop/4.3.6.RELEASE/spring-aop-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-aop/4.3.6.RELEASE/spring-aop-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-aop/4.3.6.RELEASE/spring-aop-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-aop/4.3.6.RELEASE/spring-aop-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-security","version":"2.1.5.RELEASE","description":"Starter for using Spring Security","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-security@2.1.5.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-boot/spring-boot-starters/spring-boot-starter-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-security@2.1.5.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-security/2.1.5.RELEASE/spring-boot-starter-security-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-security/2.1.5.RELEASE/spring-boot-starter-security-2.1.5.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-security/2.1.5.RELEASE/spring-boot-starter-security-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-security/2.1.5.RELEASE/spring-boot-starter-security-2.1.5.RELEASE.jar"}]},"tags":["framework"]},{"group":"commons-net","name":"commons-net","version":"3.6","description":"\nApache Commons Net library contains a collection of network utilities and protocol implementations.\nSupported protocols include: Echo, Finger, FTP, NNTP, NTP, POP3(S), SMTP(S), Telnet, Whois\n ","scope":"required","purl":"pkg:maven/commons-net/commons-net@3.6?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/net/tags/NET_3_6"}],"type":"library","bom-ref":"pkg:maven/commons-net/commons-net@3.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-net/commons-net/3.6/commons-net-3.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-net/commons-net/3.6/commons-net-3.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-net/commons-net/3.6/commons-net-3.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-net/commons-net/3.6/commons-net-3.6.jar"}]}},{"publisher":"Apache Software Foundation","group":"commons-httpclient","name":"commons-httpclient","version":"3.1","description":"The HttpClient component supports the client-side of RFC 1945 (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework by which new request types (methods) or HTTP extensions can be created easily.","scope":"required","purl":"pkg:maven/commons-httpclient/commons-httpclient@3.1?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/jakarta/httpcomponents/oac.hc3x/trunk"}],"type":"framework","bom-ref":"pkg:maven/commons-httpclient/commons-httpclient@3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar"}]},"tags":["framework"]},{"group":"org.mybatis.spring.boot","name":"mybatis-spring-boot-starter","version":"1.3.2","description":"Spring Boot Support for MyBatis","scope":"required","purl":"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-starter@1.3.2?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/mybatis/spring-boot-starter/tree/master"}],"type":"framework","bom-ref":"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-starter@1.3.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/spring/boot/mybatis-spring-boot-starter/1.3.2/mybatis-spring-boot-starter-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/spring/boot/mybatis-spring-boot-starter/1.3.2/mybatis-spring-boot-starter-1.3.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/spring/boot/mybatis-spring-boot-starter/1.3.2/mybatis-spring-boot-starter-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/spring/boot/mybatis-spring-boot-starter/1.3.2/mybatis-spring-boot-starter-1.3.2.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-jdbc","version":"1.5.1.RELEASE","description":"Starter for using JDBC with the Tomcat JDBC connection pool","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-jdbc@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-jdbc@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-jdbc/1.5.1.RELEASE/spring-boot-starter-jdbc-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-jdbc/1.5.1.RELEASE/spring-boot-starter-jdbc-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-jdbc/1.5.1.RELEASE/spring-boot-starter-jdbc-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-jdbc/1.5.1.RELEASE/spring-boot-starter-jdbc-1.5.1.RELEASE.jar"}]},"tags":["framework","jdbc","tomcat"]},{"group":"org.apache.tomcat","name":"tomcat-jdbc","version":"8.5.11","description":"Tomcat JDBC Pool Package","scope":"required","purl":"pkg:maven/org.apache.tomcat/tomcat-jdbc@8.5.11?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat/tomcat-jdbc@8.5.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-jdbc/8.5.11/tomcat-jdbc-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-jdbc/8.5.11/tomcat-jdbc-8.5.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-jdbc/8.5.11/tomcat-jdbc-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-jdbc/8.5.11/tomcat-jdbc-8.5.11.jar"}]},"tags":["framework","jdbc","pool"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-jdbc","version":"4.3.6.RELEASE","description":"Spring JDBC","scope":"required","purl":"pkg:maven/org.springframework/spring-jdbc@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-jdbc@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-jdbc/4.3.6.RELEASE/spring-jdbc-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-jdbc/4.3.6.RELEASE/spring-jdbc-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-jdbc/4.3.6.RELEASE/spring-jdbc-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-jdbc/4.3.6.RELEASE/spring-jdbc-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-tx","version":"4.3.6.RELEASE","description":"Spring Transaction","scope":"required","purl":"pkg:maven/org.springframework/spring-tx@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-tx@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-tx/4.3.6.RELEASE/spring-tx-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-tx/4.3.6.RELEASE/spring-tx-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-tx/4.3.6.RELEASE/spring-tx-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-tx/4.3.6.RELEASE/spring-tx-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"group":"org.mybatis.spring.boot","name":"mybatis-spring-boot-autoconfigure","version":"1.3.2","description":"Spring Boot Support for MyBatis","scope":"required","purl":"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-autoconfigure@1.3.2?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/mybatis/spring-boot-starter/tree/master"}],"type":"framework","bom-ref":"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-autoconfigure@1.3.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/spring/boot/mybatis-spring-boot-autoconfigure/1.3.2/mybatis-spring-boot-autoconfigure-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/spring/boot/mybatis-spring-boot-autoconfigure/1.3.2/mybatis-spring-boot-autoconfigure-1.3.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/spring/boot/mybatis-spring-boot-autoconfigure/1.3.2/mybatis-spring-boot-autoconfigure-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/spring/boot/mybatis-spring-boot-autoconfigure/1.3.2/mybatis-spring-boot-autoconfigure-1.3.2.jar"}]},"tags":["framework"]},{"publisher":"MyBatis.org","group":"org.mybatis","name":"mybatis","version":"3.4.6","description":"\n The MyBatis SQL mapper framework makes it easier to use a relational database with object-oriented\n applications. MyBatis couples objects with stored procedures or SQL statements using a XML descriptor or\n annotations. Simplicity is the biggest advantage of the MyBatis data mapper over object relational mapping\n tools.\n ","scope":"required","purl":"pkg:maven/org.mybatis/mybatis@3.4.6?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/mybatis/mybatis-3"}],"type":"framework","bom-ref":"pkg:maven/org.mybatis/mybatis@3.4.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/mybatis/3.4.6/mybatis-3.4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/mybatis/3.4.6/mybatis-3.4.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/mybatis/3.4.6/mybatis-3.4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/mybatis/3.4.6/mybatis-3.4.6.jar"}]},"tags":["database","framework","sql","tools","xml"]},{"publisher":"MyBatis.org","group":"org.mybatis","name":"mybatis-spring","version":"1.3.2","description":"An easy-to-use Spring bridge for MyBatis sql mapping framework.","scope":"required","purl":"pkg:maven/org.mybatis/mybatis-spring@1.3.2?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/mybatis/spring"}],"type":"framework","bom-ref":"pkg:maven/org.mybatis/mybatis-spring@1.3.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/mybatis-spring/1.3.2/mybatis-spring-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/mybatis-spring/1.3.2/mybatis-spring-1.3.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/mybatis-spring/1.3.2/mybatis-spring-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/mybatis-spring/1.3.2/mybatis-spring-1.3.2.jar"}]},"tags":["framework","sql"]},{"publisher":"The Apache Software Foundation","group":"org.apache.velocity","name":"velocity","version":"1.7","description":"Apache Velocity is a general purpose template engine.","scope":"required","purl":"pkg:maven/org.apache.velocity/velocity@1.7?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/velocity/engine/trunk"}],"type":"framework","bom-ref":"pkg:maven/org.apache.velocity/velocity@1.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/velocity/velocity/1.7/velocity-1.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/velocity/velocity/1.7/velocity-1.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/velocity/velocity/1.7/velocity-1.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/velocity/velocity/1.7/velocity-1.7.jar"}]},"tags":["framework","template"]},{"publisher":"XStream","group":"com.thoughtworks.xstream","name":"xstream","version":"1.4.20","description":"\n XStream is a serialization library from Java objects to XML and back.\n ","scope":"required","purl":"pkg:maven/com.thoughtworks.xstream/xstream@1.4.20?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/x-stream/xstream"}],"type":"library","bom-ref":"pkg:maven/com.thoughtworks.xstream/xstream@1.4.20?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar"}]},"tags":["serialization","xml"]},{"group":"io.github.x-stream","name":"mxparser","version":"1.2.2","description":"\n MXParser is a fork of xpp3_min 1.1.7 containing only the parser with merged changes of the Plexus fork.\n ","scope":"required","purl":"pkg:maven/io.github.x-stream/mxparser@1.2.2?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/x-stream/mxparser"}],"type":"library","bom-ref":"pkg:maven/io.github.x-stream/mxparser@1.2.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar"}]},"tags":["parse"]},{"group":"xmlpull","name":"xmlpull","version":"1.1.3.1","scope":"required","purl":"pkg:maven/xmlpull/xmlpull@1.1.3.1?type=jar","type":"library","bom-ref":"pkg:maven/xmlpull/xmlpull@1.1.3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar"}]},"tags":["xml"]},{"publisher":"Apache Software Foundation","group":"org.apache.poi","name":"poi","version":"3.10-FINAL","description":"Apache POI - Java API To Access Microsoft Format Files","scope":"required","purl":"pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi/3.10-FINAL/poi-3.10-FINAL.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi/3.10-FINAL/poi-3.10-FINAL.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi/3.10-FINAL/poi-3.10-FINAL.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi/3.10-FINAL/poi-3.10-FINAL.jar"}]},"tags":["api","framework"]},{"publisher":"Apache Software Foundation","group":"org.apache.poi","name":"poi-ooxml","version":"3.9","description":"Apache POI - Java API To Access Microsoft Format Files","scope":"required","purl":"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi-ooxml/3.9/poi-ooxml-3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi-ooxml/3.9/poi-ooxml-3.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi-ooxml/3.9/poi-ooxml-3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi-ooxml/3.9/poi-ooxml-3.9.jar"}]},"tags":["api","framework"]},{"publisher":"Apache Software Foundation","group":"org.apache.poi","name":"poi-ooxml-schemas","version":"3.9","description":"Apache POI - Java API To Access Microsoft Format Files","scope":"required","purl":"pkg:maven/org.apache.poi/poi-ooxml-schemas@3.9?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.poi/poi-ooxml-schemas@3.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi-ooxml-schemas/3.9/poi-ooxml-schemas-3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi-ooxml-schemas/3.9/poi-ooxml-schemas-3.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi-ooxml-schemas/3.9/poi-ooxml-schemas-3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi-ooxml-schemas/3.9/poi-ooxml-schemas-3.9.jar"}]},"tags":["api","framework"]},{"publisher":"XmlBeans","group":"org.apache.xmlbeans","name":"xmlbeans","version":"2.3.0","description":"XmlBeans main jar","scope":"required","purl":"pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/repos/asf/xmlbeans/"}],"type":"framework","bom-ref":"pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/xmlbeans/xmlbeans/2.3.0/xmlbeans-2.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/xmlbeans/xmlbeans/2.3.0/xmlbeans-2.3.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/xmlbeans/xmlbeans/2.3.0/xmlbeans-2.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/xmlbeans/xmlbeans/2.3.0/xmlbeans-2.3.0.jar"}]},"tags":["framework"]},{"publisher":"MetaStuff Ltd.","group":"dom4j","name":"dom4j","version":"1.6.1","description":"dom4j: the flexible XML framework for Java","scope":"required","purl":"pkg:maven/dom4j/dom4j@1.6.1?type=jar","externalReferences":[{"type":"vcs","url":"http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/dom4j/dom4j/"}],"type":"framework","bom-ref":"pkg:maven/dom4j/dom4j@1.6.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar"}]},"tags":["framework","xml"]},{"group":"com.monitorjbl","name":"xlsx-streamer","version":"2.0.0","description":"Streaming Excel reader","scope":"required","purl":"pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/monitorjbl/excel-streaming-reader.git"}],"type":"library","bom-ref":"pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/monitorjbl/xlsx-streamer/2.0.0/xlsx-streamer-2.0.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/monitorjbl/xlsx-streamer/2.0.0/xlsx-streamer-2.0.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/monitorjbl/xlsx-streamer/2.0.0/xlsx-streamer-2.0.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/monitorjbl/xlsx-streamer/2.0.0/xlsx-streamer-2.0.0.jar"}]},"tags":["xml"]},{"group":"com.rackspace.apache","name":"xerces2-xsd11","version":"2.11.1","description":"A processor for parsing, validating, serializing and manipulating XML, written in Java","scope":"required","purl":"pkg:maven/com.rackspace.apache/xerces2-xsd11@2.11.1?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/sharwell/xerces2-j/tree/rackspace-master-xsd11"}],"type":"library","bom-ref":"pkg:maven/com.rackspace.apache/xerces2-xsd11@2.11.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/rackspace/apache/xerces2-xsd11/2.11.1/xerces2-xsd11-2.11.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/rackspace/apache/xerces2-xsd11/2.11.1/xerces2-xsd11-2.11.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/rackspace/apache/xerces2-xsd11/2.11.1/xerces2-xsd11-2.11.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/rackspace/apache/xerces2-xsd11/2.11.1/xerces2-xsd11-2.11.1.jar"}]},"tags":["xml"]},{"group":"com.rackspace.eclipse.webtools.sourceediting","name":"org.eclipse.wst.xml.xpath2.processor","version":"2.1.100","description":"Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/ ","scope":"required","purl":"pkg:maven/com.rackspace.eclipse.webtools.sourceediting/org.eclipse.wst.xml.xpath2.processor@2.1.100?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/sharwell/webtools.sourceediting.xpath/tree/master/bundles/org.eclipse.wst.xml.xpath2.processor"}],"type":"library","bom-ref":"pkg:maven/com.rackspace.eclipse.webtools.sourceediting/org.eclipse.wst.xml.xpath2.processor@2.1.100?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/rackspace/eclipse/webtools/sourceediting/org.eclipse.wst.xml.xpath2.processor/2.1.100/org.eclipse.wst.xml.xpath2.processor-2.1.100.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/rackspace/eclipse/webtools/sourceediting/org.eclipse.wst.xml.xpath2.processor/2.1.100/org.eclipse.wst.xml.xpath2.processor-2.1.100.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/rackspace/eclipse/webtools/sourceediting/org.eclipse.wst.xml.xpath2.processor/2.1.100/org.eclipse.wst.xml.xpath2.processor-2.1.100.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/rackspace/eclipse/webtools/sourceediting/org.eclipse.wst.xml.xpath2.processor/2.1.100/org.eclipse.wst.xml.xpath2.processor-2.1.100.jar"}]},"tags":["xml"]},{"group":"edu.princeton.cup","name":"java-cup","version":"10k","description":"LALR Parser Generator in Java","scope":"required","purl":"pkg:maven/edu.princeton.cup/java-cup@10k?type=jar","externalReferences":[{"type":"vcs","url":"https://www2.in.tum.de/repos/cup/develop/"}],"type":"library","bom-ref":"pkg:maven/edu.princeton.cup/java-cup@10k?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/edu/princeton/cup/java-cup/10k/java-cup-10k.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/edu/princeton/cup/java-cup/10k/java-cup-10k.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/edu/princeton/cup/java-cup/10k/java-cup-10k.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/edu/princeton/cup/java-cup/10k/java-cup-10k.jar"}]}},{"group":"com.ibm.icu","name":"icu4j","version":"4.6","description":"\n International Component for Unicode for Java (ICU4J) is a mature, widely used Java library\n providing Unicode and Globalization support \n ","scope":"required","purl":"pkg:maven/com.ibm.icu/icu4j@4.6?type=jar","externalReferences":[{"type":"vcs","url":"http://source.icu-project.org/repos/icu/icu4j/trunk/"}],"type":"library","bom-ref":"pkg:maven/com.ibm.icu/icu4j@4.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/ibm/icu/icu4j/4.6/icu4j-4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/ibm/icu/icu4j/4.6/icu4j-4.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/ibm/icu/icu4j/4.6/icu4j-4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/ibm/icu/icu4j/4.6/icu4j-4.6.jar"}]},"tags":["algorithm","registry","xml"]},{"publisher":"Apache Software Foundation","group":"xml-resolver","name":"xml-resolver","version":"1.2","description":"xml-commons provides an Apache-hosted set of DOM, SAX, and \n JAXP interfaces for use in other xml-based projects. Our hope is that we \n can standardize on both a common version and packaging scheme for these \n critical XML standards interfaces to make the lives of both our developers \n and users easier.","scope":"required","purl":"pkg:maven/xml-resolver/xml-resolver@1.2?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/xml/commons/tags/xml-commons-resolver-1_2/"}],"type":"library","bom-ref":"pkg:maven/xml-resolver/xml-resolver@1.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xml-resolver/xml-resolver/1.2/xml-resolver-1.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xml-resolver/xml-resolver/1.2/xml-resolver-1.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xml-resolver/xml-resolver/1.2/xml-resolver-1.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xml-resolver/xml-resolver/1.2/xml-resolver-1.2.jar"}]},"tags":["xml"]},{"group":"xml-apis","name":"xml-apis","version":"1.4.01","description":"xml-commons provides an Apache-hosted set of DOM, SAX, and \r\n JAXP interfaces for use in other xml-based projects. Our hope is that we \r\n can standardize on both a common version and packaging scheme for these \r\n critical XML standards interfaces to make the lives of both our developers \r\n and users easier. The External Components portion of xml-commons contains \r\n interfaces that are defined by external standards organizations. For DOM, \r\n that's the W3C; for SAX it's David Megginson and sax.sourceforge.net; for \r\n JAXP it's Sun.","scope":"required","purl":"pkg:maven/xml-apis/xml-apis@1.4.01?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/viewvc/xml/commons/tags/xml-commons-external-1_4_01/"}],"type":"library","bom-ref":"pkg:maven/xml-apis/xml-apis@1.4.01?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xml-apis/xml-apis/1.4.01/xml-apis-1.4.01.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xml-apis/xml-apis/1.4.01/xml-apis-1.4.01.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xml-apis/xml-apis/1.4.01/xml-apis-1.4.01.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xml-apis/xml-apis/1.4.01/xml-apis-1.4.01.jar"}]},"tags":["xml"]},{"publisher":"QOS.ch","group":"org.slf4j","name":"slf4j-api","version":"1.7.22","description":"The slf4j API","scope":"required","purl":"pkg:maven/org.slf4j/slf4j-api@1.7.22?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/qos-ch/slf4j"}],"type":"framework","bom-ref":"pkg:maven/org.slf4j/slf4j-api@1.7.22?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/slf4j-api/1.7.22/slf4j-api-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/slf4j-api/1.7.22/slf4j-api-1.7.22.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/slf4j-api/1.7.22/slf4j-api-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/slf4j-api/1.7.22/slf4j-api-1.7.22.jar"}]},"tags":["framework","slf4j"]},{"publisher":"Jonathan Hedley","group":"org.jsoup","name":"jsoup","version":"1.10.2","description":"jsoup is a Java library for working with real-world HTML. It provides a very convenient API for extracting and manipulating data, using the best of DOM, CSS, and jquery-like methods. jsoup implements the WHATWG HTML5 specification, and parses HTML to the same DOM as modern browsers do.","scope":"required","purl":"pkg:maven/org.jsoup/jsoup@1.10.2?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/jhy/jsoup"}],"type":"library","bom-ref":"pkg:maven/org.jsoup/jsoup@1.10.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jsoup/jsoup/1.10.2/jsoup-1.10.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jsoup/jsoup/1.10.2/jsoup-1.10.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jsoup/jsoup/1.10.2/jsoup-1.10.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jsoup/jsoup/1.10.2/jsoup-1.10.2.jar"}]},"tags":["api","html"]},{"group":"commons-io","name":"commons-io","version":"2.5","description":"\nThe Apache Commons IO library contains utility classes, stream implementations, file filters, \nfile comparators, endian transformation classes, and much more.\n ","scope":"required","purl":"pkg:maven/commons-io/commons-io@2.5?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/io/tags/commons-io-2.5"}],"type":"library","bom-ref":"pkg:maven/commons-io/commons-io@2.5?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-io/commons-io/2.5/commons-io-2.5.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-io/commons-io/2.5/commons-io-2.5.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-io/commons-io/2.5/commons-io-2.5.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-io/commons-io/2.5/commons-io-2.5.jar"}]},"tags":["stream"]},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"httpasyncclient","version":"4.1.4","description":"\n Apache HttpComponents AsyncClient\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/httpasyncclient@4.1.4?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/repos/asf/httpcomponents/httpasyncclient/branches/4.1.x"}],"type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/httpasyncclient@4.1.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpasyncclient/4.1.4/httpasyncclient-4.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpasyncclient/4.1.4/httpasyncclient-4.1.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpasyncclient/4.1.4/httpasyncclient-4.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpasyncclient/4.1.4/httpasyncclient-4.1.4.jar"}]},"tags":["framework"]},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"httpcore-nio","version":"4.4.10","description":"\n Apache HttpComponents Core (non-blocking I/O)\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/httpcore-nio@4.4.10?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/httpcore-nio@4.4.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpcore-nio/4.4.10/httpcore-nio-4.4.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpcore-nio/4.4.10/httpcore-nio-4.4.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpcore-nio/4.4.10/httpcore-nio-4.4.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpcore-nio/4.4.10/httpcore-nio-4.4.10.jar"}]},"tags":["framework"]},{"group":"io.springfox","name":"springfox-swagger2","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-swagger2@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-swagger2@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger2/2.9.2/springfox-swagger2-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger2/2.9.2/springfox-swagger2-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger2/2.9.2/springfox-swagger2-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger2/2.9.2/springfox-swagger2-2.9.2.jar"}]},"tags":["api"]},{"group":"io.swagger","name":"swagger-annotations","version":"1.5.20","scope":"required","purl":"pkg:maven/io.swagger/swagger-annotations@1.5.20?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/swagger-api/swagger-core"}],"type":"library","bom-ref":"pkg:maven/io.swagger/swagger-annotations@1.5.20?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/swagger/swagger-annotations/1.5.20/swagger-annotations-1.5.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/swagger/swagger-annotations/1.5.20/swagger-annotations-1.5.20.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/swagger/swagger-annotations/1.5.20/swagger-annotations-1.5.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/swagger/swagger-annotations/1.5.20/swagger-annotations-1.5.20.jar"}]}},{"group":"io.swagger","name":"swagger-models","version":"1.5.20","scope":"required","purl":"pkg:maven/io.swagger/swagger-models@1.5.20?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/swagger-api/swagger-core"}],"type":"library","bom-ref":"pkg:maven/io.swagger/swagger-models@1.5.20?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/swagger/swagger-models/1.5.20/swagger-models-1.5.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/swagger/swagger-models/1.5.20/swagger-models-1.5.20.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/swagger/swagger-models/1.5.20/swagger-models-1.5.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/swagger/swagger-models/1.5.20/swagger-models-1.5.20.jar"}]},"tags":["xml"]},{"group":"io.springfox","name":"springfox-spi","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-spi@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-spi@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-spi/2.9.2/springfox-spi-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-spi/2.9.2/springfox-spi-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-spi/2.9.2/springfox-spi-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-spi/2.9.2/springfox-spi-2.9.2.jar"}]},"tags":["api"]},{"group":"io.springfox","name":"springfox-core","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-core@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-core@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-core/2.9.2/springfox-core-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-core/2.9.2/springfox-core-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-core/2.9.2/springfox-core-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-core/2.9.2/springfox-core-2.9.2.jar"}]},"tags":["api"]},{"group":"net.bytebuddy","name":"byte-buddy","version":"1.8.12","description":"Byte Buddy is a Java library for creating Java classes at run time.\r\n This artifact is a build of Byte Buddy with all ASM dependencies repackaged into its own name space.","scope":"required","purl":"pkg:maven/net.bytebuddy/byte-buddy@1.8.12?type=jar","type":"library","bom-ref":"pkg:maven/net.bytebuddy/byte-buddy@1.8.12?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/bytebuddy/byte-buddy/1.8.12/byte-buddy-1.8.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/bytebuddy/byte-buddy/1.8.12/byte-buddy-1.8.12.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/bytebuddy/byte-buddy/1.8.12/byte-buddy-1.8.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/bytebuddy/byte-buddy/1.8.12/byte-buddy-1.8.12.jar"}]},"tags":["registry"]},{"group":"io.springfox","name":"springfox-schema","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-schema@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-schema@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-schema/2.9.2/springfox-schema-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-schema/2.9.2/springfox-schema-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-schema/2.9.2/springfox-schema-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-schema/2.9.2/springfox-schema-2.9.2.jar"}]},"tags":["api"]},{"group":"io.springfox","name":"springfox-swagger-common","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-swagger-common@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-swagger-common@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger-common/2.9.2/springfox-swagger-common-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger-common/2.9.2/springfox-swagger-common-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger-common/2.9.2/springfox-swagger-common-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger-common/2.9.2/springfox-swagger-common-2.9.2.jar"}]},"tags":["api"]},{"group":"io.springfox","name":"springfox-spring-web","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-spring-web@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-spring-web@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-spring-web/2.9.2/springfox-spring-web-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-spring-web/2.9.2/springfox-spring-web-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-spring-web/2.9.2/springfox-spring-web-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-spring-web/2.9.2/springfox-spring-web-2.9.2.jar"}]},"tags":["api"]},{"publisher":"fasterxml.com","group":"com.fasterxml","name":"classmate","version":"1.3.3","description":"Library for introspecting types with full generic information\n including resolving of field and method types.\n ","scope":"required","purl":"pkg:maven/com.fasterxml/classmate@1.3.3?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/cowtowncoder/java-classmate"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml/classmate@1.3.3?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/classmate/1.3.3/classmate-1.3.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/classmate/1.3.3/classmate-1.3.3.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/classmate/1.3.3/classmate-1.3.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/classmate/1.3.3/classmate-1.3.3.jar"}]},"tags":["xml"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.plugin","name":"spring-plugin-core","version":"1.2.0.RELEASE","description":"Core plugin infrastructure","scope":"required","purl":"pkg:maven/org.springframework.plugin/spring-plugin-core@1.2.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-plugin"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.plugin/spring-plugin-core@1.2.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/plugin/spring-plugin-core/1.2.0.RELEASE/spring-plugin-core-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/plugin/spring-plugin-core/1.2.0.RELEASE/spring-plugin-core-1.2.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/plugin/spring-plugin-core/1.2.0.RELEASE/spring-plugin-core-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/plugin/spring-plugin-core/1.2.0.RELEASE/spring-plugin-core-1.2.0.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.plugin","name":"spring-plugin-metadata","version":"1.2.0.RELEASE","description":"Extension package for metadata based plugins","scope":"required","purl":"pkg:maven/org.springframework.plugin/spring-plugin-metadata@1.2.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-plugin"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.plugin/spring-plugin-metadata@1.2.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/plugin/spring-plugin-metadata/1.2.0.RELEASE/spring-plugin-metadata-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/plugin/spring-plugin-metadata/1.2.0.RELEASE/spring-plugin-metadata-1.2.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/plugin/spring-plugin-metadata/1.2.0.RELEASE/spring-plugin-metadata-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/plugin/spring-plugin-metadata/1.2.0.RELEASE/spring-plugin-metadata-1.2.0.RELEASE.jar"}]},"tags":["framework"]},{"group":"org.mapstruct","name":"mapstruct","version":"1.2.0.Final","description":"An annotation processor for generating type-safe bean mappers","scope":"required","purl":"pkg:maven/org.mapstruct/mapstruct@1.2.0.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/mapstruct/mapstruct/"}],"type":"library","bom-ref":"pkg:maven/org.mapstruct/mapstruct@1.2.0.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mapstruct/mapstruct/1.2.0.Final/mapstruct-1.2.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mapstruct/mapstruct/1.2.0.Final/mapstruct-1.2.0.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mapstruct/mapstruct/1.2.0.Final/mapstruct-1.2.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mapstruct/mapstruct/1.2.0.Final/mapstruct-1.2.0.Final.jar"}]}},{"group":"io.springfox","name":"springfox-swagger-ui","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-swagger-ui@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-swagger-ui@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger-ui/2.9.2/springfox-swagger-ui-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger-ui/2.9.2/springfox-swagger-ui-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger-ui/2.9.2/springfox-swagger-ui-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger-ui/2.9.2/springfox-swagger-ui-2.9.2.jar"}]},"tags":["api"]},{"group":"org.projectlombok","name":"lombok","version":"1.18.30","description":"Spice up your java: Automatic Resource Management, automatic generation of getters, setters, equals, hashCode and toString, and more!","scope":"excluded","purl":"pkg:maven/org.projectlombok/lombok@1.18.30?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/projectlombok/lombok"}],"type":"library","bom-ref":"pkg:maven/org.projectlombok/lombok@1.18.30?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/projectlombok/lombok/1.18.30/lombok-1.18.30.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/projectlombok/lombok/1.18.30/lombok-1.18.30.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/projectlombok/lombok/1.18.30/lombok-1.18.30.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/projectlombok/lombok/1.18.30/lombok-1.18.30.jar"}]},"tags":["resource"]},{"group":"org.yaml","name":"snakeyaml","version":"1.21","description":"YAML 1.1 parser and emitter for Java","scope":"required","purl":"pkg:maven/org.yaml/snakeyaml@1.21?type=jar","externalReferences":[{"type":"vcs","url":"https://bitbucket.org/asomov/snakeyaml/src"}],"type":"library","bom-ref":"pkg:maven/org.yaml/snakeyaml@1.21?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/yaml/snakeyaml/1.21/snakeyaml-1.21.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/yaml/snakeyaml/1.21/snakeyaml-1.21.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/yaml/snakeyaml/1.21/snakeyaml-1.21.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/yaml/snakeyaml/1.21/snakeyaml-1.21.jar"}]}},{"publisher":"Spring IO","group":"org.springframework","name":"spring-test","version":"4.3.6.RELEASE","description":"Spring TestContext Framework","scope":"required","purl":"pkg:maven/org.springframework/spring-test@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-test@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-test/4.3.6.RELEASE/spring-test-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-test/4.3.6.RELEASE/spring-test-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-test/4.3.6.RELEASE/spring-test-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-test/4.3.6.RELEASE/spring-test-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"JUnit","group":"junit","name":"junit","version":"4.12","description":"JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck.","scope":"required","purl":"pkg:maven/junit/junit@4.12?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/junit-team/junit/tree/master"}],"type":"framework","bom-ref":"pkg:maven/junit/junit@4.12?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/junit/junit/4.12/junit-4.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/junit/junit/4.12/junit-4.12.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/junit/junit/4.12/junit-4.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/junit/junit/4.12/junit-4.12.jar"}]},"tags":["framework","test"]},{"group":"org.hamcrest","name":"hamcrest-core","version":"1.3","description":"\r\n This is the core API of hamcrest matcher framework to be used by third-party framework providers. This includes the a foundation set of matcher implementations for common operations.\r\n ","scope":"required","purl":"pkg:maven/org.hamcrest/hamcrest-core@1.3?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/hamcrest/JavaHamcrest"}],"type":"framework","bom-ref":"pkg:maven/org.hamcrest/hamcrest-core@1.3?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jar"}]},"tags":["api","framework"]},{"group":"commons-beanutils","name":"commons-beanutils","version":"1.9.4","description":"Apache Commons BeanUtils provides an easy-to-use but flexible wrapper around reflection and introspection.","scope":"required","purl":"pkg:maven/commons-beanutils/commons-beanutils@1.9.4?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/beanutils/tags/BEANUTILS_1_9_3_RC3"}],"type":"library","bom-ref":"pkg:maven/commons-beanutils/commons-beanutils@1.9.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-beanutils/commons-beanutils/1.9.4/commons-beanutils-1.9.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-beanutils/commons-beanutils/1.9.4/commons-beanutils-1.9.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-beanutils/commons-beanutils/1.9.4/commons-beanutils-1.9.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-beanutils/commons-beanutils/1.9.4/commons-beanutils-1.9.4.jar"}]},"tags":["sql"]},{"group":"io.jsonwebtoken","name":"jjwt","version":"0.9.1","description":"Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/ ","scope":"required","purl":"pkg:maven/io.jsonwebtoken/jjwt@0.9.1?type=jar","type":"library","bom-ref":"pkg:maven/io.jsonwebtoken/jjwt@0.9.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar"}]},"tags":["algorithm","crypto"]},{"group":"com.auth0","name":"java-jwt","version":"4.0.0","description":"Java implementation of JSON Web Token (JWT)","scope":"required","purl":"pkg:maven/com.auth0/java-jwt@4.0.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/auth0/java-jwt"}],"type":"library","bom-ref":"pkg:maven/com.auth0/java-jwt@4.0.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/auth0/java-jwt/4.0.0/java-jwt-4.0.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/auth0/java-jwt/4.0.0/java-jwt-4.0.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/auth0/java-jwt/4.0.0/java-jwt-4.0.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/auth0/java-jwt/4.0.0/java-jwt-4.0.0.jar"}]},"tags":["json","token","web"]},{"group":"cn.hutool","name":"hutool-all","version":"5.8.10","description":"Hutool\u662f\u4e00\u4e2a\u5c0f\u800c\u5168\u7684Java\u5de5\u5177\u7c7b\u5e93\uff0c\u901a\u8fc7\u9759\u6001\u65b9\u6cd5\u5c01\u88c5\uff0c\u964d\u4f4e\u76f8\u5173API\u7684\u5b66\u4e60\u6210\u672c\uff0c\u63d0\u9ad8\u5de5\u4f5c\u6548\u7387\uff0c\u4f7fJava\u62e5\u6709\u51fd\u6570\u5f0f\u8bed\u8a00\u822c\u7684\u4f18\u96c5\uff0c\u8ba9Java\u8bed\u8a00\u4e5f\u53ef\u4ee5\u201c\u751c\u751c\u7684\u201d\u3002","scope":"required","purl":"pkg:maven/cn.hutool/hutool-all@5.8.10?type=jar","type":"library","bom-ref":"pkg:maven/cn.hutool/hutool-all@5.8.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/cn/hutool/hutool-all/5.8.10/hutool-all-5.8.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/cn/hutool/hutool-all/5.8.10/hutool-all-5.8.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/cn/hutool/hutool-all/5.8.10/hutool-all-5.8.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/cn/hutool/hutool-all/5.8.10/hutool-all-5.8.10.jar"}]},"tags":["algorithm","crypto","decrypt","driver","encrypt","graphics","registry","sql","xml"]},{"publisher":"Shigeru Chiba, www.javassist.org","group":"org.javassist","name":"javassist","version":"3.27.0-GA","description":"\n \tJavassist (JAVA programming ASSISTant) makes Java bytecode manipulation\n simple. It is a class library for editing bytecodes in Java.\n ","scope":"required","purl":"pkg:maven/org.javassist/javassist@3.27.0-GA?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:jboss-javassist/javassist.git"}],"type":"framework","bom-ref":"pkg:maven/org.javassist/javassist@3.27.0-GA?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/javassist/javassist/3.27.0-GA/javassist-3.27.0-GA.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/javassist/javassist/3.27.0-GA/javassist-3.27.0-GA.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/javassist/javassist/3.27.0-GA/javassist-3.27.0-GA.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/javassist/javassist/3.27.0-GA/javassist-3.27.0-GA.jar"}]},"tags":["bytecode","framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.data","name":"spring-data-commons","version":"1.13.11.RELEASE","description":"Global parent pom.xml to be used by Spring Data modules","scope":"required","purl":"pkg:maven/org.springframework.data/spring-data-commons@1.13.11.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.data/spring-data-commons@1.13.11.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/data/spring-data-commons/1.13.11.RELEASE/spring-data-commons-1.13.11.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/data/spring-data-commons/1.13.11.RELEASE/spring-data-commons-1.13.11.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/data/spring-data-commons/1.13.11.RELEASE/spring-data-commons-1.13.11.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/data/spring-data-commons/1.13.11.RELEASE/spring-data-commons-1.13.11.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"QOS.ch","group":"org.slf4j","name":"jcl-over-slf4j","version":"1.7.22","description":"JCL 1.1.1 implemented over SLF4J","scope":"required","purl":"pkg:maven/org.slf4j/jcl-over-slf4j@1.7.22?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/qos-ch/slf4j"}],"type":"framework","bom-ref":"pkg:maven/org.slf4j/jcl-over-slf4j@1.7.22?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/jcl-over-slf4j/1.7.22/jcl-over-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/jcl-over-slf4j/1.7.22/jcl-over-slf4j-1.7.22.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/jcl-over-slf4j/1.7.22/jcl-over-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/jcl-over-slf4j/1.7.22/jcl-over-slf4j-1.7.22.jar"}]},"tags":["framework"]},{"group":"com.jayway.jsonpath","name":"json-path","version":"2.2.0","description":"Java port of Stefan Goessner JsonPath.","scope":"required","purl":"pkg:maven/com.jayway.jsonpath/json-path@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git://github.com/jayway/JsonPath.git"}],"type":"library","bom-ref":"pkg:maven/com.jayway.jsonpath/json-path@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/jayway/jsonpath/json-path/2.2.0/json-path-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/jayway/jsonpath/json-path/2.2.0/json-path-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/jayway/jsonpath/json-path/2.2.0/json-path-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/jayway/jsonpath/json-path/2.2.0/json-path-2.2.0.jar"}]},"tags":["jsonpath"]},{"publisher":"Chemouni Uriel","group":"net.minidev","name":"json-smart","version":"2.2.1","description":"\n JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.\n ","scope":"required","purl":"pkg:maven/net.minidev/json-smart@2.2.1?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netplex/json-smart-v2"}],"type":"library","bom-ref":"pkg:maven/net.minidev/json-smart@2.2.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar"}]},"tags":["json","parse"]},{"publisher":"Chemouni Uriel","group":"net.minidev","name":"accessors-smart","version":"1.1","description":"Java reflect give poor performance on getter setter an constructor calls,\naccessors-smart use ASM to speed up those calls.\n","scope":"required","purl":"pkg:maven/net.minidev/accessors-smart@1.1?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netplex/json-smart-v2"}],"type":"library","bom-ref":"pkg:maven/net.minidev/accessors-smart@1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/minidev/accessors-smart/1.1/accessors-smart-1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/minidev/accessors-smart/1.1/accessors-smart-1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/minidev/accessors-smart/1.1/accessors-smart-1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/minidev/accessors-smart/1.1/accessors-smart-1.1.jar"}]},"tags":["performance"]},{"group":"org.xmlbeam","name":"xmlprojector","version":"1.4.13","description":"The coolest XML library for Java around. Define typesafe views (projections) to xml. Use XPath to read and write XML. Bind XML to Java collections. Requires at least Java6, supports Java8 features and has no further runtime dependencies.","scope":"required","purl":"pkg:maven/org.xmlbeam/xmlprojector@1.4.13?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/SvenEwald/xmlbeam.git"}],"type":"library","bom-ref":"pkg:maven/org.xmlbeam/xmlprojector@1.4.13?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/xmlbeam/xmlprojector/1.4.13/xmlprojector-1.4.13.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/xmlbeam/xmlprojector/1.4.13/xmlprojector-1.4.13.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/xmlbeam/xmlprojector/1.4.13/xmlprojector-1.4.13.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/xmlbeam/xmlprojector/1.4.13/xmlprojector-1.4.13.jar"}]},"tags":["typesafe","xml"]},{"publisher":"PostgreSQL Global Development Group","group":"org.postgresql","name":"postgresql","version":"42.3.1","description":"PostgreSQL JDBC Driver Postgresql","scope":"required","purl":"pkg:maven/org.postgresql/postgresql@42.3.1?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/pgjdbc/pgjdbc"}],"type":"library","bom-ref":"pkg:maven/org.postgresql/postgresql@42.3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/postgresql/postgresql/42.3.1/postgresql-42.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/postgresql/postgresql/42.3.1/postgresql-42.3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/postgresql/postgresql/42.3.1/postgresql-42.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/postgresql/postgresql/42.3.1/postgresql-42.3.1.jar"}]},"tags":["jdbc"]},{"group":"org.checkerframework","name":"checker-qual","version":"3.5.0","description":"\n Checker Qual is the set of annotations (qualifiers) and supporting classes\n used by the Checker Framework to type check Java source code.\n\n Please\n see artifact:\n org.checkerframework:checker\n ","scope":"required","purl":"pkg:maven/org.checkerframework/checker-qual@3.5.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/typetools/checker-framework.git"}],"type":"framework","bom-ref":"pkg:maven/org.checkerframework/checker-qual@3.5.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/checkerframework/checker-qual/3.5.0/checker-qual-3.5.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/checkerframework/checker-qual/3.5.0/checker-qual-3.5.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/checkerframework/checker-qual/3.5.0/checker-qual-3.5.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/checkerframework/checker-qual/3.5.0/checker-qual-3.5.0.jar"}]},"tags":["framework"]},{"group":"com.ibm.db2","name":"jcc","version":"11.5.8.0","description":"IBM Data Server Driver for JDBC and SQLJ is a pure-Java driver (Type 4) that supports the JDBC 4 specification. You can use this JDBC driver for Java applications that access the Db2\u00ae LUW database server.","scope":"required","purl":"pkg:maven/com.ibm.db2/jcc@11.5.8.0?type=jar","type":"library","bom-ref":"pkg:maven/com.ibm.db2/jcc@11.5.8.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/ibm/db2/jcc/11.5.8.0/jcc-11.5.8.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/ibm/db2/jcc/11.5.8.0/jcc-11.5.8.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/ibm/db2/jcc/11.5.8.0/jcc-11.5.8.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/ibm/db2/jcc/11.5.8.0/jcc-11.5.8.0.jar"}]},"tags":["database","jdbc"]},{"group":"org.apache.shiro","name":"shiro-core","version":"1.2.4","description":"\r\n Apache Shiro is a powerful and flexible open-source security framework that cleanly handles\r\n authentication, authorization, enterprise session management, single sign-on and cryptography services.\r\n ","scope":"required","purl":"pkg:maven/org.apache.shiro/shiro-core@1.2.4?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/shiro/tags/shiro-root-1.2.4"}],"type":"framework","bom-ref":"pkg:maven/org.apache.shiro/shiro-core@1.2.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/shiro/shiro-core/1.2.4/shiro-core-1.2.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/shiro/shiro-core/1.2.4/shiro-core-1.2.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/shiro/shiro-core/1.2.4/shiro-core-1.2.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/shiro/shiro-core/1.2.4/shiro-core-1.2.4.jar"}]},"tags":["framework","security"]},{"group":"com.fasterxml.jackson.core","name":"jackson-databind","version":"2.9.8","description":"General data-binding functionality for Jackson: works on core streaming API","scope":"required","purl":"pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.9.8?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/FasterXML/jackson-databind"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.9.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar"}]},"tags":["sql","xml"]},{"publisher":"FasterXML","group":"com.fasterxml.jackson.core","name":"jackson-annotations","version":"2.9.8","description":"Core annotations used for value types, used by Jackson data binding package.\n ","scope":"required","purl":"pkg:maven/com.fasterxml.jackson.core/jackson-annotations@2.9.8?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/FasterXML/jackson-annotations"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml.jackson.core/jackson-annotations@2.9.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-annotations/2.9.8/jackson-annotations-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-annotations/2.9.8/jackson-annotations-2.9.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-annotations/2.9.8/jackson-annotations-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-annotations/2.9.8/jackson-annotations-2.9.8.jar"}]},"tags":["xml"]},{"group":"com.fasterxml.jackson.core","name":"jackson-core","version":"2.9.8","description":"Core Jackson processing abstractions (aka Streaming API), implementation for JSON","scope":"required","purl":"pkg:maven/com.fasterxml.jackson.core/jackson-core@2.9.8?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/FasterXML/jackson-core"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml.jackson.core/jackson-core@2.9.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-core/2.9.8/jackson-core-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-core/2.9.8/jackson-core-2.9.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-core/2.9.8/jackson-core-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-core/2.9.8/jackson-core-2.9.8.jar"}]},"tags":["xml"]},{"group":"org.jsecurity","name":"jsecurity","version":"0.9.0","description":"JSecurity is a powerful and flexible open-source Java security framework that cleanly handles\n authentication, authorization, enterprise session management, single sign-on and cryptography services.\n ","scope":"required","purl":"pkg:maven/org.jsecurity/jsecurity@0.9.0?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/incubator/jsecurity/import/trunk"}],"type":"framework","bom-ref":"pkg:maven/org.jsecurity/jsecurity@0.9.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jsecurity/jsecurity/0.9.0/jsecurity-0.9.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jsecurity/jsecurity/0.9.0/jsecurity-0.9.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jsecurity/jsecurity/0.9.0/jsecurity-0.9.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jsecurity/jsecurity/0.9.0/jsecurity-0.9.0.jar"}]},"tags":["framework","security"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-expression","version":"4.3.16.RELEASE","description":"Spring Expression Language (SpEL)","scope":"required","purl":"pkg:maven/org.springframework/spring-expression@4.3.16.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-expression@4.3.16.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-expression/4.3.16.RELEASE/spring-expression-4.3.16.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-expression/4.3.16.RELEASE/spring-expression-4.3.16.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-expression/4.3.16.RELEASE/spring-expression-4.3.16.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-expression/4.3.16.RELEASE/spring-expression-4.3.16.RELEASE.jar"}]},"tags":["framework"]},{"group":"com.h2database","name":"h2","version":"1.4.199","description":"H2 Database Engine","scope":"optional","purl":"pkg:maven/com.h2database/h2@1.4.199?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/h2database/h2database"}],"type":"library","bom-ref":"pkg:maven/com.h2database/h2@1.4.199?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/h2database/h2/1.4.199/h2-1.4.199.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/h2database/h2/1.4.199/h2-1.4.199.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/h2database/h2/1.4.199/h2-1.4.199.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/h2database/h2/1.4.199/h2-1.4.199.jar"}]},"tags":["database"]},{"group":"org.apache.tomcat","name":"tomcat-dbcp","version":"9.0.8","description":"Tomcat Database Connection Pooling package","scope":"required","purl":"pkg:maven/org.apache.tomcat/tomcat-dbcp@9.0.8?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat/tomcat-dbcp@9.0.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-dbcp/9.0.8/tomcat-dbcp-9.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-dbcp/9.0.8/tomcat-dbcp-9.0.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-dbcp/9.0.8/tomcat-dbcp-9.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-dbcp/9.0.8/tomcat-dbcp-9.0.8.jar"}]},"tags":["database","framework"]},{"group":"org.apache.tomcat","name":"tomcat-juli","version":"9.0.8","description":"Tomcat Core Logging Package","scope":"required","purl":"pkg:maven/org.apache.tomcat/tomcat-juli@9.0.8?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat/tomcat-juli@9.0.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-juli/9.0.8/tomcat-juli-9.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-juli/9.0.8/tomcat-juli-9.0.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-juli/9.0.8/tomcat-juli-9.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-juli/9.0.8/tomcat-juli-9.0.8.jar"}]},"tags":["framework","logging"]},{"publisher":"Alibaba Group","group":"com.alibaba","name":"QLExpress","version":"3.3.1","description":"QLExpress is a powerful, lightweight, dynamic language for the Java platform aimed at improving developers\u2019 productivity in different business scenes.\n ","scope":"required","purl":"pkg:maven/com.alibaba/QLExpress@3.3.1?type=jar","type":"library","bom-ref":"pkg:maven/com.alibaba/QLExpress@3.3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/alibaba/QLExpress/3.3.1/QLExpress-3.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/alibaba/QLExpress/3.3.1/QLExpress-3.3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/alibaba/QLExpress/3.3.1/QLExpress-3.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/alibaba/QLExpress/3.3.1/QLExpress-3.3.1.jar"}]},"tags":["productivity"]}],"vulnerabilities":[{"id":"CVE-2022-22965","bom-ref":"CVE-2022-22965/pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0.0.RELEASE|<=2.5.9|!=2.5.12","status":"affected"},{"version":"2.5.12","status":"unaffected"}]}],"recommendation":"Update to version 2.5.12.","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22965"},"references":[{"id":"SNWLID-2022-0005","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"}},{"id":"cve-2022-22965","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22965"}},{"id":"970766","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/970766"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cisco-sa-java-spring-rce-Zx9GUc67","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"}},{"id":"ssa-254054","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"packetstormsecurity-exploit-Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html"}},{"id":"packetstormsecurity-exploit-Spring4Shell-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html"}},{"id":"CVE-2022-22965","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965","name":"NVD"}}],"advisories":[{"title":"Sonicwall Advisory SNWLID-2022-0005","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"},{"title":"Vmware Advisory cve-2022-22965","url":"https://tanzu.vmware.com/security/cve-2022-22965"},{"title":"Cert Advisory 970766","url":"https://www.kb.cert.org/vuls/id/970766"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Cisco Advisory cisco-sa-java-spring-rce-Zx9GUc67","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"},{"title":"Siemens Advisory ssa-254054","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"CVE-2022-22965","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965"}],"cwes":[74,94],"description":"Remote Code Execution in Spring Framework","detail":"# Remote Code Execution in Spring Framework Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. These are the prerequisites for the exploit: - JDK 9 or higher - Apache Tomcat as the Servlet container - Packaged as WAR - `spring-webmvc` or `spring-webflux` dependency ## Patches - Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE) - Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12) ## Workarounds For those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting. To apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-03-31T18:30:50","updated":"2025-01-29T19:19:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Direct dependency\\nKnown Exploits"}]},{"id":"CVE-2022-27772","bom-ref":"CVE-2022-27772/pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0.0.RELEASE|<=2.2.9.RELEASE|!=2.2.11.RELEASE","status":"affected"},{"version":"2.2.11.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 2.2.11.RELEASE.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27772","name":"NVD"},"references":[{"id":"GHSA-cm59-pr5q-cw85","source":{"name":"GitHub Advisory","url":"https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85"}},{"id":"CVE-2022-27772","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27772","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-cm59-pr5q-cw85","url":"https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85"},{"title":"CVE-2022-27772","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27772"}],"cwes":[377,379,668],"description":"Temporary Directory Hijacking to Local Privilege Escalation Vulnerability in org.springframework.boot:spring-boot","detail":"# Temporary Directory Hijacking to Local Privilege Escalation Vulnerability in org.springframework.boot:spring-boot spring-boot versions prior to version `v2.2.11.RELEASE` was vulnerable to temporary directory hijacking. This vulnerability impacted the `org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir` method. The vulnerable method is used to create a work directory for embedded web servers such as Tomcat and Jetty. The directory contains configuration files, JSP/class files, etc. If a local attacker got the permission to write in this directory, they could completely take over the application (ie. local privilege escalation). #### Impact Location This vulnerability impacted the following source location: ```java /** * Return the absolute temp dir for given web server. * @param prefix server name * @return the temp dir for given server. */ protected final File createTempDir(String prefix) { try { File tempDir = File.createTempFile(prefix + \".\", \".\" + getPort()); tempDir.delete(); tempDir.mkdir(); tempDir.deleteOnExit(); return tempDir; } ``` \\- https://github.com/spring-projects/spring-boot/blob/ce70e7d768977242a8ea6f93188388f273be5851/spring-boot-project/spring-boot/src/main/java/org/springframework/boot/web/server/AbstractConfigurableWebServerFactory.java#L165-L177 This vulnerability exists because `File.mkdir` returns `false` when it fails to create a directory, it does not throw an exception. As such, the following race condition exists: ```java File tmpDir =File.createTempFile(prefix + \".\", \".\" + getPort()); // Attacker knows the full path of the file that will be generated // delete the file that was created tmpDir.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Jetty. // and make a directory of the same name // SECURITY VULNERABILITY: Race Condition! - Attacker beats java code and now owns this directory tmpDir.mkdirs(); // This method returns 'false' because it was unable to create the directory. No exception is thrown. // Attacker can write any new files to this directory that they wish. // Attacker can read any files created by this process. ``` ### Prerequisites This vulnerability impacts Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. ### Patches This vulnerability was inadvertently fixed as a part of this patch: https://github.com/spring-projects/spring-boot/commit/667ccdae84822072f9ea1a27ed5c77964c71002d This vulnerability is patched in versions `v2.2.11.RELEASE` or later. ### Workarounds Setting the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for all operating systems.","ratings":[{"method":"CVSSv31","severity":"high","score":7.8,"vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"published":"2022-07-11T20:59:02","updated":"2023-11-08T04:09:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 5 locations"}]},{"id":"CVE-2025-22235","bom-ref":"CVE-2025-22235/pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0.0.RELEASE|<=2.7.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22235. Updating to version 2.2.11.RELEASE is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22235","name":"NVD"},"references":[{"id":"CVE-2025-22235","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22235","name":"NVD"}},{"id":"cve-2025-22235","source":{"url":"https://spring.io/security/cve-2025-22235"}}],"advisories":[{"title":"CVE-2025-22235","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22235"},{"title":"cve-2025-22235","url":"https://spring.io/security/cve-2025-22235"}],"cwes":[20,862],"description":"Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed","detail":"# Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed EndpointRequest.to()\u00a0creates a matcher for null/**\u00a0if the actuator endpoint, for which the EndpointRequest\u00a0has been created, is disabled or not exposed. Your application may be affected by this if all the following conditions are met: * You use Spring Security * EndpointRequest.to()\u00a0has been used in a Spring Security chain configuration * The endpoint which EndpointRequest\u00a0references is disabled or not exposed via web * Your application handles requests to /null\u00a0and this path needs protection You are not affected if any of the following is true: * You don't use Spring Security * You don't use EndpointRequest.to() * The endpoint which EndpointRequest.to()\u00a0refers to is enabled and is exposed * Your application does not handle requests to /null\u00a0or this path does not need protection","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2025-04-28T09:31:53","updated":"2025-04-28T21:12:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"CVE-2018-1196","bom-ref":"CVE-2018-1196/pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.5.0|<1.5.10","status":"affected"},{"version":"1.5.10","status":"unaffected"}]}],"recommendation":"Update to version 1.5.10 to resolve CVE-2018-1196 or update to version 2.2.11.RELEASE to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1196","name":"NVD"},"references":[{"id":"GHSA-xx65-cc7g-9pfp","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-xx65-cc7g-9pfp"}},{"id":"CVE-2018-1196","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1196","name":"NVD"}},{"id":"cve-2018-1196","source":{"url":"https://pivotal.io/security/cve-2018-1196"}}],"advisories":[{"title":"GitHub Advisory GHSA-xx65-cc7g-9pfp","url":"https://github.com/advisories/GHSA-xx65-cc7g-9pfp"},{"title":"CVE-2018-1196","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1196"},{"title":"cve-2018-1196","url":"https://pivotal.io/security/cve-2018-1196"}],"cwes":[59],"description":"Moderate severity vulnerability that affects org.springframework.boot:spring-boot","detail":"# Moderate severity vulnerability that affects org.springframework.boot:spring-boot Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the \"run_user\" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the \"run_user\" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2018-10-18T18:05:57","updated":"2023-11-08T03:59:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 5 locations"}]},{"id":"CVE-2023-20883","bom-ref":"CVE-2023-20883/pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0.0.RELEASE|<=2.5.9|!=2.5.15","status":"affected"},{"version":"2.5.15","status":"unaffected"}]}],"recommendation":"Update to version 2.5.15.","source":{"url":"https://spring.io/security/cve-2023-20883"},"references":[{"id":"cve-2023-20883","source":{"url":"https://spring.io/security/cve-2023-20883"}},{"id":"CVE-2023-20883","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20883","name":"NVD"}},{"id":"ntap-20230703-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230703-0008"}}],"advisories":[{"title":"cve-2023-20883","url":"https://spring.io/security/cve-2023-20883"},{"title":"CVE-2023-20883","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20883"},{"title":"NetApp Advisory ntap-20230703-0008","url":"https://security.netapp.com/advisory/ntap-20230703-0008"}],"cwes":[400],"description":"Spring Boot Welcome Page Denial of Service","detail":"# Spring Boot Welcome Page Denial of Service In Spring Boot versions 3.0.0 - 3.0.6, 2.7.0 - 2.7.11, 2.6.0 - 2.6.14, 2.5.0 - 2.5.14 and older unsupported versions, there is potential for a denial-of-service (DoS) attack if Spring MVC is used together with a reverse proxy cache. Specifically, an application is vulnerable if all of the conditions are true: * The application has Spring MVC auto-configuration enabled. This is the case by default if Spring MVC is on the classpath. * The application makes use of Spring Boot's welcome page support, either static or templated. * Your application is deployed behind a proxy which caches 404 responses. Your application is NOT vulnerable if any of the following are true: * Spring MVC auto-configuration is disabled. This is true if WebMvcAutoConfiguration is explicitly excluded, if Spring MVC is not on the classpath, or if spring.main.web-application-type is set to a value other than SERVLET. * The application does not use Spring Boot's welcome page support. * You do not have a proxy which caches 404 responses. Affected Spring Products and Versions Spring Boot 3.0.0 to 3.0.6 2.7.0 to 2.7.11 2.6.0 to 2.6.14 2.5.0 to 2.5.14 Older, unsupported versions are also affected Mitigation Users of affected versions should apply the following mitigations: * 3.0.x users should upgrade to 3.0.7+ * 2.7.x users should upgrade to 2.7.12+ * 2.6.x users should upgrade to 2.6.15+ * 2.5.x users should upgrade to 2.5.15+ Users of older, unsupported versions should upgrade to 3.0.7+ or 2.7.12+. Workarounds: configure the reverse proxy not to cache 404 responses and/or not to cache responses to requests to the root (/) of the application.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-05-26T18:30:21","updated":"2024-02-21T05:36:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 1 locations"}]},{"id":"CVE-2023-6378","bom-ref":"CVE-2023-6378/pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar","affects":[{"ref":"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar","versions":[{"range":"vers:maven/>=0.2.5|<=1.2.12|!=1.2.13","status":"affected"},{"version":"1.2.13","status":"unaffected"}]}],"recommendation":"Update to version 1.2.13.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6378","name":"NVD"},"references":[{"id":"CVE-2023-6378","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6378","name":"NVD"}},{"id":"ntap-20241129-0012","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241129-0012"}}],"advisories":[{"title":"CVE-2023-6378","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6378"},{"title":"NetApp Advisory ntap-20241129-0012","url":"https://security.netapp.com/advisory/ntap-20241129-0012"}],"cwes":[502],"description":"logback serialization vulnerability","detail":"# logback serialization vulnerability A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data. This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html","ratings":[{"method":"CVSSv31","severity":"high","score":7.1,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"published":"2023-11-29T12:30:16","updated":"2024-11-29T12:45:50","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar\", \"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-42550","bom-ref":"CVE-2021-42550/pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","affects":[{"ref":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","versions":[{"range":"vers:maven/>=0.2.5|<=1.2.8|!=1.2.9","status":"affected"},{"version":"1.2.9","status":"unaffected"}]}],"recommendation":"Update to version 1.2.9 to resolve CVE-2021-42550 or update to version 1.3.15 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42550","name":"NVD"},"references":[{"id":"seclists-exploit-fulldisclosure/2022/Jul/11","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2022/Jul/11"}},{"id":"CVE-2021-42550","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42550","name":"NVD"}},{"id":"ssa-371761","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf"}},{"id":"packetstormsecurity-exploit-Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html"}},{"id":"ntap-20211229-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20211229-0001"}}],"advisories":[{"title":"CVE-2021-42550","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42550"},{"title":"Siemens Advisory ssa-371761","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf"},{"title":"NetApp Advisory ntap-20211229-0001","url":"https://security.netapp.com/advisory/ntap-20211229-0001"}],"cwes":[502],"description":"Deserialization of Untrusted Data in logback","detail":"# Deserialization of Untrusted Data in logback In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-12-17T20:00:50","updated":"2024-02-16T08:18:41","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar\", \"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar\", \"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Direct dependency\\nKnown Exploits"}]},{"id":"CVE-2024-12801","bom-ref":"CVE-2024-12801/pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","affects":[{"ref":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","versions":[{"range":"vers:maven/>=0.2.5|<=1.3.14|!=1.3.15","status":"affected"},{"version":"1.3.15","status":"unaffected"}]}],"recommendation":"Update to version 1.3.15.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12801","name":"NVD"},"references":[{"id":"CVE-2024-12801","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12801","name":"NVD"}}],"advisories":[{"title":"CVE-2024-12801","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12801"}],"cwes":[918],"description":"QOS.CH logback-core Server-Side Request Forgery vulnerability","detail":"# QOS.CH logback-core Server-Side Request Forgery vulnerability Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 1.5.12 on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML. The attacks involves the modification of DOCTYPE declaration in\u00a0 XML configuration files.","ratings":[{"method":"CVSSv4","severity":"low","score":2.4,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/V:D/U:Clear"}],"published":"2024-12-19T18:31:37","updated":"2025-01-03T19:09:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar\", \"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar\", \"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-12798","bom-ref":"CVE-2024-12798/pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","affects":[{"ref":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","versions":[{"range":"vers:maven/>=0.2.5|<=1.3.14|!=1.3.15","status":"affected"},{"version":"1.3.15","status":"unaffected"}]}],"recommendation":"Update to version 1.3.15.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12798","name":"NVD"},"references":[{"id":"CVE-2024-12798","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12798","name":"NVD"}}],"advisories":[{"title":"CVE-2024-12798","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12798"}],"cwes":[917],"description":"QOS.CH logback-core Expression Language Injection vulnerability","detail":"# QOS.CH logback-core Expression Language Injection vulnerability ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core up to and including version 1.5.12 in Java applications allows attackers to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.","ratings":[{"method":"CVSSv4","severity":"medium","score":5.9,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear"}],"published":"2024-12-19T18:31:37","updated":"2025-01-03T19:09:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar\", \"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar\", \"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-44487","bom-ref":"CVE-2023-44487/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.94","status":"affected"},{"version":"8.5.94","status":"unaffected"}]}],"recommendation":"Update to version 8.5.94 to resolve CVE-2023-44487 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"},"references":[{"id":"ntap-20231016-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231016-0001"}},{"id":"cve-2023-44487-http-2-rapid-reset-attack","source":{"name":"Qualys Advisory","url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack"}},{"id":"fedoraproject-msg-FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU"}},{"id":"cve-2023-44487","source":{"url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"}},{"id":"cve-2023-44487","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/security/cve/cve-2023-44487"}},{"id":"fedoraproject-msg-2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI"}},{"id":"w3-msg-2023OctDec","source":{"name":"W3 Mailing List","url":"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html"}},{"id":"GHSA-qppj-fm5r-hxr3","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3"}},{"id":"fedoraproject-msg-KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE"}},{"id":"google-msg-iNNxDTCjZvo","source":{"name":"Google Mailing List","url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo"}},{"id":"fedoraproject-msg-2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI"}},{"id":"fedoraproject-msg-LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG"}},{"id":"hyper-http2-rapid-reset-unaffected","source":{"name":"Seanmonstar Advisory","url":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected"}},{"id":"CVE-2023-44487","source":{"name":"Ubuntu Advisory","url":"https://ubuntu.com/security/CVE-2023-44487"}},{"id":"GHSA-xpw8-rcwv-8f8p","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p"}},{"id":"internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","source":{"name":"Darkreading Advisory","url":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event"}},{"id":"openwall-oss-security-msg-2023-10-13-9","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/13/9"}},{"id":"fedoraproject-msg-X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y"}},{"id":"fedoraproject-msg-LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL"}},{"id":"fedoraproject-msg-HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ"}},{"id":"fedoraproject-msg-JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ"}},{"id":"netlify-successfully-mitigates-cve-2023-44487","source":{"name":"Netlify Advisory","url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487"}},{"id":"fedoraproject-msg-VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK"}},{"id":"fedoraproject-msg-JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY"}},{"id":"how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size","source":{"name":"Arstechnica Advisory","url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size"}},{"id":"fedoraproject-msg-VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU"}},{"id":"openwall-oss-security-msg-2023-10-10-6","source":{"name":"Openwall Mailing List","url":"https://www.openwall.com/lists/oss-security/2023/10/10/6"}},{"id":"67764","source":{"name":"Swift Advisory","url":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764"}},{"id":"HTTP2-Rapid-Reset-Attack","source":{"name":"Phoronix Advisory","url":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack"}},{"id":"CVE-2023-44487","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487"}},{"id":"fedoraproject-msg-HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ"}},{"id":"openwall-oss-security-msg-2023-10-18-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/18/4"}},{"id":"fedoraproject-msg-E72T67UPDRXHIDLO3OROR25YAMN4GGW5","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5"}},{"id":"suse-bugzilla-1216123","source":{"name":"Suse Bugzilla","url":"https://bugzilla.suse.com/show_bug.cgi?id=1216123"}},{"id":"fedoraproject-msg-XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2"}},{"id":"fedoraproject-msg-ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3"}},{"id":"fedoraproject-msg-XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2"}},{"id":"openwall-oss-security-msg-2023-10-19-6","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/19/6"}},{"id":"fedoraproject-msg-ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT"}},{"id":"google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps","source":{"name":"Google Advisory","url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps"}},{"id":"fedoraproject-msg-3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A"}},{"id":"fedoraproject-msg-JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY"}},{"id":"fedoraproject-msg-ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3"}},{"id":"fedoraproject-msg-BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ"}},{"id":"http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response","source":{"name":"Openssf Advisory","url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response"}},{"id":"ntap-20240621-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0006"}},{"id":"GHSA-vx74-f528-fxqg","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-vx74-f528-fxqg"}},{"id":"dsa-5570","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5570"}},{"id":"openwall-oss-security-msg-2023-10-18-8","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/18/8"}},{"id":"google-msg-UDd7VKQuAAAJ","source":{"name":"Google Mailing List","url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ"}},{"id":"openwall-oss-security-msg-2023-10-10-7","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/10/7"}},{"id":"debian-msg-msg00012","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html"}},{"id":"cve-2023-44487","source":{"url":"https://blog.vespa.ai/cve-2023-44487"}},{"id":"dsa-5522","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5522"}},{"id":"http-2-rapid-reset-attack-impacting-f5-nginx-products","source":{"name":"Nginx Advisory","url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products"}},{"id":"dsa-5549","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5549"}},{"id":"GHSA-2m7v-gc89-fjqf","source":{"name":"GitHub Advisory","url":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf"}},{"id":"debian-msg-msg00024","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html"}},{"id":"fedoraproject-msg-VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK"}},{"id":"fedoraproject-msg-ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4"}},{"id":"haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","source":{"name":"Haproxy Advisory","url":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487"}},{"id":"debian-msg-msg00045","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html"}},{"id":"ntap-20240621-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0007"}},{"id":"fedoraproject-msg-WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX"}},{"id":"debian-msg-msg00020","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}},{"id":"openwall-oss-security-msg-2023-10-10-6","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/10/6"}},{"id":"fedoraproject-msg-KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE"}},{"id":"redhat-bugzilla-2242803","source":{"name":"Red Hat Bugzilla","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803"}},{"id":"59715","source":{"name":"Hashicorp Advisory","url":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715"}},{"id":"fedoraproject-msg-WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH"}},{"id":"fedoraproject-msg-JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ"}},{"id":"fedoraproject-msg-E72T67UPDRXHIDLO3OROR25YAMN4GGW5","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5"}},{"id":"fedoraproject-msg-LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL"}},{"id":"AWS-2023-011","source":{"name":"Amazon Advisory","url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011"}},{"id":"new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records","source":{"name":"Bleepingcomputer Advisory","url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records"}},{"id":"apache-msg-5py8h42mxfsn8l1wy6o41xwhsjlsd87q","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q"}},{"id":"openwall-oss-security-msg-2023-10-20-8","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/20/8"}},{"id":"msg00181","source":{"name":"Eclipse Advisory","url":"https://www.eclipse.org/lists/jetty-announce/msg00181.html"}},{"id":"http2_rapid_reset_zeroday","source":{"name":"Theregister Advisory","url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday"}},{"id":"fedoraproject-msg-ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT"}},{"id":"debian-msg-msg00047","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html"}},{"id":"dsa-5540","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5540"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html"}},{"id":"fedoraproject-msg-ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4"}},{"id":"fedoraproject-msg-CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2"}},{"id":"dsa-5558","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5558"}},{"id":"fedoraproject-msg-3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A"}},{"id":"fedoraproject-msg-X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y"}},{"id":"fedoraproject-msg-BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ"}},{"id":"how-it-works-the-novel-http2-rapid-reset-ddos-attack","source":{"name":"Google Advisory","url":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"}},{"id":"glsa-202311-09","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202311-09"}},{"id":"debian-msg-msg00023","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html"}},{"id":"nginx-msg-S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK","source":{"name":"Nginx Mailing List","url":"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html"}},{"id":"openwall-oss-security-msg-2023-10-13-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/13/4"}},{"id":"cve-2023-44487","source":{"url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487"}},{"id":"rapid-reset-http-2-vulnerablilty","source":{"name":"Litespeedtech Advisory","url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty"}},{"id":"CVE-2023-44487","source":{"url":"https://security.paloaltonetworks.com/CVE-2023-44487"}},{"id":"dsa-5521","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5521"}},{"id":"fedoraproject-msg-WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH"}},{"id":"fedoraproject-msg-VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU"}},{"id":"CVE-2023-44487","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487","name":"NVD"}},{"id":"microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2"}},{"id":"K000137106","source":{"name":"F5 Advisory","url":"https://my.f5.com/manage/s/article/K000137106"}},{"id":"proxmox-bugzilla-4988","source":{"name":"Proxmox Bugzilla","url":"https://bugzilla.proxmox.com/show_bug.cgi?id=4988"}},{"id":"fedoraproject-msg-CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2"}},{"id":"GHSA-qppj-fm5r-hxr3","source":{"name":"GitHub Advisory","url":"https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3"}},{"id":"fedoraproject-msg-LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG"}},{"id":"fedoraproject-msg-WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX"}},{"id":"fedoraproject-msg-FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU"}},{"id":"ntap-20240426-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240426-0007"}}],"advisories":[{"title":"NetApp Advisory ntap-20231016-0001","url":"https://security.netapp.com/advisory/ntap-20231016-0001"},{"title":"Qualys Advisory cve-2023-44487-http-2-rapid-reset-attack","url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack"},{"title":"cve-2023-44487","url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"},{"title":"Red Hat Advisory cve-2023-44487","url":"https://access.redhat.com/security/cve/cve-2023-44487"},{"title":"GitHub Advisory GHSA-qppj-fm5r-hxr3","url":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3"},{"title":"Seanmonstar Advisory hyper-http2-rapid-reset-unaffected","url":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected"},{"title":"Ubuntu Advisory CVE-2023-44487","url":"https://ubuntu.com/security/CVE-2023-44487"},{"title":"GitHub Advisory GHSA-xpw8-rcwv-8f8p","url":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p"},{"title":"Darkreading Advisory internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","url":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event"},{"title":"Netlify Advisory netlify-successfully-mitigates-cve-2023-44487","url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487"},{"title":"Arstechnica Advisory how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size","url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size"},{"title":"Swift Advisory 67764","url":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764"},{"title":"Phoronix Advisory HTTP2-Rapid-Reset-Attack","url":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack"},{"title":"Microsoft Advisory CVE-2023-44487","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487"},{"title":"Google Advisory google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps","url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps"},{"title":"Openssf Advisory http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response","url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response"},{"title":"NetApp Advisory ntap-20240621-0006","url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"title":"GitHub Advisory GHSA-vx74-f528-fxqg","url":"https://github.com/advisories/GHSA-vx74-f528-fxqg"},{"title":"Debian Advisory dsa-5570","url":"https://www.debian.org/security/2023/dsa-5570"},{"title":"cve-2023-44487","url":"https://blog.vespa.ai/cve-2023-44487"},{"title":"Debian Advisory dsa-5522","url":"https://www.debian.org/security/2023/dsa-5522"},{"title":"Nginx Advisory http-2-rapid-reset-attack-impacting-f5-nginx-products","url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products"},{"title":"Debian Advisory dsa-5549","url":"https://www.debian.org/security/2023/dsa-5549"},{"title":"GitHub Advisory GHSA-2m7v-gc89-fjqf","url":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf"},{"title":"Haproxy Advisory haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","url":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487"},{"title":"NetApp Advisory ntap-20240621-0007","url":"https://security.netapp.com/advisory/ntap-20240621-0007"},{"title":"Hashicorp Advisory 59715","url":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715"},{"title":"Amazon Advisory AWS-2023-011","url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011"},{"title":"Bleepingcomputer Advisory new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records","url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records"},{"title":"Eclipse Advisory msg00181","url":"https://www.eclipse.org/lists/jetty-announce/msg00181.html"},{"title":"Theregister Advisory http2_rapid_reset_zeroday","url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday"},{"title":"Debian Advisory dsa-5540","url":"https://www.debian.org/security/2023/dsa-5540"},{"title":"Debian Advisory dsa-5558","url":"https://www.debian.org/security/2023/dsa-5558"},{"title":"Google Advisory how-it-works-the-novel-http2-rapid-reset-ddos-attack","url":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"},{"title":"Gentoo Advisory glsa-202311-09","url":"https://security.gentoo.org/glsa/202311-09"},{"title":"cve-2023-44487","url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487"},{"title":"Litespeedtech Advisory rapid-reset-http-2-vulnerablilty","url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty"},{"title":"CVE-2023-44487","url":"https://security.paloaltonetworks.com/CVE-2023-44487"},{"title":"Debian Advisory dsa-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"title":"CVE-2023-44487","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487"},{"title":"Microsoft Advisory microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http","url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2"},{"title":"F5 Advisory K000137106","url":"https://my.f5.com/manage/s/article/K000137106"},{"title":"GitHub Advisory GHSA-qppj-fm5r-hxr3","url":"https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3"},{"title":"NetApp Advisory ntap-20240426-0007","url":"https://security.netapp.com/advisory/ntap-20240426-0007"}],"cwes":[400],"description":"HTTP/2 Stream Cancellation Attack","detail":"# HTTP/2 Stream Cancellation Attack ## HTTP/2 Rapid reset attack The HTTP/2 protocol allows clients to indicate to the server that a previous stream should be canceled by sending a RST_STREAM frame. The protocol does not require the client and server to coordinate the cancellation in any way, the client may do it unilaterally. The client may also assume that the cancellation will take effect immediately when the server receives the RST_STREAM frame, before any other data from that TCP connection is processed. Abuse of this feature is called a Rapid Reset attack because it relies on the ability for an endpoint to send a RST_STREAM frame immediately after sending a request frame, which makes the other endpoint start working and then rapidly resets the request. The request is canceled, but leaves the HTTP/2 connection open. The HTTP/2 Rapid Reset attack built on this capability is simple: The client opens a large number of streams at once as in the standard HTTP/2 attack, but rather than waiting for a response to each request stream from the server or proxy, the client cancels each request immediately. The ability to reset streams immediately allows each connection to have an indefinite number of requests in flight. By explicitly canceling the requests, the attacker never exceeds the limit on the number of concurrent open streams. The number of in-flight requests is no longer dependent on the round-trip time (RTT), but only on the available network bandwidth. In a typical HTTP/2 server implementation, the server will still have to do significant amounts of work for canceled requests, such as allocating new stream data structures, parsing the query and doing header decompression, and mapping the URL to a resource. For reverse proxy implementations, the request may be proxied to the backend server before the RST_STREAM frame is processed. The client on the other hand paid almost no costs for sending the requests. This creates an exploitable cost asymmetry between the server and the client. Multiple software artifacts implementing HTTP/2 are affected. This advisory was originally ingested from the `swift-nio-http2` repo advisory and their original conent follows. ## swift-nio-http2 specific advisory swift-nio-http2 is vulnerable to a denial-of-service vulnerability in which a malicious client can create and then reset a large number of HTTP/2 streams in a short period of time. This causes swift-nio-http2 to commit to a large amount of expensive work which it then throws away, including creating entirely new `Channel`s to serve the traffic. This can easily overwhelm an `EventLoop` and prevent it from making forward progress. swift-nio-http2 1.28 contains a remediation for this issue that applies reset counter using a sliding window. This constrains the number of stream resets that may occur in a given window of time. Clients violating this limit will have their connections torn down. This allows clients to continue to cancel streams for legitimate reasons, while constraining malicious actors. ## Related CVE(s) BIT-apisix-2023-44487, BIT-aspnet-core-2023-44487, BIT-contour-2023-44487, BIT-dotnet-2023-44487, BIT-dotnet-sdk-2023-44487, BIT-envoy-2023-44487, BIT-golang-2023-44487, BIT-jenkins-2023-44487, BIT-kong-2023-44487, BIT-nginx-2023-44487, BIT-nginx-ingress-controller-2023-44487, BIT-node-2023-44487, BIT-node-min-2023-44487, BIT-solr-2023-44487, BIT-tomcat-2023-44487, BIT-varnish-2023-44487, CGA-4mmr-qwxr-f88g, CGA-5jp5-95p2-jw83, CGA-5v4r-558c-254r, CGA-9w4r-68hh-64j5, CGA-m49h-wjp5-j434, CGA-mp43-q6p3-96v2, CVE-2023-44487, GHSA-m425-mq94-257g, GO-2023-2153","ratings":[{"method":"CVSSv4","severity":"medium","score":6.9,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}],"published":"2023-10-10T21:28:24","updated":"2025-03-07T21:47:01","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2021-24122","bom-ref":"CVE-2021-24122/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.60","status":"affected"},{"version":"10.0.0-M10","status":"unaffected"}]}],"recommendation":"Update to version 10.0.0-M10.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24122","name":"NVD"},"references":[{"id":"apache-msg-rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"ntap-20210212-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210212-0008"}},{"id":"CVE-2021-24122","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24122","name":"NVD"}},{"id":"apache-msg-r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html"}},{"id":"apache-msg-r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E"}},{"id":"openwall-oss-security-msg-2021-01-14-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/01/14/1"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}}],"advisories":[{"title":"NetApp Advisory ntap-20210212-0008","url":"https://security.netapp.com/advisory/ntap-20210212-0008"},{"title":"CVE-2021-24122","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24122"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}],"cwes":[200,706],"description":"Information Disclosure in Apache Tomcat","detail":"# Information Disclosure in Apache Tomcat When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances. ## Related CVE(s) BIT-tomcat-2021-24122, CVE-2021-24122","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2021-05-13T22:30:02","updated":"2024-03-11T16:46:40","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-8034","bom-ref":"CVE-2018-8034/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.32","status":"affected"},{"version":"9.0.10","status":"unaffected"}]}],"recommendation":"Update to version 9.0.10 to resolve CVE-2018-8034 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8034","name":"NVD"},"references":[{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-104895","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104895"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1160","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1160"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"securityfocus-msg-104895","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/104895"}},{"id":"RHSA-2019:0450","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0450"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0451","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0451"}},{"id":"RHSA-2019:1162","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1162"}},{"id":"ntap-20180817-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180817-0001"}},{"id":"CVE-2018-8034","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8034","name":"NVD"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-1041374","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200517032514/http://www.securitytracker.com/id/1041374"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0130","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0130"}},{"id":"RHSA-2019:1159","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1159"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-201807","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283%40minotaur.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html"}},{"id":"RHSA-2019:0131","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0131"}},{"id":"debian-msg-msg00047","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html"}},{"id":"RHSA-2019:1161","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1161"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:3892","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3892"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"securitytracker-msg-1041374","source":{"name":"Securitytracker Mailing List","url":"http://www.securitytracker.com/id/1041374"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1529","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1529"}},{"id":"RHSA-2019:2205","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2205"}},{"id":"apache-msg-ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-201807","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2019:1160","url":"https://access.redhat.com/errata/RHSA-2019:1160"},{"title":"Red Hat Advisory RHSA-2019:0450","url":"https://access.redhat.com/errata/RHSA-2019:0450"},{"title":"Red Hat Advisory RHSA-2019:0451","url":"https://access.redhat.com/errata/RHSA-2019:0451"},{"title":"Red Hat Advisory RHSA-2019:1162","url":"https://access.redhat.com/errata/RHSA-2019:1162"},{"title":"NetApp Advisory ntap-20180817-0001","url":"https://security.netapp.com/advisory/ntap-20180817-0001"},{"title":"CVE-2018-8034","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8034"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Red Hat Advisory RHSA-2019:0130","url":"https://access.redhat.com/errata/RHSA-2019:0130"},{"title":"Red Hat Advisory RHSA-2019:1159","url":"https://access.redhat.com/errata/RHSA-2019:1159"},{"title":"Red Hat Advisory RHSA-2019:0131","url":"https://access.redhat.com/errata/RHSA-2019:0131"},{"title":"Red Hat Advisory RHSA-2019:1161","url":"https://access.redhat.com/errata/RHSA-2019:1161"},{"title":"Red Hat Advisory RHSA-2019:3892","url":"https://access.redhat.com/errata/RHSA-2019:3892"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Red Hat Advisory RHSA-2019:1529","url":"https://access.redhat.com/errata/RHSA-2019:1529"},{"title":"Red Hat Advisory RHSA-2019:2205","url":"https://access.redhat.com/errata/RHSA-2019:2205"}],"cwes":[295],"description":"The host name verification missing in Apache Tomcat","detail":"# The host name verification missing in Apache Tomcat The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T16:32:43","updated":"2024-10-21T19:23:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-11784","bom-ref":"CVE-2018-11784/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.34","status":"affected"},{"version":"8.5.34","status":"unaffected"}]}],"recommendation":"Update to version 8.5.34 to resolve CVE-2018-11784 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11784","name":"NVD"},"references":[{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00030","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-105524","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227030058/http://www.securityfocus.com/bid/105524"}},{"id":"apache-msg-23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20181014-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20181014-0002"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00005","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html"}},{"id":"packetstormsecurity-exploit-Apache-Tomcat-9.0.0M1-Open-Redirect.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html"}},{"id":"GHSA-5q99-f34m-67gc","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-5q99-f34m-67gc"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"RHSA-2019:0485","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0485"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00006","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0130","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0130"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00056","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0131","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0131"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1529","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1529"}},{"id":"CVE-2018-11784","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11784","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"NetApp Advisory ntap-20181014-0002","url":"https://security.netapp.com/advisory/ntap-20181014-0002"},{"title":"GitHub Advisory GHSA-5q99-f34m-67gc","url":"https://github.com/advisories/GHSA-5q99-f34m-67gc"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Red Hat Advisory RHSA-2019:0485","url":"https://access.redhat.com/errata/RHSA-2019:0485"},{"title":"Red Hat Advisory RHSA-2019:0130","url":"https://access.redhat.com/errata/RHSA-2019:0130"},{"title":"Red Hat Advisory RHSA-2019:0131","url":"https://access.redhat.com/errata/RHSA-2019:0131"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Red Hat Advisory RHSA-2019:1529","url":"https://access.redhat.com/errata/RHSA-2019:1529"},{"title":"CVE-2018-11784","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11784"}],"cwes":[601],"description":"Apache Tomcat Open Redirect vulnerability","detail":"# Apache Tomcat Open Redirect vulnerability When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.","ratings":[{"method":"CVSSv3","severity":"medium","score":4.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"published":"2018-10-17T16:31:02","updated":"2024-03-11T05:31:33","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2018-1304","bom-ref":"CVE-2018-1304/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.28","status":"affected"},{"version":"9.0.5","status":"unaffected"}]}],"recommendation":"Update to version 9.0.5 to resolve CVE-2018-1304 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1304","name":"NVD"},"references":[{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:1450","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1450"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2939","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2939"}},{"id":"GHSA-6rxj-58jh-436r","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-6rxj-58jh-436r"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2018-4258247","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00044","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html"}},{"id":"RHSA-2018:1451","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1451"}},{"id":"debian-msg-msg00004","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:2205","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2205"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"RHSA-2018:1448","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1448"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:1320","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1320"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"archive-msg-1040427","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200516074457/http://www.securitytracker.com/id/1040427"}},{"id":"RHSA-2018:0466","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:0466"}},{"id":"apache-msg-b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:1447","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1447"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-103170","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227102806/http://www.securityfocus.com/bid/103170"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20180706-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180706-0001"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2018-1304","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1304","name":"NVD"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:1449","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1449"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"}},{"id":"RHSA-2018:0465","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:0465"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:1450","url":"https://access.redhat.com/errata/RHSA-2018:1450"},{"title":"Red Hat Advisory RHSA-2018:2939","url":"https://access.redhat.com/errata/RHSA-2018:2939"},{"title":"GitHub Advisory GHSA-6rxj-58jh-436r","url":"https://github.com/advisories/GHSA-6rxj-58jh-436r"},{"title":"Oracle Advisory cpujul2018-4258247","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"title":"Red Hat Advisory RHSA-2018:1451","url":"https://access.redhat.com/errata/RHSA-2018:1451"},{"title":"Red Hat Advisory RHSA-2019:2205","url":"https://access.redhat.com/errata/RHSA-2019:2205"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Red Hat Advisory RHSA-2018:1448","url":"https://access.redhat.com/errata/RHSA-2018:1448"},{"title":"Red Hat Advisory RHSA-2018:1320","url":"https://access.redhat.com/errata/RHSA-2018:1320"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Red Hat Advisory RHSA-2018:0466","url":"https://access.redhat.com/errata/RHSA-2018:0466"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Red Hat Advisory RHSA-2018:1447","url":"https://access.redhat.com/errata/RHSA-2018:1447"},{"title":"NetApp Advisory ntap-20180706-0001","url":"https://security.netapp.com/advisory/ntap-20180706-0001"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"CVE-2018-1304","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1304"},{"title":"Red Hat Advisory RHSA-2018:1449","url":"https://access.redhat.com/errata/RHSA-2018:1449"},{"title":"Red Hat Advisory RHSA-2018:0465","url":"https://access.redhat.com/errata/RHSA-2018:0465"}],"cwes":[],"description":"Apache Tomcat unauthorized access vulnerability","detail":"# Apache Tomcat unauthorized access vulnerability The URL pattern of \"\" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T16:31:17","updated":"2024-11-29T05:39:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-8037","bom-ref":"CVE-2018-8037/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.5|<8.5.32","status":"affected"},{"version":"8.5.32","status":"unaffected"}]}],"recommendation":"Update to version 8.5.32 to resolve CVE-2018-8037 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8037","name":"NVD"},"references":[{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2867","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2867"}},{"id":"apache-msg-201808","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201808.mbox/%3C0c616b4d-4e81-e7f8-b81d-1bb4c575aa33%40apache.org%3E"}},{"id":"ntap-20180817-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180817-0001"}},{"id":"apache-msg-5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c@%3Cusers.tomcat.apache.org%3E"}},{"id":"CVE-2018-8037","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8037","name":"NVD"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2868","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2868"}},{"id":"archive-msg-1041376","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200515223903/http://www.securitytracker.com/id/1041376"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-201807","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090623.GA92700%40minotaur.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1529","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1529"}},{"id":"apache-msg-2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39%40%3Cusers.tomcat.apache.org%3E"}},{"id":"archive-msg-104894","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227102808/http://www.securityfocus.com/bid/104894"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:2867","url":"https://access.redhat.com/errata/RHSA-2018:2867"},{"title":"NetApp Advisory ntap-20180817-0001","url":"https://security.netapp.com/advisory/ntap-20180817-0001"},{"title":"CVE-2018-8037","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8037"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Red Hat Advisory RHSA-2018:2868","url":"https://access.redhat.com/errata/RHSA-2018:2868"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Red Hat Advisory RHSA-2019:1529","url":"https://access.redhat.com/errata/RHSA-2019:1529"}],"cwes":[362],"description":"Apache Tomcat Race Condition vulnerability","detail":"# Apache Tomcat Race Condition vulnerability If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T16:33:02","updated":"2024-03-11T05:32:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2024-24549","bom-ref":"CVE-2024-24549/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<=8.5.98|!=8.5.99","status":"affected"},{"version":"8.5.99","status":"unaffected"}]}],"recommendation":"Update to version 8.5.99 to resolve CVE-2024-24549 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24549","name":"NVD"},"references":[{"id":"ntap-20240402-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240402-0002"}},{"id":"CVE-2024-24549","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24549","name":"NVD"}},{"id":"fedoraproject-msg-3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html"}},{"id":"openwall-oss-security-msg-2024-03-13-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/03/13/3"}},{"id":"apache-msg-4c50rmomhbbsdgfjsgwlb51xdwfjdcvg","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg"}},{"id":"fedoraproject-msg-736G4GPZWS2DSQO5WKXO3G6OMZKFEK55","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55"}}],"advisories":[{"title":"NetApp Advisory ntap-20240402-0002","url":"https://security.netapp.com/advisory/ntap-20240402-0002"},{"title":"CVE-2024-24549","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24549"}],"cwes":[20],"description":"Apache Tomcat Denial of Service due to improper input validation vulnerability for HTTP/2 requests","detail":"# Apache Tomcat Denial of Service due to improper input validation vulnerability for HTTP/2 requests Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. ## Related CVE(s) BIT-tomcat-2024-24549, CVE-2024-24549","ratings":[{"method":"CVSSv4","severity":"medium","score":6.6,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"}],"published":"2024-03-13T18:31:34","updated":"2025-02-13T19:13:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-0232","bom-ref":"CVE-2019-0232/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<8.5.40","status":"affected"},{"version":"8.5.40","status":"unaffected"}]}],"recommendation":"Update to version 8.5.40 to resolve CVE-2019-0232 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0232","name":"NVD"},"references":[{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232","source":{"name":"Nightwatchcybersecurity Advisory","url":"https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232"}},{"id":"apache-msg-52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac@%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"brocade-security-advisory-2019-784","source":{"name":"Broadcom Advisory","url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784"}},{"id":"apache-msg-673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a@%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E"}},{"id":"everyone-quotes-command-line-arguments-the-wrong-way","source":{"name":"Archive Advisory","url":"https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"java-and-command-line-injections-in-windows","source":{"name":"Blogspot Advisory","url":"https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html"}},{"id":"apache-msg-a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35@%3Ccommits.ofbiz.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/4","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/4"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat","source":{"name":"Trendmicro Advisory","url":"https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat"}},{"id":"apache-msg-f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a%40%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"packetstormsecurity-exploit-Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html"}},{"id":"apache-msg-52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac%40%3Ccommits.ofbiz.apache.org%3E"}},{"id":"archive-msg-107906","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227030103/http://www.securityfocus.com/bid/107906"}},{"id":"CVE-2019-0232","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0232","name":"NVD"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"Synology_SA_19_17","source":{"name":"Synology Advisory","url":"https://www.synology.com/security/advisory/Synology_SA_19_17"}},{"id":"ntap-20190419-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190419-0001"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"apache-msg-r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E"}},{"id":"RHSA-2019:1712","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1712"}},{"id":"apache-msg-96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35%40%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767@%3Cannounce.tomcat.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Nightwatchcybersecurity Advisory remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232","url":"https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232"},{"title":"Broadcom Advisory brocade-security-advisory-2019-784","url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784"},{"title":"Archive Advisory everyone-quotes-command-line-arguments-the-wrong-way","url":"https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way"},{"title":"Blogspot Advisory java-and-command-line-injections-in-windows","url":"https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html"},{"title":"Trendmicro Advisory uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat","url":"https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat"},{"title":"CVE-2019-0232","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0232"},{"title":"Synology Advisory Synology_SA_19_17","url":"https://www.synology.com/security/advisory/Synology_SA_19_17"},{"title":"NetApp Advisory ntap-20190419-0001","url":"https://security.netapp.com/advisory/ntap-20190419-0001"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Red Hat Advisory RHSA-2019:1712","url":"https://access.redhat.com/errata/RHSA-2019:1712"}],"cwes":[78],"description":"Apache Tomcat OS Command Injection vulnerability","detail":"# Apache Tomcat OS Command Injection vulnerability When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).","ratings":[{"method":"CVSSv3","severity":"high","score":8.1,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2019-04-18T14:27:35","updated":"2024-03-16T05:19:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2019-17563","bom-ref":"CVE-2019-17563/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<8.5.50","status":"affected"},{"version":"7.0.99","status":"unaffected"}]}],"recommendation":"Update to version 7.0.99 to resolve CVE-2019-17563 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17563","name":"NVD"},"references":[{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"glsa-202003-43","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202003-43"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20200107-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200107-0001"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"CVE-2019-17563","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17563","name":"NVD"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}},{"id":"debian-msg-msg00026","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00013","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html"}},{"id":"debian-msg-msg00024","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html"}},{"id":"apache-msg-reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E"}},{"id":"apache-msg-8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}}],"advisories":[{"title":"Gentoo Advisory glsa-202003-43","url":"https://security.gentoo.org/glsa/202003-43"},{"title":"NetApp Advisory ntap-20200107-0001","url":"https://security.netapp.com/advisory/ntap-20200107-0001"},{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"CVE-2019-17563","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17563"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}],"cwes":[384],"description":"In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack","detail":"# In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2019-12-26T18:22:26","updated":"2024-03-10T05:19:10","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2020-1938","bom-ref":"CVE-2020-1938/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<8.5.51","status":"affected"},{"version":"8.5.51","status":"unaffected"}]}],"recommendation":"Update to version 8.5.51 to resolve CVE-2020-1938 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1938","name":"NVD"},"references":[{"id":"apache-msg-r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-L46WJIV6UV3FWA5O5YEY6XLA73RYD53B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B"}},{"id":"apache-msg-r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00002","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html"}},{"id":"fedoraproject-msg-2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS"}},{"id":"apache-msg-r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E"}},{"id":"ntap-20200226-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200226-0002"}},{"id":"apache-msg-r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E"}},{"id":"apache-msg-r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E"}},{"id":"fedoraproject-msg-K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG"}},{"id":"apache-msg-rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"debian-msg-msg00026","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"}},{"id":"apache-msg-rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E"}},{"id":"fedoraproject-msg-K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG"}},{"id":"apache-msg-r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E"}},{"id":"apache-msg-r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E"}},{"id":"glsa-202003-43","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202003-43"}},{"id":"apache-msg-r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E"}},{"id":"apache-msg-ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E"}},{"id":"apache-msg-r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"debian-msg-msg00006","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html"}},{"id":"opensuse-msg-msg00025","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html"}},{"id":"apache-msg-rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E"}},{"id":"dsa-4673","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4673"}},{"id":"apache-msg-r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"apache-msg-rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"CVE-2020-1938","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1938","name":"NVD"}},{"id":"apache-msg-rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E"}},{"id":"apache-msg-r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E"}},{"id":"apache-msg-r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS"}},{"id":"apache-msg-rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"}},{"id":"apache-msg-r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E"}},{"id":"fedoraproject-msg-L46WJIV6UV3FWA5O5YEY6XLA73RYD53B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B"}}],"advisories":[{"title":"NetApp Advisory ntap-20200226-0002","url":"https://security.netapp.com/advisory/ntap-20200226-0002"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Gentoo Advisory glsa-202003-43","url":"https://security.gentoo.org/glsa/202003-43"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Debian Advisory dsa-4673","url":"https://www.debian.org/security/2020/dsa-4673"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"CVE-2020-1938","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1938"}],"cwes":[269],"description":"Improper Privilege Management in Tomcat","detail":"# Improper Privilege Management in Tomcat When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: returning arbitrary files from anywhere in the web application, processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. ## Related CVE(s) BIT-tomcat-2020-1938, CVE-2020-1938","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2020-06-15T18:51:21","updated":"2024-07-25T13:49:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2024-21733","bom-ref":"CVE-2024-21733/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.7|<8.5.64","status":"affected"},{"version":"8.5.64","status":"unaffected"}]}],"recommendation":"Update to version 8.5.64 to resolve CVE-2024-21733 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21733","name":"NVD"},"references":[{"id":"openwall-oss-security-msg-2024-01-19-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/01/19/2"}},{"id":"apache-msg-h9bjqdd0odj6lhs2o96qgowcc6hb0cfz","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/h9bjqdd0odj6lhs2o96qgowcc6hb0cfz"}},{"id":"ntap-20240216-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240216-0005"}},{"id":"CVE-2024-21733","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21733","name":"NVD"}},{"id":"packetstormsecurity-exploit-Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html"}}],"advisories":[{"title":"NetApp Advisory ntap-20240216-0005","url":"https://security.netapp.com/advisory/ntap-20240216-0005"},{"title":"CVE-2024-21733","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21733"}],"cwes":[209],"description":"Apache Tomcat vulnerable to Generation of Error Message Containing Sensitive Information","detail":"# Apache Tomcat vulnerable to Generation of Error Message Containing Sensitive Information Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue. ## Related CVE(s) BIT-tomcat-2024-21733, CVE-2024-21733","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2024-01-19T12:30:18","updated":"2025-02-13T19:44:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2023-46589","bom-ref":"CVE-2023-46589/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.96","status":"affected"},{"version":"8.5.96","status":"unaffected"}]}],"recommendation":"Update to version 8.5.96 to resolve CVE-2023-46589 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46589","name":"NVD"},"references":[{"id":"openwall-oss-security-msg-2023-11-28-2","source":{"name":"Openwall Mailing List","url":"https://www.openwall.com/lists/oss-security/2023/11/28/2"}},{"id":"CVE-2023-46589","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46589","name":"NVD"}},{"id":"openwall-oss-security-msg-2023-11-28-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/11/28/2"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00001.html"}},{"id":"ntap-20231214-0009","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231214-0009"}},{"id":"apache-msg-0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr"}}],"advisories":[{"title":"CVE-2023-46589","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46589"},{"title":"NetApp Advisory ntap-20231214-0009","url":"https://security.netapp.com/advisory/ntap-20231214-0009"}],"cwes":[20,444],"description":"Apache Tomcat Improper Input Validation vulnerability","detail":"# Apache Tomcat Improper Input Validation vulnerability Improper Input Validation vulnerability in Apache Tomcat. Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82, and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11\u00a0onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue. ## Related CVE(s) BIT-tomcat-2023-46589, CVE-2023-46589","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2023-11-28T18:30:23","updated":"2025-02-13T19:34:02","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2023-42795","bom-ref":"CVE-2023-42795/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.94","status":"affected"},{"version":"8.5.94","status":"unaffected"}]}],"recommendation":"Update to version 8.5.94 to resolve CVE-2023-42795 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42795","name":"NVD"},"references":[{"id":"dsa-5522","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5522"}},{"id":"apache-msg-065jfyo583490r9j2v73nhpyxdob56lw","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/065jfyo583490r9j2v73nhpyxdob56lw"}},{"id":"dsa-5521","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5521"}},{"id":"debian-msg-msg00020","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}},{"id":"openwall-oss-security-msg-2023-10-10-9","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/10/9"}},{"id":"ntap-20231103-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231103-0007"}},{"id":"CVE-2023-42795","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42795","name":"NVD"}}],"advisories":[{"title":"Debian Advisory dsa-5522","url":"https://www.debian.org/security/2023/dsa-5522"},{"title":"Debian Advisory dsa-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"title":"NetApp Advisory ntap-20231103-0007","url":"https://security.netapp.com/advisory/ntap-20231103-0007"},{"title":"CVE-2023-42795","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42795"}],"cwes":[459],"description":"Apache Tomcat Incomplete Cleanup vulnerability","detail":"# Apache Tomcat Incomplete Cleanup vulnerability Incomplete Cleanup vulnerability in Apache Tomcat. When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. ## Related CVE(s) BIT-tomcat-2023-42795, CVE-2023-42795","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2023-10-10T18:31:35","updated":"2025-02-13T19:34:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-12418","bom-ref":"CVE-2019-12418/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<8.5.48","status":"affected"},{"version":"7.0.99","status":"unaffected"}]}],"recommendation":"Update to version 7.0.99 to resolve CVE-2019-12418 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12418","name":"NVD"},"references":[{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00013","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"CVE-2019-12418","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12418","name":"NVD"}},{"id":"debian-msg-msg00029","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"glsa-202003-43","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202003-43"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"apache-msg-43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00024","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html"}},{"id":"K10107360","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K10107360?utm_source=f5support&utm_medium=RSS"}},{"id":"ntap-20200107-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200107-0001"}}],"advisories":[{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"CVE-2019-12418","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12418"},{"title":"Gentoo Advisory glsa-202003-43","url":"https://security.gentoo.org/glsa/202003-43"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"F5 Advisory K10107360","url":"https://support.f5.com/csp/article/K10107360?utm_source=f5support&utm_medium=RSS"},{"title":"NetApp Advisory ntap-20200107-0001","url":"https://security.netapp.com/advisory/ntap-20200107-0001"}],"cwes":[522],"description":"Insufficiently Protected Credentials in Apache Tomcat","detail":"# Insufficiently Protected Credentials in Apache Tomcat When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.","ratings":[{"method":"CVSSv31","severity":"high","score":7.0,"vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2019-12-26T18:22:36","updated":"2024-03-14T05:19:45","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2021-25122","bom-ref":"CVE-2021-25122/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.63","status":"affected"},{"version":"8.5.63","status":"unaffected"}]}],"recommendation":"Update to version 8.5.63 to resolve CVE-2021-25122 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25122","name":"NVD"},"references":[{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html"}},{"id":"glsa-202208-34","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202208-34"}},{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E"}},{"id":"ntap-20210409-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210409-0002"}},{"id":"dsa-4891","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4891"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"CVE-2021-25122","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25122","name":"NVD"}},{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"openwall-oss-security-msg-2021-03-01-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/03/01/1"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Gentoo Advisory glsa-202208-34","url":"https://security.gentoo.org/glsa/202208-34"},{"title":"NetApp Advisory ntap-20210409-0002","url":"https://security.netapp.com/advisory/ntap-20210409-0002"},{"title":"Debian Advisory dsa-4891","url":"https://www.debian.org/security/2021/dsa-4891"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"CVE-2021-25122","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25122"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[200],"description":"Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat","detail":"# Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request. ## Related CVE(s) BIT-tomcat-2021-25122, CVE-2021-25122","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2021-06-16T17:45:29","updated":"2024-02-19T05:31:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2021-25329","bom-ref":"CVE-2021-25329/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<8.5.61","status":"affected"},{"version":"8.5.61","status":"unaffected"}]}],"recommendation":"Update to version 8.5.61 to resolve CVE-2021-25329 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25329","name":"NVD"},"references":[{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E"}},{"id":"CVE-2021-25329","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25329","name":"NVD"}},{"id":"openwall-oss-security-msg-2021-03-01-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/03/01/2"}},{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E"}},{"id":"glsa-202208-34","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202208-34"}},{"id":"apache-msg-rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20210409-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210409-0002"}},{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"dsa-4891","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4891"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E"}}],"advisories":[{"title":"CVE-2021-25329","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25329"},{"title":"Gentoo Advisory glsa-202208-34","url":"https://security.gentoo.org/glsa/202208-34"},{"title":"NetApp Advisory ntap-20210409-0002","url":"https://security.netapp.com/advisory/ntap-20210409-0002"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Debian Advisory dsa-4891","url":"https://www.debian.org/security/2021/dsa-4891"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}],"cwes":[502],"description":"Potential remote code execution in Apache Tomcat","detail":"# Potential remote code execution in Apache Tomcat The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue. ## Related CVE(s) BIT-tomcat-2021-25329, CVE-2021-25329","ratings":[{"method":"CVSSv31","severity":"high","score":7.0,"vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-03-19T20:11:13","updated":"2024-03-08T05:18:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-0221","bom-ref":"CVE-2019-0221/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<8.5.40","status":"affected"},{"version":"8.5.40","status":"unaffected"}]}],"recommendation":"Update to version 8.5.40 to resolve CVE-2019-0221 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0221","name":"NVD"},"references":[{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20190606-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190606-0001"}},{"id":"glsa-202003-43","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202003-43"}},{"id":"fedoraproject-msg-ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/50","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/50"}},{"id":"packetstormsecurity-exploit-Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"apache-msg-r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00090","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html"}},{"id":"apache-msg-6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00044","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html"}},{"id":"archive-msg-108545","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227055048/http://www.securityfocus.com/bid/108545"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00015","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:3931","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3931"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221","source":{"name":"Nightwatchcybersecurity Advisory","url":"https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221"}},{"id":"fedoraproject-msg-NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3"}},{"id":"K13184144","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS"}},{"id":"CVE-2019-0221","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0221","name":"NVD"}},{"id":"K13184144","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E"}},{"id":"RHSA-2019:3929","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3929"}},{"id":"apache-msg-6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00054","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"NetApp Advisory ntap-20190606-0001","url":"https://security.netapp.com/advisory/ntap-20190606-0001"},{"title":"Gentoo Advisory glsa-202003-43","url":"https://security.gentoo.org/glsa/202003-43"},{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"Red Hat Advisory RHSA-2019:3931","url":"https://access.redhat.com/errata/RHSA-2019:3931"},{"title":"Nightwatchcybersecurity Advisory xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221","url":"https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221"},{"title":"F5 Advisory K13184144","url":"https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS"},{"title":"CVE-2019-0221","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0221"},{"title":"F5 Advisory K13184144","url":"https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2019:3929","url":"https://access.redhat.com/errata/RHSA-2019:3929"}],"cwes":[79],"description":"Cross-site scripting in Apache Tomcat","detail":"# Cross-site scripting in Apache Tomcat The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2019-05-30T03:30:42","updated":"2024-03-11T14:57:09","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2018-1305","bom-ref":"CVE-2018-1305/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<=8.5.27|!=8.5.28","status":"affected"},{"version":"9.0.5","status":"unaffected"}]}],"recommendation":"Update to version 9.0.5 to resolve CVE-2018-1305 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1305","name":"NVD"},"references":[{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2939","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2939"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2018-4258247","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2018-1305","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1305","name":"NVD"}},{"id":"apache-msg-d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00044","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html"}},{"id":"debian-msg-msg00004","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-103144","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227030042/http://www.securityfocus.com/bid/103144"}},{"id":"RHSA-2019:2205","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2205"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:1320","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1320"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"RHSA-2018:0466","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:0466"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20180706-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180706-0001"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-1040428","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200516094320/http://www.securitytracker.com/id/1040428"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"}},{"id":"RHSA-2018:0465","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:0465"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:2939","url":"https://access.redhat.com/errata/RHSA-2018:2939"},{"title":"Oracle Advisory cpujul2018-4258247","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"title":"CVE-2018-1305","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1305"},{"title":"Red Hat Advisory RHSA-2019:2205","url":"https://access.redhat.com/errata/RHSA-2019:2205"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Red Hat Advisory RHSA-2018:1320","url":"https://access.redhat.com/errata/RHSA-2018:1320"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Red Hat Advisory RHSA-2018:0466","url":"https://access.redhat.com/errata/RHSA-2018:0466"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"NetApp Advisory ntap-20180706-0001","url":"https://security.netapp.com/advisory/ntap-20180706-0001"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2018:0465","url":"https://access.redhat.com/errata/RHSA-2018:0465"}],"cwes":[],"description":"Apache Tomcat information exposure vulnerability","detail":"# Apache Tomcat information exposure vulnerability Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T16:31:48","updated":"2024-11-29T05:50:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-1336","bom-ref":"CVE-2018-1336/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.31","status":"affected"},{"version":"9.0.8","status":"unaffected"}]}],"recommendation":"Update to version 9.0.8 to resolve CVE-2018-1336 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1336","name":"NVD"},"references":[{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2743","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2743"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-1041375","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20190703075545/http://www.securitytracker.com/id/1041375"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2939","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2939"}},{"id":"apache-msg-201807","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E"}},{"id":"CVE-2018-1336","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1336","name":"NVD"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-104898","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104898"}},{"id":"RHSA-2018:3768","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:3768"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2701","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2701"}},{"id":"ntap-20180817-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180817-0001"}},{"id":"K73008537","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2921","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2921"}},{"id":"RHSA-2018:2700","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2700"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHEA-2018:2188","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHEA-2018:2188"}},{"id":"RHSA-2018:2741","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2741"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"K73008537","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K73008537?utm_source=f5support&%3Butm_medium=RSS"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2930","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2930"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2945","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2945"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html"}},{"id":"RHSA-2018:2740","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2740"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHEA-2018:2189","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHEA-2018:2189"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2742","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2742"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:2743","url":"https://access.redhat.com/errata/RHSA-2018:2743"},{"title":"Red Hat Advisory RHSA-2018:2939","url":"https://access.redhat.com/errata/RHSA-2018:2939"},{"title":"CVE-2018-1336","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1336"},{"title":"Red Hat Advisory RHSA-2018:3768","url":"https://access.redhat.com/errata/RHSA-2018:3768"},{"title":"Red Hat Advisory RHSA-2018:2701","url":"https://access.redhat.com/errata/RHSA-2018:2701"},{"title":"NetApp Advisory ntap-20180817-0001","url":"https://security.netapp.com/advisory/ntap-20180817-0001"},{"title":"F5 Advisory K73008537","url":"https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Red Hat Advisory RHSA-2018:2921","url":"https://access.redhat.com/errata/RHSA-2018:2921"},{"title":"Red Hat Advisory RHSA-2018:2700","url":"https://access.redhat.com/errata/RHSA-2018:2700"},{"title":"Red Hat Advisory RHEA-2018:2188","url":"https://access.redhat.com/errata/RHEA-2018:2188"},{"title":"Red Hat Advisory RHSA-2018:2741","url":"https://access.redhat.com/errata/RHSA-2018:2741"},{"title":"F5 Advisory K73008537","url":"https://support.f5.com/csp/article/K73008537?utm_source=f5support&%3Butm_medium=RSS"},{"title":"Red Hat Advisory RHSA-2018:2930","url":"https://access.redhat.com/errata/RHSA-2018:2930"},{"title":"Red Hat Advisory RHSA-2018:2945","url":"https://access.redhat.com/errata/RHSA-2018:2945"},{"title":"Red Hat Advisory RHSA-2018:2740","url":"https://access.redhat.com/errata/RHSA-2018:2740"},{"title":"Red Hat Advisory RHEA-2018:2189","url":"https://access.redhat.com/errata/RHEA-2018:2189"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2018:2742","url":"https://access.redhat.com/errata/RHSA-2018:2742"}],"cwes":[835],"description":"In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder ","detail":"# In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2018-10-17T16:32:18","updated":"2024-03-12T05:33:41","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2022-42252","bom-ref":"CVE-2022-42252/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.83","status":"affected"},{"version":"8.5.83","status":"unaffected"}]}],"recommendation":"Update to version 8.5.83 to resolve CVE-2022-42252 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42252","name":"NVD"},"references":[{"id":"glsa-202305-37","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202305-37"}},{"id":"CVE-2022-42252","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42252","name":"NVD"}},{"id":"apache-msg-zzcxzvqfdqn515zfs3dxb7n8gty589sq","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq"}}],"advisories":[{"title":"Gentoo Advisory glsa-202305-37","url":"https://security.gentoo.org/glsa/202305-37"},{"title":"CVE-2022-42252","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42252"}],"cwes":[20,444],"description":"Apache Tomcat may reject request containing invalid Content-Length header","detail":"# Apache Tomcat may reject request containing invalid Content-Length header If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. ## Related CVE(s) BIT-tomcat-2022-42252, CVE-2022-42252","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2022-11-01T12:00:30","updated":"2024-04-23T20:46:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2023-41080","bom-ref":"CVE-2023-41080/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.93","status":"affected"},{"version":"8.5.93","status":"unaffected"}]}],"recommendation":"Update to version 8.5.93 to resolve CVE-2023-41080 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41080","name":"NVD"},"references":[{"id":"apache-msg-71wvwprtx2j2m54fovq9zr7gbm2wow2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f"}},{"id":"dsa-5522","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5522"}},{"id":"debian-msg-msg00020","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}},{"id":"dsa-5521","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5521"}},{"id":"ntap-20230921-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230921-0006"}},{"id":"CVE-2023-41080","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41080","name":"NVD"}}],"advisories":[{"title":"Debian Advisory dsa-5522","url":"https://www.debian.org/security/2023/dsa-5522"},{"title":"Debian Advisory dsa-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"title":"NetApp Advisory ntap-20230921-0006","url":"https://security.netapp.com/advisory/ntap-20230921-0006"},{"title":"CVE-2023-41080","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41080"}],"cwes":[601],"description":"Apache Tomcat Open Redirect vulnerability","detail":"# Apache Tomcat Open Redirect vulnerability URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application. ## Related CVE(s) BIT-tomcat-2023-41080, CVE-2023-41080","ratings":[{"method":"CVSSv31","severity":"medium","score":6.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2023-08-25T21:30:48","updated":"2024-02-17T05:31:37","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-10072","bom-ref":"CVE-2019-10072/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.41","status":"affected"},{"version":"8.5.41","status":"unaffected"}]}],"recommendation":"Update to version 8.5.41 to resolve CVE-2019-10072 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10072","name":"NVD"},"references":[{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"Synology_SA_19_29","source":{"name":"Synology Advisory","url":"https://www.synology.com/security/advisory/Synology_SA_19_29"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"K17321505","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K17321505"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"CVE-2019-10072","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10072","name":"NVD"}},{"id":"apache-msg-df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00013","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-108874","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227033743/http://www.securityfocus.com/bid/108874"}},{"id":"ntap-20190625-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190625-0002"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:3931","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3931"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"RHSA-2019:3929","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3929"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Synology Advisory Synology_SA_19_29","url":"https://www.synology.com/security/advisory/Synology_SA_19_29"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"F5 Advisory K17321505","url":"https://support.f5.com/csp/article/K17321505"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"CVE-2019-10072","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10072"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"NetApp Advisory ntap-20190625-0002","url":"https://security.netapp.com/advisory/ntap-20190625-0002"},{"title":"Red Hat Advisory RHSA-2019:3931","url":"https://access.redhat.com/errata/RHSA-2019:3931"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Red Hat Advisory RHSA-2019:3929","url":"https://access.redhat.com/errata/RHSA-2019:3929"}],"cwes":[667],"description":"Improper Locking in Apache Tomcat","detail":"# Improper Locking in Apache Tomcat The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2019-06-26T01:09:40","updated":"2024-03-11T15:55:43","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-0199","bom-ref":"CVE-2019-0199/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<8.5.38","status":"affected"},{"version":"8.5.38","status":"unaffected"}]}],"recommendation":"Update to version 8.5.38 to resolve CVE-2019-0199 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0199","name":"NVD"},"references":[{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"K17321505","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K17321505"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46"}},{"id":"apache-msg-4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46"}},{"id":"apache-msg-e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6%40%3Cusers.tomcat.apache.org%3E"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e%40%3Ccommits.tomee.apache.org%3E"}},{"id":"opensuse-msg-msg00090","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef@%3Cannounce.apache.org%3E"}},{"id":"CVE-2019-0199","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0199","name":"NVD"}},{"id":"apache-msg-158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a@%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}},{"id":"fedoraproject-msg-NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3"}},{"id":"apache-msg-a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00013","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00013.html"}},{"id":"apache-msg-e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9%40%3Cannounce.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:3931","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3931"}},{"id":"apache-msg-cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef%40%3Cannounce.apache.org%3E"}},{"id":"apache-msg-dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3"}},{"id":"apache-msg-ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9@%3Cannounce.apache.org%3E"}},{"id":"ntap-20190419-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190419-0001"}},{"id":"archive-msg-107674","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227030041/http://www.securityfocus.com/bid/107674"}},{"id":"apache-msg-9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6@%3Cusers.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:3929","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3929"}},{"id":"apache-msg-4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094@%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00054","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html"}},{"id":"apache-msg-e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c%40%3Cusers.tomcat.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"F5 Advisory K17321505","url":"https://support.f5.com/csp/article/K17321505"},{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"CVE-2019-0199","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0199"},{"title":"Red Hat Advisory RHSA-2019:3931","url":"https://access.redhat.com/errata/RHSA-2019:3931"},{"title":"NetApp Advisory ntap-20190419-0001","url":"https://security.netapp.com/advisory/ntap-20190419-0001"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2019:3929","url":"https://access.redhat.com/errata/RHSA-2019:3929"}],"cwes":[400],"description":"Apache Tomcat Denial of Service vulnerability","detail":"# Apache Tomcat Denial of Service vulnerability The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2020-06-15T18:51:09","updated":"2024-03-16T05:16:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2020-1935","bom-ref":"CVE-2020-1935/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<8.5.51","status":"affected"},{"version":"7.0.100","status":"unaffected"}]}],"recommendation":"Update to version 7.0.100 to resolve CVE-2020-1935 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1935","name":"NVD"},"references":[{"id":"apache-msg-rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4673","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4673"}},{"id":"apache-msg-rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"apache-msg-r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E"}},{"id":"ntap-20200327-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200327-0005"}},{"id":"debian-msg-msg00026","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"}},{"id":"apache-msg-r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E"}},{"id":"CVE-2020-1935","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1935","name":"NVD"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"debian-msg-msg00006","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00025","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html"}}],"advisories":[{"title":"Debian Advisory dsa-4673","url":"https://www.debian.org/security/2020/dsa-4673"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"NetApp Advisory ntap-20200327-0005","url":"https://security.netapp.com/advisory/ntap-20200327-0005"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"CVE-2020-1935","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1935"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"cwes":[444],"description":"Potential HTTP request smuggling in Apache Tomcat","detail":"# Potential HTTP request smuggling in Apache Tomcat In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. ## Related CVE(s) BIT-tomcat-2020-1935, CVE-2020-1935","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"published":"2020-02-28T01:10:48","updated":"2024-03-14T05:17:09","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-8014","bom-ref":"CVE-2018-8014/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.32","status":"affected"},{"version":"9.0.9","status":"unaffected"}]}],"recommendation":"Update to version 9.0.9 to resolve CVE-2018-8014 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8014","name":"NVD"},"references":[{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0450","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0450"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:3768","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:3768"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0451","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0451"}},{"id":"ntap-20181018-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20181018-0002"}},{"id":"archive-msg-1040998","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20201207101131/http://www.securitytracker.com/id/1040998"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:2205","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2205"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"archive-msg-1041888","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20201207080723/http://www.securitytracker.com/id/1041888"}},{"id":"apache-msg-fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2469","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2469"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00015","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html"}},{"id":"apache-msg-fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2470","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2470"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2018-8014","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8014","name":"NVD"}},{"id":"archive-msg-104203","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20181017143233/http://www.securityfocus.com/bid/104203"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1529","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1529"}},{"id":"GHSA-r4x2-3cq5-hqvp","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-r4x2-3cq5-hqvp"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"}},{"id":"apache-msg-ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2019:0450","url":"https://access.redhat.com/errata/RHSA-2019:0450"},{"title":"Red Hat Advisory RHSA-2018:3768","url":"https://access.redhat.com/errata/RHSA-2018:3768"},{"title":"Red Hat Advisory RHSA-2019:0451","url":"https://access.redhat.com/errata/RHSA-2019:0451"},{"title":"NetApp Advisory ntap-20181018-0002","url":"https://security.netapp.com/advisory/ntap-20181018-0002"},{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"Red Hat Advisory RHSA-2019:2205","url":"https://access.redhat.com/errata/RHSA-2019:2205"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Red Hat Advisory RHSA-2018:2469","url":"https://access.redhat.com/errata/RHSA-2018:2469"},{"title":"Red Hat Advisory RHSA-2018:2470","url":"https://access.redhat.com/errata/RHSA-2018:2470"},{"title":"CVE-2018-8014","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8014"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2019:1529","url":"https://access.redhat.com/errata/RHSA-2019:1529"},{"title":"GitHub Advisory GHSA-r4x2-3cq5-hqvp","url":"https://github.com/advisories/GHSA-r4x2-3cq5-hqvp"}],"cwes":[1188],"description":"The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins","detail":"# The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2018-10-17T16:32:32","updated":"2024-03-12T05:32:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2023-45648","bom-ref":"CVE-2023-45648/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<8.5.94","status":"affected"},{"version":"8.5.94","status":"unaffected"}]}],"recommendation":"Update to version 8.5.94 to resolve CVE-2023-45648 or update to version 10.0.0-M10 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45648","name":"NVD"},"references":[{"id":"CVE-2023-45648","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45648","name":"NVD"}},{"id":"apache-msg-2pv8yz1pyp088tsxfb7ogltk9msk0jdp","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp"}},{"id":"openwall-oss-security-msg-2023-10-10-10","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/10/10"}},{"id":"dsa-5522","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5522"}},{"id":"dsa-5521","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5521"}},{"id":"debian-msg-msg00020","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}},{"id":"ntap-20231103-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231103-0007"}}],"advisories":[{"title":"CVE-2023-45648","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45648"},{"title":"Debian Advisory dsa-5522","url":"https://www.debian.org/security/2023/dsa-5522"},{"title":"Debian Advisory dsa-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"title":"NetApp Advisory ntap-20231103-0007","url":"https://security.netapp.com/advisory/ntap-20231103-0007"}],"cwes":[20],"description":"Apache Tomcat Improper Input Validation vulnerability","detail":"# Apache Tomcat Improper Input Validation vulnerability Improper Input Validation vulnerability in Apache Tomcat. Tomcat\u00a0from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue. ## Related CVE(s) BIT-tomcat-2023-45648, CVE-2023-45648","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"published":"2023-10-10T21:31:12","updated":"2025-02-13T19:37:54","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2024-23672","bom-ref":"CVE-2024-23672/pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<=8.5.98|!=8.5.99","status":"affected"},{"version":"11.0.0-M17","status":"unaffected"}]}],"recommendation":"Update to version 11.0.0-M17.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23672","name":"NVD"},"references":[{"id":"ntap-20240402-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240402-0002"}},{"id":"fedoraproject-msg-3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html"}},{"id":"CVE-2024-23672","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23672","name":"NVD"}},{"id":"openwall-oss-security-msg-2024-03-13-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/03/13/4"}},{"id":"apache-msg-cmpswfx6tj4s7x0nxxosvfqs11lvdx2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f"}},{"id":"fedoraproject-msg-736G4GPZWS2DSQO5WKXO3G6OMZKFEK55","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55"}}],"advisories":[{"title":"NetApp Advisory ntap-20240402-0002","url":"https://security.netapp.com/advisory/ntap-20240402-0002"},{"title":"CVE-2024-23672","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23672"}],"cwes":[459],"description":"Denial of Service via incomplete cleanup vulnerability in Apache Tomcat","detail":"# Denial of Service via incomplete cleanup vulnerability in Apache Tomcat Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. ## Related CVE(s) BIT-tomcat-2024-23672, CVE-2024-23672","ratings":[{"method":"CVSSv31","severity":"medium","score":6.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"published":"2024-03-13T18:31:34","updated":"2025-02-13T19:13:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 13 locations"}]},{"id":"CVE-2024-38809","bom-ref":"CVE-2024-38809/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.3.9|!=5.3.38","status":"affected"},{"version":"5.3.38","status":"unaffected"}]}],"recommendation":"Update to version 5.3.38.","source":{"url":"https://spring.io/security/cve-2024-38809"},"references":[{"id":"cve-2024-38809","source":{"url":"https://spring.io/security/cve-2024-38809"}},{"id":"CVE-2024-38809","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38809","name":"NVD"}}],"advisories":[{"title":"cve-2024-38809","url":"https://spring.io/security/cve-2024-38809"},{"title":"CVE-2024-38809","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38809"}],"cwes":[1333,400],"description":"Spring Framework DoS via conditional HTTP request","detail":"# Spring Framework DoS via conditional HTTP request ### Description Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack. ### Affected Spring Products and Versions org.springframework:spring-web in versions 6.1.0 through 6.1.11 6.0.0 through 6.0.22 5.3.0 through 5.3.37 Older, unsupported versions are also affected ### Mitigation Users of affected versions should upgrade to the corresponding fixed version. 6.1.x -> 6.1.12 6.0.x -> 6.0.23 5.3.x -> 5.3.38 No other mitigation steps are necessary. Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2024-09-24T18:34:43","updated":"2025-02-21T15:43:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 171 locations"}]},{"id":"CVE-2024-22262","bom-ref":"CVE-2024-22262/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.3.9|!=5.3.34","status":"affected"},{"version":"5.3.34","status":"unaffected"}]}],"recommendation":"Update to version 5.3.34 to resolve CVE-2024-22262 or update to version 5.3.38 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22262","name":"NVD"},"references":[{"id":"ntap-20240524-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240524-0003"}},{"id":"CVE-2024-22262","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22262","name":"NVD"}},{"id":"cve-2024-22262","source":{"url":"https://spring.io/security/cve-2024-22262"}}],"advisories":[{"title":"NetApp Advisory ntap-20240524-0003","url":"https://security.netapp.com/advisory/ntap-20240524-0003"},{"title":"CVE-2024-22262","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22262"},{"title":"cve-2024-22262","url":"https://spring.io/security/cve-2024-22262"}],"cwes":[601],"description":"Spring Framework URL Parsing with Host Validation","detail":"# Spring Framework URL Parsing with Host Validation Applications that use UriComponentsBuilder\u00a0to parse an externally provided URL (e.g. through a query parameter) AND\u00a0perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html \u00a0attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 \u00a0and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"published":"2024-04-16T06:30:28","updated":"2025-02-13T19:11:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 171 locations"}]},{"id":"CVE-2018-11039","bom-ref":"CVE-2018-11039/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=4.3.0|<4.3.18","status":"affected"},{"version":"4.3.18","status":"unaffected"}]}],"recommendation":"Update to version 4.3.18 to resolve CVE-2018-11039 or update to version 5.3.38 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-11039"},"references":[{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"GHSA-9gcm-f4x3-8jpw","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-9gcm-f4x3-8jpw"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"cve-2018-11039","source":{"url":"https://pivotal.io/security/cve-2018-11039"}},{"id":"securityfocus-msg-107984","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/107984"}},{"id":"cve-2018-11039","source":{"url":"https://spring.io/security/cve-2018-11039"}},{"id":"debian-msg-msg00022","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"CVE-2018-11039","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11039","name":"NVD"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"GitHub Advisory GHSA-9gcm-f4x3-8jpw","url":"https://github.com/advisories/GHSA-9gcm-f4x3-8jpw"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"cve-2018-11039","url":"https://pivotal.io/security/cve-2018-11039"},{"title":"cve-2018-11039","url":"https://spring.io/security/cve-2018-11039"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"CVE-2018-11039","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11039"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}],"cwes":[],"description":"Spring Framework Cross Site Tracing (XST)","detail":"# Spring Framework Cross Site Tracing (XST) Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-16T17:35:54","updated":"2024-12-02T05:43:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 171 locations"}]},{"id":"CVE-2024-22243","bom-ref":"CVE-2024-22243/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.2.9.RELEASE","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2024-22243. Updating to version 5.3.38 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22243","name":"NVD"},"references":[{"id":"ntap-20240524-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240524-0001"}},{"id":"seclists-exploit-fulldisclosure/2024/Sep/24","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2024/Sep/24"}},{"id":"CVE-2024-22243","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22243","name":"NVD"}},{"id":"cve-2024-22243","source":{"url":"https://spring.io/security/cve-2024-22243"}}],"advisories":[{"title":"NetApp Advisory ntap-20240524-0001","url":"https://security.netapp.com/advisory/ntap-20240524-0001"},{"title":"CVE-2024-22243","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22243"},{"title":"cve-2024-22243","url":"https://spring.io/security/cve-2024-22243"}],"cwes":[601],"description":"Spring Web vulnerable to Open Redirect or Server Side Request Forgery","detail":"# Spring Web vulnerable to Open Redirect or Server Side Request Forgery Applications that use UriComponentsBuilder\u00a0to parse an externally provided URL (e.g. through a query parameter) AND\u00a0perform validation checks on the host of the parsed URL may be vulnerable to a open redirect attack or to a SSRF attack if the URL is used after passing validation checks.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"published":"2024-02-23T06:30:31","updated":"2025-02-13T19:37:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 171 locations"}]},{"id":"CVE-2024-22259","bom-ref":"CVE-2024-22259/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.3.9|!=5.3.33","status":"affected"},{"version":"5.3.33","status":"unaffected"}]}],"recommendation":"Update to version 5.3.33 to resolve CVE-2024-22259 or update to version 5.3.38 to resolve additional vulnerabilities for this package.","source":{"url":"https://spring.io/security/cve-2024-22259"},"references":[{"id":"ntap-20240524-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240524-0002"}},{"id":"cve-2024-22259","source":{"url":"https://spring.io/security/cve-2024-22259"}},{"id":"CVE-2024-22259","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22259","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20240524-0002","url":"https://security.netapp.com/advisory/ntap-20240524-0002"},{"title":"cve-2024-22259","url":"https://spring.io/security/cve-2024-22259"},{"title":"CVE-2024-22259","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22259"}],"cwes":[601],"description":"Spring Framework URL Parsing with Host Validation Vulnerability","detail":"# Spring Framework URL Parsing with Host Validation Vulnerability Applications that use UriComponentsBuilder in Spring Framework\u00a0to parse an externally provided URL (e.g. through a query parameter) AND\u00a0perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html \u00a0attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22243 https://spring.io/security/cve-2024-22243, but with different input.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"published":"2024-03-16T06:30:27","updated":"2025-02-13T19:11:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 171 locations"}]},{"id":"CVE-2022-22965","bom-ref":"CVE-2022-22965/pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.2.9.RELEASE|!=5.2.20.RELEASE","status":"affected"},{"version":"5.2.20.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 5.2.20.RELEASE to resolve CVE-2022-22965 or update to version 6.1.14 to resolve additional vulnerabilities for this package.","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22965"},"references":[{"id":"SNWLID-2022-0005","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"}},{"id":"cve-2022-22965","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22965"}},{"id":"970766","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/970766"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cisco-sa-java-spring-rce-Zx9GUc67","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"}},{"id":"ssa-254054","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"packetstormsecurity-exploit-Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html"}},{"id":"packetstormsecurity-exploit-Spring4Shell-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html"}},{"id":"CVE-2022-22965","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965","name":"NVD"}}],"advisories":[{"title":"Sonicwall Advisory SNWLID-2022-0005","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"},{"title":"Vmware Advisory cve-2022-22965","url":"https://tanzu.vmware.com/security/cve-2022-22965"},{"title":"Cert Advisory 970766","url":"https://www.kb.cert.org/vuls/id/970766"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Cisco Advisory cisco-sa-java-spring-rce-Zx9GUc67","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"},{"title":"Siemens Advisory ssa-254054","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"CVE-2022-22965","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965"}],"cwes":[74,94],"description":"Remote Code Execution in Spring Framework","detail":"# Remote Code Execution in Spring Framework Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. These are the prerequisites for the exploit: - JDK 9 or higher - Apache Tomcat as the Servlet container - Packaged as WAR - `spring-webmvc` or `spring-webflux` dependency ## Patches - Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE) - Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12) ## Workarounds For those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting. To apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-03-31T18:30:50","updated":"2025-01-29T19:19:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 7 locations"}]},{"id":"CVE-2024-38819","bom-ref":"CVE-2024-38819/pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=6.1.9|!=6.1.14","status":"affected"},{"version":"6.1.14","status":"unaffected"}]}],"recommendation":"Update to version 6.1.14.","source":{"url":"https://spring.io/security/cve-2024-38819"},"references":[{"id":"ntap-20250110-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250110-0010"}},{"id":"cve-2024-38819","source":{"url":"https://spring.io/security/cve-2024-38819"}},{"id":"CVE-2024-38819","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38819","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20250110-0010","url":"https://security.netapp.com/advisory/ntap-20250110-0010"},{"title":"cve-2024-38819","url":"https://spring.io/security/cve-2024-38819"},{"title":"CVE-2024-38819","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38819"}],"cwes":[22],"description":"Spring Framework Path Traversal vulnerability","detail":"# Spring Framework Path Traversal vulnerability Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-12-19T18:31:38","updated":"2025-01-10T15:59:29","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2020-17521","bom-ref":"CVE-2020-17521/pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar","versions":[{"range":"vers:maven/>=2.0.0|<2.4.21","status":"affected"},{"version":"2.4.21","status":"unaffected"}]}],"recommendation":"Update to version 2.4.21.","source":{"url":"https://groovy-lang.org/security.html#CVE-2020-17521"},"references":[{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E"}},{"id":"CVE-2020-17521","source":{"url":"https://groovy-lang.org/security.html#CVE-2020-17521"}},{"id":"apache-msg-rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3@%3Cdev.atlas.apache.org%3E"}},{"id":"ntap-20201218-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20201218-0006"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E"}},{"id":"CVE-2020-17521","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-17521","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"CVE-2020-17521","url":"https://groovy-lang.org/security.html#CVE-2020-17521"},{"title":"NetApp Advisory ntap-20201218-0006","url":"https://security.netapp.com/advisory/ntap-20201218-0006"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"CVE-2020-17521","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-17521"}],"cwes":[379],"description":"Information Disclosure in Apache Groovy","detail":"# Information Disclosure in Apache Groovy Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2020-12-09T19:03:03","updated":"2024-10-17T16:22:52","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-thymeleaf@1.5.1.RELEASE?type=jar\", \"pkg:maven/nz.net.ultraq.thymeleaf/thymeleaf-layout-dialect@1.4.0?type=jar\", \"pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2018-3258","bom-ref":"CVE-2018-3258/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=2.0.14|<=8.0.12|!=8.0.13","status":"affected"},{"version":"8.0.13","status":"unaffected"}]}],"recommendation":"Update to version 8.0.13 to resolve CVE-2018-3258 or update to version 8.0.28 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3258","name":"NVD"},"references":[{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"CVE-2018-3258","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3258","name":"NVD"}},{"id":"RHSA-2019:1545","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1545"}},{"id":"ntap-20181018-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20181018-0002"}}],"advisories":[{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"CVE-2018-3258","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3258"},{"title":"Red Hat Advisory RHSA-2019:1545","url":"https://access.redhat.com/errata/RHSA-2019:1545"},{"title":"NetApp Advisory ntap-20181018-0002","url":"https://security.netapp.com/advisory/ntap-20181018-0002"}],"cwes":[269],"description":"Improper Privilege Management in MySQL Connectors Java","detail":"# Improper Privilege Management in MySQL Connectors Java Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).","ratings":[{"method":"CVSSv3","severity":"high","score":8.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-05-13T01:52:26","updated":"2024-02-20T05:34:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-21363","bom-ref":"CVE-2022-21363/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=2.0.14|<=8.0.27|!=8.0.28","status":"affected"},{"version":"8.0.28","status":"unaffected"}]}],"recommendation":"Update to version 8.0.28.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21363","name":"NVD"},"references":[{"id":"CVE-2022-21363","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21363","name":"NVD"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}}],"advisories":[{"title":"CVE-2022-21363","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21363"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}],"cwes":[280],"description":"Improper Handling of Insufficient Permissions or Privileges in MySQL Connectors Java","detail":"# Improper Handling of Insufficient Permissions or Privileges in MySQL Connectors Java Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).","ratings":[{"method":"CVSSv31","severity":"medium","score":6.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-01-20T00:00:48","updated":"2023-11-08T04:08:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2019-2692","bom-ref":"CVE-2019-2692/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=2.0.14|<=8.0.15|!=8.0.16","status":"affected"},{"version":"8.0.16","status":"unaffected"}]}],"recommendation":"Update to version 8.0.16 to resolve CVE-2019-2692 or update to version 8.0.28 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2692","name":"NVD"},"references":[{"id":"SNYK-JAVA-MYSQL-174574","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574"}},{"id":"ntap-20190423-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190423-0002"}},{"id":"CVE-2019-2692","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2692","name":"NVD"}},{"id":"securityfocus-msg-107925","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/107925"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-MYSQL-174574","url":"https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574"},{"title":"NetApp Advisory ntap-20190423-0002","url":"https://security.netapp.com/advisory/ntap-20190423-0002"},{"title":"CVE-2019-2692","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2692"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}],"cwes":[843],"description":"Privilege escalation in mysql-connector-jav","detail":"# Privilege escalation in mysql-connector-jav Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","ratings":[{"method":"CVSSv3","severity":"medium","score":6.3,"vector":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"published":"2020-07-01T17:12:20","updated":"2024-02-17T05:24:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-22102","bom-ref":"CVE-2023-22102/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=2.0.14|<=8.0.33","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-22102. Updating to version 8.0.28 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22102","name":"NVD"},"references":[{"id":"cpuoct2023","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2023.html"}},{"id":"ntap-20231027-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231027-0007"}},{"id":"CVE-2023-22102","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22102","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpuoct2023","url":"https://www.oracle.com/security-alerts/cpuoct2023.html"},{"title":"NetApp Advisory ntap-20231027-0007","url":"https://security.netapp.com/advisory/ntap-20231027-0007"},{"title":"CVE-2023-22102","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22102"}],"cwes":[],"description":"MySQL Connectors takeover vulnerability","detail":"# MySQL Connectors takeover vulnerability Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors.","ratings":[{"method":"CVSSv4","severity":"high","score":8.9,"vector":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"}],"published":"2023-10-18T00:31:42","updated":"2024-12-05T17:02:29","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-2471","bom-ref":"CVE-2021-2471/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<=8.0.26|!=8.0.27","status":"affected"},{"version":"8.0.27","status":"unaffected"}]}],"recommendation":"Update to version 8.0.27 to resolve CVE-2021-2471 or update to version 8.0.28 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2471","name":"NVD"},"references":[{"id":"CVE-2021-2471","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2471","name":"NVD"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}}],"advisories":[{"title":"CVE-2021-2471","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2471"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}],"cwes":[863],"description":"Incorrect Authorization in MySQL Connector Java","detail":"# Incorrect Authorization in MySQL Connector Java Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H).","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H"}],"published":"2022-05-24T19:18:20","updated":"2023-11-08T04:05:14","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-22570","bom-ref":"CVE-2021-22570/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.15.0","status":"affected"},{"version":"3.15.0","status":"unaffected"}]}],"recommendation":"Update to version 3.15.0 to resolve CVE-2021-22570 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22570","name":"NVD"},"references":[{"id":"fedoraproject-msg-3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA"}},{"id":"fedoraproject-msg-BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY"}},{"id":"fedoraproject-msg-MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE"}},{"id":"CVE-2021-22570","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22570","name":"NVD"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"debian-msg-msg00019","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html"}},{"id":"PYSEC-2022-48","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/protobuf/PYSEC-2022-48.yaml"}},{"id":"fedoraproject-msg-KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B"}},{"id":"ntap-20220429-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220429-0005"}},{"id":"GHSA-77rm-9x9h-xj3g","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-77rm-9x9h-xj3g"}},{"id":"fedoraproject-msg-5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X"}},{"id":"fedoraproject-msg-NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP"}},{"id":"fedoraproject-msg-IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ"}}],"advisories":[{"title":"CVE-2021-22570","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22570"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"GitHub Advisory PYSEC-2022-48","url":"https://github.com/pypa/advisory-database/tree/main/vulns/protobuf/PYSEC-2022-48.yaml"},{"title":"NetApp Advisory ntap-20220429-0005","url":"https://security.netapp.com/advisory/ntap-20220429-0005"},{"title":"GitHub Advisory GHSA-77rm-9x9h-xj3g","url":"https://github.com/advisories/GHSA-77rm-9x9h-xj3g"}],"cwes":[476],"description":"NULL Pointer Dereference in Protocol Buffers","detail":"# NULL Pointer Dereference in Protocol Buffers Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater. ## Related CVE(s) CGA-j63r-xcw7-ppw8, CVE-2021-22570, PYSEC-2022-48","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-01-27T00:01:15","updated":"2024-10-22T05:28:58","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-3510","bom-ref":"CVE-2022-3510/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.16.3","status":"affected"},{"version":"3.16.3","status":"unaffected"}]}],"recommendation":"Update to version 3.16.3 to resolve CVE-2022-3510 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3510","name":"NVD"},"references":[{"id":"CVE-2022-3510","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3510","name":"NVD"}}],"advisories":[{"title":"CVE-2022-3510","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3510"}],"cwes":[400],"description":"Protobuf Java vulnerable to Uncontrolled Resource Consumption","detail":"# Protobuf Java vulnerable to Uncontrolled Resource Consumption A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above. ## Related CVE(s) CGA-24m5-8f5h-34wq, CVE-2022-3510","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-12-12T15:30:33","updated":"2024-10-22T05:29:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-7254","bom-ref":"CVE-2024-7254/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.25.5","status":"affected"},{"version":"3.25.5","status":"unaffected"}]}],"recommendation":"Update to version 3.25.5.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7254","name":"NVD"},"references":[{"id":"ntap-20250418-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250418-0006"}},{"id":"ntap-20241213-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241213-0010"}},{"id":"CVE-2024-7254","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7254","name":"NVD"}},{"id":"CVE-2024-7254","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/google-protobuf/CVE-2024-7254.yml"}},{"id":"GHSA-735f-pc8j-v9w8","source":{"name":"GitHub Advisory","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-735f-pc8j-v9w8"}}],"advisories":[{"title":"NetApp Advisory ntap-20250418-0006","url":"https://security.netapp.com/advisory/ntap-20250418-0006"},{"title":"NetApp Advisory ntap-20241213-0010","url":"https://security.netapp.com/advisory/ntap-20241213-0010"},{"title":"CVE-2024-7254","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7254"},{"title":"GitHub Advisory CVE-2024-7254","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/google-protobuf/CVE-2024-7254.yml"},{"title":"GitHub Advisory GHSA-735f-pc8j-v9w8","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-735f-pc8j-v9w8"}],"cwes":[20],"description":"protobuf-java has potential Denial of Service issue","detail":"# protobuf-java has potential Denial of Service issue ### Summary When parsing unknown fields in the Protobuf Java Lite and Full library, a maliciously crafted message can cause a StackOverflow error and lead to a program crash. Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team Affected versions: This issue affects all versions of both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime. ### Severity [CVE-2024-7254](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254) **High** CVSS4.0 Score 8.7 (NOTE: there may be a delay in publication) This is a potential Denial of Service. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker. ### Proof of Concept For reproduction details, please refer to the unit tests (Protobuf Java [LiteTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/lite/src/test/java/com/google/protobuf/LiteTest.java) and [CodedInputStreamTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/core/src/test/java/com/google/protobuf/CodedInputStreamTest.java)) that identify the specific inputs that exercise this parsing weakness. ### Remediation and Mitigation We have been working diligently to address this issue and have released a mitigation that is available now. Please update to the latest available versions of the following packages: * protobuf-java (3.25.5, 4.27.5, 4.28.2) * protobuf-javalite (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin-lite (3.25.5, 4.27.5, 4.28.2) * com-protobuf [JRuby gem only] (3.25.5, 4.27.5, 4.28.2)","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-09-19T16:06:03","updated":"2025-04-23T15:03:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-3509","bom-ref":"CVE-2022-3509/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.16.3","status":"affected"},{"version":"3.16.3","status":"unaffected"}]}],"recommendation":"Update to version 3.16.3 to resolve CVE-2022-3509 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3509","name":"NVD"},"references":[{"id":"CVE-2022-3509","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3509","name":"NVD"}}],"advisories":[{"title":"CVE-2022-3509","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3509"}],"cwes":[400],"description":"Protobuf Java vulnerable to Uncontrolled Resource Consumption","detail":"# Protobuf Java vulnerable to Uncontrolled Resource Consumption A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above. ## Related CVE(s) CGA-m9x3-8pwv-rjh3, CVE-2022-3509","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-12-12T15:30:33","updated":"2024-10-22T05:29:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-3171","bom-ref":"CVE-2022-3171/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.16.3","status":"affected"},{"version":"3.16.3","status":"unaffected"}]}],"recommendation":"Update to version 3.16.3 to resolve CVE-2022-3171 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/google-protobuf/CVE-2022-3171.yml"},"references":[{"id":"fedoraproject-msg-MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP"}},{"id":"fedoraproject-msg-CBAUKJQL6O4TIWYBENORSY5P43TVB4M3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3"}},{"id":"GHSA-h4h5-3hr4-j3g2","source":{"name":"GitHub Advisory","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2"}},{"id":"CVE-2022-3171","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/google-protobuf/CVE-2022-3171.yml"}},{"id":"CVE-2022-3171","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3171","name":"NVD"}},{"id":"glsa-202301-09","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202301-09"}}],"advisories":[{"title":"GitHub Advisory GHSA-h4h5-3hr4-j3g2","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2"},{"title":"GitHub Advisory CVE-2022-3171","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/google-protobuf/CVE-2022-3171.yml"},{"title":"CVE-2022-3171","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3171"},{"title":"Gentoo Advisory glsa-202301-09","url":"https://security.gentoo.org/glsa/202301-09"}],"cwes":[20],"description":"protobuf-java has a potential Denial of Service issue","detail":"# protobuf-java has a potential Denial of Service issue ## Summary A potential Denial of Service issue in `protobuf-java` core and lite was discovered in the parsing procedure for binary and text format data. Input streams containing multiple instances of non-repeated [embedded messages](http://developers.google.com/protocol-buffers/docs/encoding#embedded) with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. Reporter: [OSS Fuzz](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48771) Affected versions: This issue affects both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime. ## Severity [CVE-2022-3171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3171) Medium - CVSS Score: 5.7 (NOTE: there may be a delay in publication) ## Remediation and Mitigation Please update to the latest available versions of the following packages: protobuf-java (3.21.7, 3.20.3, 3.19.6, 3.16.3) protobuf-javalite (3.21.7, 3.20.3, 3.19.6, 3.16.3) protobuf-kotlin (3.21.7, 3.20.3, 3.19.6, 3.16.3) protobuf-kotlin-lite (3.21.7, 3.20.3, 3.19.6, 3.16.3) google-protobuf [JRuby gem only] (3.21.7, 3.20.3, 3.19.6) ## Related CVE(s) CGA-xp6q-2w42-9mfm, CVE-2022-3171","ratings":[{"method":"CVSSv31","severity":"medium","score":5.7,"vector":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-10-04T22:17:15","updated":"2024-10-22T05:28:55","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-22569","bom-ref":"CVE-2021-22569/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.16.1","status":"affected"},{"version":"3.16.1","status":"unaffected"}]}],"recommendation":"Update to version 3.16.1 to resolve CVE-2021-22569 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22569","name":"NVD"},"references":[{"id":"CVE-2021-22569","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22569","name":"NVD"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"openwall-oss-security-msg-2022-01-12-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2022/01/12/4"}},{"id":"GHSA-wrvw-hg22-4m67","source":{"name":"GitHub Advisory","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67"}},{"id":"openwall-oss-security-msg-2022-01-12-7","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2022/01/12/7"}}],"advisories":[{"title":"CVE-2021-22569","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22569"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"GitHub Advisory GHSA-wrvw-hg22-4m67","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67"}],"cwes":[696],"description":"A potential Denial of Service issue in protobuf-java","detail":"# A potential Denial of Service issue in protobuf-java ## Summary A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data. Reporter: [OSS-Fuzz](https://github.com/google/oss-fuzz) Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf \"javalite\" users (typically Android) are not affected. ## Severity [CVE-2021-22569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22569) **High** - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses. ## Proof of Concept For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness. ## Remediation and Mitigation Please update to the latest available versions of the following packages: - protobuf-java (3.16.1, 3.18.2, 3.19.2) - protobuf-kotlin (3.18.2, 3.19.2) - google-protobuf [JRuby gem only] (3.19.2) ## Related CVE(s) CGA-h8j8-9v3w-chjj, CVE-2021-22569","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-01-07T22:31:44","updated":"2024-10-22T05:28:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2018-1000632","bom-ref":"CVE-2018-1000632/pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","affects":[{"ref":"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","versions":[{"range":"vers:maven/>=2.1.0|<2.1.1","status":"affected"},{"version":"2.0.3","status":"unaffected"}]}],"recommendation":"Update to version 2.0.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000632","name":"NVD"},"references":[{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"RHSA-2019:1160","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1160"}},{"id":"ntap-20190530-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190530-0001"}},{"id":"apache-msg-7f6e120e6ed473f4e00dde4c398fc6698eb383bd7857d20513e989ce","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7f6e120e6ed473f4e00dde4c398fc6698eb383bd7857d20513e989ce@%3Cdev.maven.apache.org%3E"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"RHSA-2019:1162","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1162"}},{"id":"CVE-2018-1000632","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000632","name":"NVD"}},{"id":"fedoraproject-msg-IOOVVCRQE6ATFD2JM2EMDXOQXTRIVZGP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOOVVCRQE6ATFD2JM2EMDXOQXTRIVZGP"}},{"id":"fedoraproject-msg-KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA"}},{"id":"dom4j-xml-injection","source":{"name":"Ihacktoprotect Advisory","url":"https://ihacktoprotect.com/post/dom4j-xml-injection"}},{"id":"apache-msg-9d4c1af6f702c3d6d6f229de57112ddccac8ce44446a01b7937ab9e0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/9d4c1af6f702c3d6d6f229de57112ddccac8ce44446a01b7937ab9e0@%3Ccommits.maven.apache.org%3E"}},{"id":"apache-msg-d7d960b2778e35ec9b4d40c8efd468c7ce7163bcf6489b633491c89f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d7d960b2778e35ec9b4d40c8efd468c7ce7163bcf6489b633491c89f@%3Cdev.maven.apache.org%3E"}},{"id":"RHSA-2019:0380","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0380"}},{"id":"RHSA-2019:0364","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0364"}},{"id":"apache-msg-rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E"}},{"id":"apache-msg-708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"}},{"id":"RHSA-2019:1159","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1159"}},{"id":"apache-msg-5a020ecaa3c701f408f612f7ba2ee37a021644c4a39da2079ed3ddbc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5a020ecaa3c701f408f612f7ba2ee37a021644c4a39da2079ed3ddbc@%3Ccommits.maven.apache.org%3E"}},{"id":"RHSA-2019:1161","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1161"}},{"id":"GHSA-6pcc-3rfx-4gpm","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-6pcc-3rfx-4gpm"}},{"id":"RHSA-2019:0362","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0362"}},{"id":"apache-msg-7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458@%3Cdev.maven.apache.org%3E"}},{"id":"debian-msg-msg00028","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00028.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-4a77652531d62299a30815cf5f233af183425db8e3c9a824a814e768","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4a77652531d62299a30815cf5f233af183425db8e3c9a824a814e768@%3Cdev.maven.apache.org%3E"}},{"id":"RHSA-2019:0365","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0365"}},{"id":"apache-msg-00571f362a7a2470fba50a31282c65637c40d2e21ebe6ee535a4ed74","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/00571f362a7a2470fba50a31282c65637c40d2e21ebe6ee535a4ed74@%3Ccommits.maven.apache.org%3E"}},{"id":"RHSA-2019:3172","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3172"}}],"advisories":[{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Red Hat Advisory RHSA-2019:1160","url":"https://access.redhat.com/errata/RHSA-2019:1160"},{"title":"NetApp Advisory ntap-20190530-0001","url":"https://security.netapp.com/advisory/ntap-20190530-0001"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Red Hat Advisory RHSA-2019:1162","url":"https://access.redhat.com/errata/RHSA-2019:1162"},{"title":"CVE-2018-1000632","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000632"},{"title":"Ihacktoprotect Advisory dom4j-xml-injection","url":"https://ihacktoprotect.com/post/dom4j-xml-injection"},{"title":"Red Hat Advisory RHSA-2019:0380","url":"https://access.redhat.com/errata/RHSA-2019:0380"},{"title":"Red Hat Advisory RHSA-2019:0364","url":"https://access.redhat.com/errata/RHSA-2019:0364"},{"title":"Red Hat Advisory RHSA-2019:1159","url":"https://access.redhat.com/errata/RHSA-2019:1159"},{"title":"Red Hat Advisory RHSA-2019:1161","url":"https://access.redhat.com/errata/RHSA-2019:1161"},{"title":"GitHub Advisory GHSA-6pcc-3rfx-4gpm","url":"https://github.com/advisories/GHSA-6pcc-3rfx-4gpm"},{"title":"Red Hat Advisory RHSA-2019:0362","url":"https://access.redhat.com/errata/RHSA-2019:0362"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2019:0365","url":"https://access.redhat.com/errata/RHSA-2019:0365"},{"title":"Red Hat Advisory RHSA-2019:3172","url":"https://access.redhat.com/errata/RHSA-2019:3172"}],"cwes":[91],"description":"Dom4j contains a XML Injection vulnerability","detail":"# Dom4j contains a XML Injection vulnerability dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2018-10-16T17:01:25","updated":"2024-03-14T05:33:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 4 locations"}]},{"id":"CVE-2020-10683","bom-ref":"CVE-2020-10683/pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","affects":[{"ref":"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","versions":[{"range":"vers:maven/>=2.1.0|<2.1.3","status":"affected"},{"version":"2.0.3","status":"unaffected"}]}],"recommendation":"Update to version 2.0.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10683","name":"NVD"},"references":[{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"ntap-20200518-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200518-0002"}},{"id":"apache-msg-r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E"}},{"id":"XML_External_Entity_Prevention_Cheat_Sheet","source":{"name":"Owasp Advisory","url":"https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"opensuse-msg-msg00061","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html"}},{"id":"CVE-2020-10683","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10683","name":"NVD"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"redhat-bugzilla-1694235","source":{"name":"Red Hat Bugzilla","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1694235"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"NetApp Advisory ntap-20200518-0002","url":"https://security.netapp.com/advisory/ntap-20200518-0002"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Owasp Advisory XML_External_Entity_Prevention_Cheat_Sheet","url":"https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"CVE-2020-10683","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10683"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}],"cwes":[611],"description":"dom4j allows External Entities by default which might enable XXE attacks","detail":"# dom4j allows External Entities by default which might enable XXE attacks dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2020-06-05T16:13:36","updated":"2024-03-08T05:17:29","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 4 locations"}]},{"id":"CVE-2023-2976","bom-ref":"CVE-2023-2976/pkg:maven/com.google.guava/guava@23.0?type=jar","affects":[{"ref":"pkg:maven/com.google.guava/guava@23.0?type=jar","versions":[{"range":"vers:maven/>=1.0|<32.0.0-android","status":"affected"},{"version":"32.0.0-android","status":"unaffected"}]}],"recommendation":"Update to version 32.0.0-android.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2976","name":"NVD"},"references":[{"id":"ntap-20230818-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230818-0008"}},{"id":"CVE-2023-2976","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2976","name":"NVD"}},{"id":"intel-sa-01006","source":{"name":"Intel Advisory","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html"}}],"advisories":[{"title":"NetApp Advisory ntap-20230818-0008","url":"https://security.netapp.com/advisory/ntap-20230818-0008"},{"title":"CVE-2023-2976","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2976"},{"title":"Intel Advisory intel-sa-01006","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html"}],"cwes":[379,552],"description":"Guava vulnerable to insecure use of temporary directory","detail":"# Guava vulnerable to insecure use of temporary directory Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, maintainers recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows. ## Related CVE(s) CGA-g8pm-vcpp-9jxq, CVE-2023-2976","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2023-06-14T18:30:38","updated":"2025-02-13T19:12:26","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/com.google.guava/guava@23.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 3 locations"}]},{"id":"CVE-2018-10237","bom-ref":"CVE-2018-10237/pkg:maven/com.google.guava/guava@23.0?type=jar","affects":[{"ref":"pkg:maven/com.google.guava/guava@23.0?type=jar","versions":[{"range":"vers:maven/>=11.0|<24.1.1-android","status":"affected"},{"version":"24.1.1-android","status":"unaffected"}]}],"recommendation":"Update to version 24.1.1-android to resolve CVE-2018-10237 or update to version 32.0.0-android to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10237","name":"NVD"},"references":[{"id":"RHSA-2018:2743","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2743"}},{"id":"apache-msg-19fa48533bc7ea1accf6b12746a74ed888ae6e49a5cf81ae4f807495","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/19fa48533bc7ea1accf6b12746a74ed888ae6e49a5cf81ae4f807495@%3Ccommon-dev.hadoop.apache.org%3E"}},{"id":"apache-msg-ra8906723927aef2a599398c238eacfc845b74d812e0093ec2fc70a7d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra8906723927aef2a599398c238eacfc845b74d812e0093ec2fc70a7d@%3Cissues.flink.apache.org%3E"}},{"id":"RHSA-2018:2643","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2643"}},{"id":"apache-msg-b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-r95799427b335807a4c54776908125c3e66597b65845ae50096d9278a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r95799427b335807a4c54776908125c3e66597b65845ae50096d9278a@%3Cdev.cxf.apache.org%3E"}},{"id":"apache-msg-r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-r223bc776a077d0795786c38cbc6e7dd808fce1a9161b00ba9c0a5d55","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r223bc776a077d0795786c38cbc6e7dd808fce1a9161b00ba9c0a5d55@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-rdc56c15693c236e31e1e95f847b8e5e74fc0a05741d47488e7fc8c45","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdc56c15693c236e31e1e95f847b8e5e74fc0a05741d47488e7fc8c45@%3Cissues.flink.apache.org%3E"}},{"id":"RHSA-2018:2423","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2423"}},{"id":"apache-msg-r2ea4e5e5aa8ad73b001a466c582899620961f47d77a40af712c1fdf9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2ea4e5e5aa8ad73b001a466c582899620961f47d77a40af712c1fdf9@%3Cdev.cxf.apache.org%3E"}},{"id":"apache-msg-rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E"}},{"id":"RHSA-2018:2428","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2428"}},{"id":"apache-msg-rc78f6e84f82cc662860e96526d8ab969f34dbe12dc560e22d9d147a3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc78f6e84f82cc662860e96526d8ab969f34dbe12dc560e22d9d147a3@%3Cdev.cxf.apache.org%3E"}},{"id":"apache-msg-r27eb79a87a760335226dbfa6a7b7bffea539a535f8e80c41e482106d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r27eb79a87a760335226dbfa6a7b7bffea539a535f8e80c41e482106d@%3Cdev.cxf.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"RHSA-2018:2927","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2927"}},{"id":"RHSA-2018:2741","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2741"}},{"id":"apache-msg-rb3da574c34bc6bd37972d2266af3093b90d7e437460423c24f477919","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb3da574c34bc6bd37972d2266af3093b90d7e437460423c24f477919@%3Cissues.lucene.apache.org%3E"}},{"id":"google-msg-discussion","source":{"name":"Google Mailing List","url":"https://groups.google.com/d/topic/guava-announce/xqWALw4W1vs/discussion"}},{"id":"ntap-20220629-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220629-0008"}},{"id":"securitytracker-msg-1041707","source":{"name":"Securitytracker Mailing List","url":"http://www.securitytracker.com/id/1041707"}},{"id":"apache-msg-r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E"}},{"id":"RHSA-2018:2425","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2425"}},{"id":"apache-msg-r43491b25b2e5c368c34b106a82eff910a5cea3e90de82ad75cc16540","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r43491b25b2e5c368c34b106a82eff910a5cea3e90de82ad75cc16540@%3Cdev.syncope.apache.org%3E"}},{"id":"RHSA-2018:2598","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2598"}},{"id":"RHSA-2019:2858","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2858"}},{"id":"apache-msg-r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E"}},{"id":"apache-msg-053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E"}},{"id":"apache-msg-f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"}},{"id":"CVE-2018-10237","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10237","name":"NVD"}},{"id":"apache-msg-rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1@%3Ccommon-dev.hadoop.apache.org%3E"}},{"id":"apache-msg-r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E"}},{"id":"RHSA-2018:2740","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2740"}},{"id":"RHSA-2019:3149","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3149"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-r38e2ab87528d3c904e7fac496e8fd766b9277656ff95b97d6b6b6dcd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r38e2ab87528d3c904e7fac496e8fd766b9277656ff95b97d6b6b6dcd@%3Cdev.cxf.apache.org%3E"}},{"id":"apache-msg-ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E"}},{"id":"apache-msg-rd0c8ec6e044aa2958dd0549ebf8ecead7f5968c9474ba73a504161b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0c8ec6e044aa2958dd0549ebf8ecead7f5968c9474ba73a504161b2@%3Cdev.cxf.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"RHSA-2018:2424","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2424"}},{"id":"apache-msg-3d5dbdd92ac9ceaef90e40f78599f9109f2f345252e0ac9d98e7e084","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d5dbdd92ac9ceaef90e40f78599f9109f2f345252e0ac9d98e7e084@%3Cgitbox.activemq.apache.org%3E"}},{"id":"apache-msg-519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-33c6bccfeb7adf644d4d79894ca8f09370be6ed4b20632c2e228d085","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/33c6bccfeb7adf644d4d79894ca8f09370be6ed4b20632c2e228d085@%3Ccommits.cassandra.apache.org%3E"}},{"id":"apache-msg-r50fc0bcc734dd82e691d36d209258683141bfc0083739a77e56ad92d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r50fc0bcc734dd82e691d36d209258683141bfc0083739a77e56ad92d@%3Cdev.flink.apache.org%3E"}},{"id":"RHSA-2018:2742","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2742"}},{"id":"apache-msg-cc48fe770c45a74dc3b37ed0817393e0c96701fc49bc431ed922f3cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/cc48fe770c45a74dc3b37ed0817393e0c96701fc49bc431ed922f3cc@%3Chdfs-dev.hadoop.apache.org%3E"}},{"id":"apache-msg-ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E"}},{"id":"apache-msg-ra4f44016926dcb034b3b230280a18102062f94ae55b8a31bb92fed84","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra4f44016926dcb034b3b230280a18102062f94ae55b8a31bb92fed84@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94@%3Cissues.storm.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:2743","url":"https://access.redhat.com/errata/RHSA-2018:2743"},{"title":"Red Hat Advisory RHSA-2018:2643","url":"https://access.redhat.com/errata/RHSA-2018:2643"},{"title":"Red Hat Advisory RHSA-2018:2423","url":"https://access.redhat.com/errata/RHSA-2018:2423"},{"title":"Red Hat Advisory RHSA-2018:2428","url":"https://access.redhat.com/errata/RHSA-2018:2428"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Red Hat Advisory RHSA-2018:2927","url":"https://access.redhat.com/errata/RHSA-2018:2927"},{"title":"Red Hat Advisory RHSA-2018:2741","url":"https://access.redhat.com/errata/RHSA-2018:2741"},{"title":"NetApp Advisory ntap-20220629-0008","url":"https://security.netapp.com/advisory/ntap-20220629-0008"},{"title":"Red Hat Advisory RHSA-2018:2425","url":"https://access.redhat.com/errata/RHSA-2018:2425"},{"title":"Red Hat Advisory RHSA-2018:2598","url":"https://access.redhat.com/errata/RHSA-2018:2598"},{"title":"Red Hat Advisory RHSA-2019:2858","url":"https://access.redhat.com/errata/RHSA-2019:2858"},{"title":"CVE-2018-10237","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10237"},{"title":"Red Hat Advisory RHSA-2018:2740","url":"https://access.redhat.com/errata/RHSA-2018:2740"},{"title":"Red Hat Advisory RHSA-2019:3149","url":"https://access.redhat.com/errata/RHSA-2019:3149"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2018:2424","url":"https://access.redhat.com/errata/RHSA-2018:2424"},{"title":"Red Hat Advisory RHSA-2018:2742","url":"https://access.redhat.com/errata/RHSA-2018:2742"}],"cwes":[502,770],"description":"Denial of Service in Google Guava","detail":"# Denial of Service in Google Guava Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable. ## Related CVE(s) CGA-8223-gxg7-8cjf, CVE-2018-10237","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2020-06-15T20:35:11","updated":"2024-10-22T05:29:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/com.google.guava/guava@23.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 3 locations"}]},{"id":"CVE-2020-13956","bom-ref":"CVE-2020-13956/pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar","affects":[{"ref":"pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar","versions":[{"range":"vers:maven/>=4.0-alpha1|<=4.5.12|!=4.5.13","status":"affected"},{"version":"4.5.13","status":"unaffected"}]}],"recommendation":"Update to version 4.5.13.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13956","name":"NVD"},"references":[{"id":"apache-msg-rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E"}},{"id":"ntap-20220210-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0002"}},{"id":"apache-msg-r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E"}},{"id":"apache-msg-rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E"}},{"id":"CVE-2020-13956","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13956","name":"NVD"}},{"id":"apache-msg-r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E"}},{"id":"apache-msg-r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E"}},{"id":"apache-msg-rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E"}},{"id":"apache-msg-rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E"}},{"id":"apache-msg-rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E"}},{"id":"apache-msg-r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E"}},{"id":"apache-msg-r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E"}},{"id":"apache-msg-r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E"}},{"id":"apache-msg-r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E"}},{"id":"apache-msg-rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E"}},{"id":"apache-msg-r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"apache-msg-r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E"}},{"id":"apache-msg-rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E"}},{"id":"apache-msg-r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E"}},{"id":"apache-msg-r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E"}},{"id":"apache-msg-rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E"}},{"id":"apache-msg-r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E"}},{"id":"apache-msg-ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E"}},{"id":"apache-msg-rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E"}},{"id":"apache-msg-r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E"}}],"advisories":[{"title":"NetApp Advisory ntap-20220210-0002","url":"https://security.netapp.com/advisory/ntap-20220210-0002"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"CVE-2020-13956","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13956"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}],"cwes":[79],"description":"Cross-site scripting in Apache HttpClient","detail":"# Cross-site scripting in Apache HttpClient Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"published":"2021-06-03T23:40:23","updated":"2024-03-15T05:19:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 3 locations"}]},{"id":"CVE-2021-45046","bom-ref":"CVE-2021-45046/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/>=2.0-alpha1|<=2.12.1|!=2.12.2","status":"affected"},{"version":"2.12.2","status":"unaffected"}]}],"recommendation":"Update to version 2.12.2 to resolve CVE-2021-45046 or update to version 2.12.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45046","name":"NVD"},"references":[{"id":"intel-sa-00646","source":{"name":"Intel Advisory","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"}},{"id":"openwall-oss-security-msg-2021-12-15-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/15/3"}},{"id":"CVE-2021-45046","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45046","name":"NVD"}},{"id":"openwall-oss-security-msg-2021-12-14-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/14/4"}},{"id":"SNWLID-2021-0032","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"}},{"id":"ssa-661247","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"}},{"id":"openwall-oss-security-msg-2021-12-18-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/18/1"}},{"id":"glsa-202310-16","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202310-16"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"930724","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/930724"}},{"id":"openwall-oss-security-msg-2021-12-14-4","source":{"name":"Openwall Mailing List","url":"https://www.openwall.com/lists/oss-security/2021/12/14/4"}},{"id":"dsa-5022","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5022"}},{"id":"fedoraproject-msg-EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"}},{"id":"alert-cve-2021-44228","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"fedoraproject-msg-SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"}},{"id":"GHSA-jfh8-c2jp-5v3q","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-jfh8-c2jp-5v3q"}},{"id":"cisco-sa-apache-log4j-qRuKNEbd","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"fedoraproject-msg-EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"}},{"id":"ssa-714170","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"}},{"id":"ssa-397453","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"}},{"id":"CVE-2021-44228","source":{"url":"https://www.cve.org/CVERecord?id=CVE-2021-44228"}},{"id":"ssa-479842","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"}},{"id":"fedoraproject-msg-SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"}}],"advisories":[{"title":"Intel Advisory intel-sa-00646","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"},{"title":"CVE-2021-45046","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45046"},{"title":"Sonicwall Advisory SNWLID-2021-0032","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"},{"title":"Siemens Advisory ssa-661247","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"},{"title":"Gentoo Advisory glsa-202310-16","url":"https://security.gentoo.org/glsa/202310-16"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Cert Advisory 930724","url":"https://www.kb.cert.org/vuls/id/930724"},{"title":"Debian Advisory dsa-5022","url":"https://www.debian.org/security/2021/dsa-5022"},{"title":"Oracle Advisory alert-cve-2021-44228","url":"https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"GitHub Advisory GHSA-jfh8-c2jp-5v3q","url":"https://github.com/advisories/GHSA-jfh8-c2jp-5v3q"},{"title":"Cisco Advisory cisco-sa-apache-log4j-qRuKNEbd","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Siemens Advisory ssa-714170","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"},{"title":"Siemens Advisory ssa-397453","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"},{"title":"CVE-2021-44228","url":"https://www.cve.org/CVERecord?id=CVE-2021-44228"},{"title":"Siemens Advisory ssa-479842","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"}],"cwes":[502,917],"description":"Incomplete fix for Apache Log4j vulnerability","detail":"# Incomplete fix for Apache Log4j vulnerability # Impact The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack. ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Mitigation Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.formatMsgNoLookups` to `true` do NOT mitigate this specific vulnerability.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"published":"2021-12-14T18:01:28","updated":"2024-06-27T21:46:12","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-44832","bom-ref":"CVE-2021-44832/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/>=2.4|<2.12.4","status":"affected"},{"version":"2.12.4","status":"unaffected"}]}],"recommendation":"Update to version 2.12.4.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44832","name":"NVD"},"references":[{"id":"apache-msg-s1o5vlo78ypqxnzn6p8zf6t9shtq5143","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143"}},{"id":"LOG4J2-3293","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3293"}},{"id":"cisco-sa-apache-log4j-qRuKNEbd","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"debian-msg-msg00036","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"fedoraproject-msg-EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA"}},{"id":"ntap-20220104-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220104-0001"}},{"id":"openwall-oss-security-msg-2021-12-28-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/28/1"}},{"id":"CVE-2021-44832","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44832","name":"NVD"}},{"id":"ssa-784507","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"}},{"id":"fedoraproject-msg-T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC"}}],"advisories":[{"title":"Apache Advisory LOG4J2-3293","url":"https://issues.apache.org/jira/browse/LOG4J2-3293"},{"title":"Cisco Advisory cisco-sa-apache-log4j-qRuKNEbd","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"NetApp Advisory ntap-20220104-0001","url":"https://security.netapp.com/advisory/ntap-20220104-0001"},{"title":"CVE-2021-44832","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44832"},{"title":"Siemens Advisory ssa-784507","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"}],"cwes":[20,74],"description":"Improper Input Validation and Injection in Apache Log4j2","detail":"# Improper Input Validation and Injection in Apache Log4j2 Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to an attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. # Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. This issue does not impact default configurations of Log4j2 and requires an attacker to have control over the Log4j2 configuration, which reduces the likelihood of being exploited.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-01-04T16:14:20","updated":"2024-02-20T05:37:46","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-44228","bom-ref":"CVE-2021-44228/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/>=2.4|<2.12.2","status":"affected"},{"version":"2.12.2","status":"unaffected"}]}],"recommendation":"Update to version 2.12.2 to resolve CVE-2021-44228 or update to version 2.12.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44228","name":"NVD"},"references":[{"id":"be-2022-0001","source":{"name":"Bentley Advisory","url":"https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001"}},{"id":"intel-sa-00646","source":{"name":"Intel Advisory","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"}},{"id":"nu11secur1ty-exploit-cve-2021-44228.html","source":{"name":"Nu11secur1ty Exploit","url":"https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html"}},{"id":"packetstormsecurity-exploit-UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html"}},{"id":"packetstormsecurity-exploit-VMware-Security-Advisory-2021-0028.4.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html"}},{"id":"LOG4J2-3214","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3214"}},{"id":"packetstormsecurity-exploit-MobileIron-Log4Shell-Remote-Command-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html"}},{"id":"openwall-oss-security-msg-2021-12-15-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/15/3"}},{"id":"openwall-oss-security-msg-2021-12-14-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/14/4"}},{"id":"openwall-oss-security-msg-2021-12-10-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/10/3"}},{"id":"SNWLID-2021-0032","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"}},{"id":"ssa-661247","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"}},{"id":"openwall-oss-security-msg-2021-12-13-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/13/1"}},{"id":"LOG4J2-3198","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3198"}},{"id":"930724","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/930724"}},{"id":"dsa-5020","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5020"}},{"id":"ntap-20211210-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20211210-0007"}},{"id":"LOG4J2-3201","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3201"}},{"id":"packetstormsecurity-exploit-Apache-Log4j2-2.14.1-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"}},{"id":"fedoraproject-msg-M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB"}},{"id":"fedoraproject-msg-VU57UJDCFIASIO35GC55JMKSRXJMCDFM","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM"}},{"id":"seclists-exploit-fulldisclosure/2022/Mar/23","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2022/Mar/23"}},{"id":"packetstormsecurity-exploit-Apache-Log4j2-2.14.1-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"}},{"id":"packetstormsecurity-exploit-Apache-Log4j2-2.14.1-Information-Disclosure.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html"}},{"id":"packetstormsecurity-exploit-log4j-scan-Extensive-Scanner.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html"}},{"id":"alert-cve-2021-44228","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"}},{"id":"fedoraproject-msg-M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB"}},{"id":"packetstormsecurity-exploit-VMware-Security-Advisory-2021-0028.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html"}},{"id":"openwall-oss-security-msg-2021-12-10-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/10/1"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"packetstormsecurity-exploit-Log4j-Payload-Generator.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html"}},{"id":"microsofts-response-to-cve-2021-44228-apache-log4j2","source":{"name":"Microsoft Advisory","url":"https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2"}},{"id":"1469345530182455296","source":{"name":"Twitter Advisory","url":"https://twitter.com/kurtseifried/status/1469345530182455296"}},{"id":"debian-msg-msg00007","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html"}},{"id":"LOG4J2-3221","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3221"}},{"id":"fedoraproject-msg-VU57UJDCFIASIO35GC55JMKSRXJMCDFM","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM"}},{"id":"packetstormsecurity-exploit-Log4j2-Log4Shell-Regexes.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html"}},{"id":"HT213189","source":{"name":"Apple Advisory","url":"https://support.apple.com/kb/HT213189"}},{"id":"packetstormsecurity-exploit-AD-Manager-Plus-7122-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html"}},{"id":"cisco-sa-apache-log4j-qRuKNEbd","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"}},{"id":"packetstormsecurity-exploit-Log4Shell-HTTP-Header-Injection.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html"}},{"id":"openwall-oss-security-msg-2021-12-10-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/10/2"}},{"id":"GHSA-7rjr-3q55-vv33","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-7rjr-3q55-vv33"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"packetstormsecurity-exploit-Log4j-Remote-Code-Execution-Word-Bypassing.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html"}},{"id":"seclists-exploit-fulldisclosure/2022/Dec/2","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2022/Dec/2"}},{"id":"ssa-397453","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"}},{"id":"ssa-714170","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"}},{"id":"packetstormsecurity-exploit-L4sh-Log4j-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html"}},{"id":"packetstormsecurity-exploit-VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html"}},{"id":"openwall-oss-security-msg-2021-12-13-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/13/2"}},{"id":"ssa-479842","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"}},{"id":"seclists-exploit-fulldisclosure/2022/Jul/11","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2022/Jul/11"}},{"id":"packetstormsecurity-exploit-Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html"}},{"id":"CVE-2021-44228","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44228","name":"NVD"}}],"advisories":[{"title":"Bentley Advisory be-2022-0001","url":"https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001"},{"title":"Intel Advisory intel-sa-00646","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"},{"title":"Apache Advisory LOG4J2-3214","url":"https://issues.apache.org/jira/browse/LOG4J2-3214"},{"title":"Sonicwall Advisory SNWLID-2021-0032","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"},{"title":"Siemens Advisory ssa-661247","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"},{"title":"Apache Advisory LOG4J2-3198","url":"https://issues.apache.org/jira/browse/LOG4J2-3198"},{"title":"Cert Advisory 930724","url":"https://www.kb.cert.org/vuls/id/930724"},{"title":"Debian Advisory dsa-5020","url":"https://www.debian.org/security/2021/dsa-5020"},{"title":"NetApp Advisory ntap-20211210-0007","url":"https://security.netapp.com/advisory/ntap-20211210-0007"},{"title":"Apache Advisory LOG4J2-3201","url":"https://issues.apache.org/jira/browse/LOG4J2-3201"},{"title":"Oracle Advisory alert-cve-2021-44228","url":"https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Microsoft Advisory microsofts-response-to-cve-2021-44228-apache-log4j2","url":"https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2"},{"title":"Twitter Advisory 1469345530182455296","url":"https://twitter.com/kurtseifried/status/1469345530182455296"},{"title":"Apache Advisory LOG4J2-3221","url":"https://issues.apache.org/jira/browse/LOG4J2-3221"},{"title":"Apple Advisory HT213189","url":"https://support.apple.com/kb/HT213189"},{"title":"Cisco Advisory cisco-sa-apache-log4j-qRuKNEbd","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"},{"title":"GitHub Advisory GHSA-7rjr-3q55-vv33","url":"https://github.com/advisories/GHSA-7rjr-3q55-vv33"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Siemens Advisory ssa-397453","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"},{"title":"Siemens Advisory ssa-714170","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"},{"title":"Siemens Advisory ssa-479842","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"},{"title":"CVE-2021-44228","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44228"}],"cwes":[20,400,502,917],"description":"Remote code injection in Log4j","detail":"# Remote code injection in Log4j # Summary Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default. Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory. # Impact Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. # Affected versions Any Log4J version prior to v2.15.0 is affected to this specific issue. The v1 branch of Log4J which is considered End Of Life (EOL) is vulnerable to other RCE vectors so the recommendation is to still update to 2.16.0 where possible. ## Security releases Additional backports of this fix have been made available in versions 2.3.1, 2.12.2, and 2.12.3 ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Remediation Advice ## Updated advice for version 2.16.0 The Apache Logging Services team provided updated mitigation advice upon the release of version 2.16.0, which [disables JNDI by default and completely removes support for message lookups](https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0). Even in version 2.15.0, lookups used in layouts to provide specific pieces of context information will still recursively resolve, possibly triggering JNDI lookups. This problem is being tracked as [CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046). More information is available on the [GitHub Security Advisory for CVE-2021-45046](https://github.com/advisories/GHSA-7rjr-3q55-vv33). Users who want to avoid attacker-controlled JNDI lookups but cannot upgrade to 2.16.0 must [ensure that no such lookups resolve to attacker-provided data and ensure that the the JndiLookup class is not loaded](https://issues.apache.org/jira/browse/LOG4J2-3221). Please note that Log4J v1 is End Of Life (EOL) and will not receive patches for this issue. Log4J v1 is also vulnerable to other RCE vectors and we recommend you migrate to Log4J 2.16.0 where possible.","ratings":[{"method":"CVSSv31","severity":"critical","score":10.0,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"published":"2021-12-10T00:40:56","updated":"2024-07-25T20:23:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Direct dependency\\nKnown Exploits"}]},{"id":"CVE-2021-45105","bom-ref":"CVE-2021-45105/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/>=2.4.0|<2.12.3","status":"affected"},{"version":"2.12.3","status":"unaffected"}]}],"recommendation":"Update to version 2.12.3 to resolve CVE-2021-45105 or update to version 2.12.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45105","name":"NVD"},"references":[{"id":"CVE-2021-45105","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45105","name":"NVD"}},{"id":"debian-msg-msg00017","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html"}},{"id":"cisco-sa-apache-log4j-qRuKNEbd","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"}},{"id":"dsa-5024","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5024"}},{"id":"930724","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/930724"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"openwall-oss-security-msg-2021-12-19-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/19/1"}},{"id":"fedoraproject-msg-EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"}},{"id":"zero-day-initiative-exploit-ZDI-21-1541","source":{"name":"Zero Day Initiative Exploit","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1541"}},{"id":"fedoraproject-msg-SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"}},{"id":"ssa-479842","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"}},{"id":"ntap-20211218-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20211218-0001"}},{"id":"ssa-501673","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf"}},{"id":"SNWLID-2021-0032","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"}}],"advisories":[{"title":"CVE-2021-45105","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45105"},{"title":"Cisco Advisory cisco-sa-apache-log4j-qRuKNEbd","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"},{"title":"Debian Advisory dsa-5024","url":"https://www.debian.org/security/2021/dsa-5024"},{"title":"Cert Advisory 930724","url":"https://www.kb.cert.org/vuls/id/930724"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Siemens Advisory ssa-479842","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"},{"title":"NetApp Advisory ntap-20211218-0001","url":"https://security.netapp.com/advisory/ntap-20211218-0001"},{"title":"Siemens Advisory ssa-501673","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf"},{"title":"Sonicwall Advisory SNWLID-2021-0032","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"}],"cwes":[20,674],"description":"Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion","detail":"# Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3. # Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.","ratings":[{"method":"CVSSv31","severity":"high","score":8.6,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"published":"2021-12-18T18:00:07","updated":"2024-02-16T08:01:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Direct dependency\\nKnown Exploits"}]},{"id":"CVE-2020-9488","bom-ref":"CVE-2020-9488/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/>=2.4.0|<2.12.3","status":"affected"},{"version":"2.12.3","status":"unaffected"}]}],"recommendation":"Update to version 2.12.3 to resolve CVE-2020-9488 or update to version 2.12.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9488","name":"NVD"},"references":[{"id":"apache-msg-r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E"}},{"id":"apache-msg-rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"CVE-2020-9488","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9488","name":"NVD"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E"}},{"id":"apache-msg-r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"dsa-5020","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5020"}},{"id":"apache-msg-rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"}},{"id":"apache-msg-r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E"}},{"id":"ntap-20200504-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200504-0003"}},{"id":"debian-msg-msg00017","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html"}},{"id":"apache-msg-ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E"}},{"id":"LOG4J2-2819","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-2819"}},{"id":"apache-msg-re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E"}},{"id":"apache-msg-r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E"}},{"id":"apache-msg-r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E"}},{"id":"apache-msg-r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"}},{"id":"apache-msg-r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E"}},{"id":"apache-msg-r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E"}},{"id":"apache-msg-r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E"}}],"advisories":[{"title":"CVE-2020-9488","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9488"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Debian Advisory dsa-5020","url":"https://www.debian.org/security/2021/dsa-5020"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"NetApp Advisory ntap-20200504-0003","url":"https://security.netapp.com/advisory/ntap-20200504-0003"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Apache Advisory LOG4J2-2819","url":"https://issues.apache.org/jira/browse/LOG4J2-2819"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"cwes":[295],"description":"Improper validation of certificate with host mismatch in Apache Log4j SMTP appender","detail":"# Improper validation of certificate with host mismatch in Apache Log4j SMTP appender Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.","ratings":[{"method":"CVSSv31","severity":"low","score":3.7,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2020-06-05T14:15:51","updated":"2024-03-13T05:32:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-3635","bom-ref":"CVE-2023-3635/pkg:maven/com.squareup.okio/okio@1.6.0?type=jar","affects":[{"ref":"pkg:maven/com.squareup.okio/okio@1.6.0?type=jar","versions":[{"range":"vers:maven/>=0.5.0|<=1.17.5|!=1.17.6","status":"affected"},{"version":"1.17.6","status":"unaffected"}]}],"recommendation":"Update to version 1.17.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3635","name":"NVD"},"references":[{"id":"CVE-2023-3635","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3635","name":"NVD"}},{"id":"okio-gzip-source-unhandled-exception-dos-xray-523195","source":{"name":"JFrog Advisory","url":"https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195"}}],"advisories":[{"title":"CVE-2023-3635","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3635"},{"title":"JFrog Advisory okio-gzip-source-unhandled-exception-dos-xray-523195","url":"https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195"}],"cwes":[195,681],"description":"Okio Signed to Unsigned Conversion Error vulnerability","detail":"# Okio Signed to Unsigned Conversion Error vulnerability GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This may lead to denial of service of the Okio client when handling a crafted GZIP archive, by using the GzipSource class.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-07-12T21:30:50","updated":"2024-02-16T08:13:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/com.squareup.okhttp/okhttp@2.5.0?type=jar\", \"pkg:maven/com.squareup.okio/okio@1.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2018-10899","bom-ref":"CVE-2018-10899/pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar","affects":[{"ref":"pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar","versions":[{"range":"vers:maven/>=1.2|<1.6.1","status":"affected"},{"version":"1.6.1","status":"unaffected"}]}],"recommendation":"Update to version 1.6.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10899","name":"NVD"},"references":[{"id":"apache-msg-r64701caec91c43efd7416d6bddef88447371101e00e8562741ede262","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r64701caec91c43efd7416d6bddef88447371101e00e8562741ede262@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-r46f6dbc029f49e1f638c6eb82accb94b7f990d818cb3b3bc0007dd0a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r46f6dbc029f49e1f638c6eb82accb94b7f990d818cb3b3bc0007dd0a@%3Cissues.activemq.apache.org%3E"}},{"id":"CVE-2018-10899","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10899","name":"NVD"}},{"id":"apache-msg-1392fbebb4fbbec379a40d16e1288fe1e4c0289d257e5206051a3793","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1392fbebb4fbbec379a40d16e1288fe1e4c0289d257e5206051a3793@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-rf33ffbba619a4281ce592a6ed259c07a557aefb4975619d83c4122ea","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf33ffbba619a4281ce592a6ed259c07a557aefb4975619d83c4122ea@%3Cissues.activemq.apache.org%3E"}},{"id":"redhat-bugzilla-CVE-2018-10899","source":{"name":"Red Hat Bugzilla","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10899"}},{"id":"apache-msg-r67cdc50af9caf89c9ebe1bde08393a343dcd89edba1c63677f68f43b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r67cdc50af9caf89c9ebe1bde08393a343dcd89edba1c63677f68f43b@%3Cissues.activemq.apache.org%3E"}},{"id":"RHSA-2019:2413","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2413"}},{"id":"RHSA-2019:2804","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2804"}},{"id":"apache-msg-rc169dac018d07e8ddf2a3bb2fd1efc6cbda4f83f1bbf7a8c798e7f4f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc169dac018d07e8ddf2a3bb2fd1efc6cbda4f83f1bbf7a8c798e7f4f@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-rdb0a59d7851e721b75beea13d6488e345a3e2735838e89d9269d7d32","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdb0a59d7851e721b75beea13d6488e345a3e2735838e89d9269d7d32@%3Cissues.activemq.apache.org%3E"}}],"advisories":[{"title":"CVE-2018-10899","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10899"},{"title":"Red Hat Advisory RHSA-2019:2413","url":"https://access.redhat.com/errata/RHSA-2019:2413"},{"title":"Red Hat Advisory RHSA-2019:2804","url":"https://access.redhat.com/errata/RHSA-2019:2804"}],"cwes":[352],"description":"Cross-Site Request Forgery in Jolokia","detail":"# Cross-Site Request Forgery in Jolokia A flaw was found in Jolokia versions from 1.2 to before 1.6.1. Affected versions are vulnerable to a system-wide CSRF. This holds true for properly configured instances with strict checking for origin and referrer headers. This could result in a Remote Code Execution attack.","ratings":[{"method":"CVSSv3","severity":"high","score":8.1,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-05-24T16:51:56","updated":"2023-11-08T03:59:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-34055","bom-ref":"CVE-2023-34055/pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0.0.RELEASE|<=2.7.9|!=2.7.18","status":"affected"},{"version":"2.7.18","status":"unaffected"}]}],"recommendation":"Update to version 2.7.18.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34055","name":"NVD"},"references":[{"id":"ntap-20231221-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231221-0010"}},{"id":"SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862"}},{"id":"CVE-2023-34055","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34055","name":"NVD"}},{"id":"cve-2023-34055","source":{"url":"https://spring.io/security/cve-2023-34055"}}],"advisories":[{"title":"NetApp Advisory ntap-20231221-0010","url":"https://security.netapp.com/advisory/ntap-20231221-0010"},{"title":"Snyk Advisory SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862"},{"title":"CVE-2023-34055","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34055"},{"title":"cve-2023-34055","url":"https://spring.io/security/cve-2023-34055"}],"cwes":[],"description":"Spring Boot Actuator denial of service vulnerability","detail":"# Spring Boot Actuator denial of service vulnerability In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3.1.5, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * `org.springframework.boot:spring-boot-actuator`\u00a0is on the classpath","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2023-11-28T09:30:27","updated":"2025-02-13T19:36:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-actuator@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2025-22228","bom-ref":"CVE-2025-22228/pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=3.1.0.RELEASE|<=5.7.9|!=5.7.16","status":"affected"},{"version":"5.7.16","status":"unaffected"}]}],"recommendation":"Update to version 5.7.16.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22228","name":"NVD"},"references":[{"id":"ntap-20250425-0009","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250425-0009"}},{"id":"CVE-2025-22228","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22228","name":"NVD"}},{"id":"cve-2025-22228","source":{"url":"https://spring.io/security/cve-2025-22228"}}],"advisories":[{"title":"NetApp Advisory ntap-20250425-0009","url":"https://security.netapp.com/advisory/ntap-20250425-0009"},{"title":"CVE-2025-22228","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22228"},{"title":"cve-2025-22228","url":"https://spring.io/security/cve-2025-22228"}],"cwes":[287,521],"description":"Spring Security Does Not Enforce Password Length","detail":"# Spring Security Does Not Enforce Password Length BCryptPasswordEncoder.matches(CharSequence,String)\u00a0will incorrectly return true\u00a0for passwords larger than 72 characters as long as the first 72 characters are the same.","ratings":[{"method":"CVSSv31","severity":"high","score":7.4,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"published":"2025-03-20T06:31:09","updated":"2025-04-26T01:25:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter@1.1.3.RELEASE?type=jar\", \"pkg:maven/org.springframework.cloud/spring-cloud-context@1.1.3.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Direct dependency\\nEndpoint-Reachable"}]},{"id":"CVE-2020-15522","bom-ref":"CVE-2020-15522/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.65.01|!=1.66","status":"affected"},{"version":"1.66","status":"unaffected"}]}],"recommendation":"Update to version 1.66 to resolve CVE-2020-15522 or update to version 1.78 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15522","name":"NVD"},"references":[{"id":"CVE-2020-15522","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15522","name":"NVD"}},{"id":"ntap-20210622-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210622-0007"}}],"advisories":[{"title":"CVE-2020-15522","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15522"},{"title":"NetApp Advisory ntap-20210622-0007","url":"https://security.netapp.com/advisory/ntap-20210622-0007"}],"cwes":[203,362],"description":"Timing based private key exposure in Bouncy Castle","detail":"# Timing based private key exposure in Bouncy Castle Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.2.1, BC before 1.66, BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.1,"vector":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2021-08-13T15:22:31","updated":"2024-02-17T05:52:01","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2020-26939","bom-ref":"CVE-2020-26939/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.60|!=1.61","status":"affected"},{"version":"1.61","status":"unaffected"}]}],"recommendation":"Update to version 1.61 to resolve CVE-2020-26939 or update to version 1.78 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26939","name":"NVD"},"references":[{"id":"CVE-2020-26939","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26939","name":"NVD"}},{"id":"ntap-20201202-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20201202-0005"}},{"id":"apache-msg-r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E"}},{"id":"debian-msg-msg00007","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00007.html"}}],"advisories":[{"title":"CVE-2020-26939","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26939"},{"title":"NetApp Advisory ntap-20201202-0005","url":"https://security.netapp.com/advisory/ntap-20201202-0005"}],"cwes":[203],"description":"Observable Differences in Behavior to Error Inputs in Bouncy Castle","detail":"# Observable Differences in Behavior to Error Inputs in Bouncy Castle In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2021-04-22T16:16:49","updated":"2024-03-14T22:16:19","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-29857","bom-ref":"CVE-2024-29857/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.70|!=1.78","status":"affected"},{"version":"1.78","status":"unaffected"}]}],"recommendation":"Update to version 1.78.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29857","name":"NVD"},"references":[{"id":"ntap-20241206-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241206-0008"}},{"id":"CVE-2024-29857","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29857","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20241206-0008","url":"https://security.netapp.com/advisory/ntap-20241206-0008"},{"title":"CVE-2024-29857","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29857"}],"cwes":[125,400],"description":"Bouncy Castle certificate parsing issues cause high CPU usage during parameter evaluation.","detail":"# Bouncy Castle certificate parsing issues cause high CPU usage during parameter evaluation. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters. ## Related CVE(s) CGA-h49m-7vwx-446f, CGA-pmw5-3929-3rqr, CGA-x9cj-c42r-f4mr, CVE-2024-29857","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2024-05-14T15:32:54","updated":"2024-12-06T15:48:32","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-30171","bom-ref":"CVE-2024-30171/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.70|!=1.78","status":"affected"},{"version":"1.78","status":"unaffected"}]}],"recommendation":"Update to version 1.78.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-30171","name":"NVD"},"references":[{"id":"CVE-2024-30171","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-30171","name":"NVD"}},{"id":"ntap-20240614-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240614-0008"}}],"advisories":[{"title":"CVE-2024-30171","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-30171"},{"title":"NetApp Advisory ntap-20240614-0008","url":"https://security.netapp.com/advisory/ntap-20240614-0008"}],"cwes":[203],"description":"Bouncy Castle affected by timing side-channel for RSA key exchange (\"The Marvin Attack\")","detail":"# Bouncy Castle affected by timing side-channel for RSA key exchange (\"The Marvin Attack\") An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing. ## Related CVE(s) CGA-2f4h-fc34-cw83, CGA-5mrq-75x2-g8hj, CGA-9qv8-44xh-vf2p, CVE-2024-30171","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-05-14T15:32:54","updated":"2024-10-22T05:28:59","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-33202","bom-ref":"CVE-2023-33202/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.70","status":"affected"},{"version":"1.73","status":"unaffected"}]}],"recommendation":"Update to version 1.73 to resolve CVE-2023-33202 or update to version 1.78 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33202","name":"NVD"},"references":[{"id":"ntap-20240125-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240125-0001"}},{"id":"CVE-2023-33202","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33202","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20240125-0001","url":"https://security.netapp.com/advisory/ntap-20240125-0001"},{"title":"CVE-2023-33202","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33202"}],"cwes":[400],"description":"Bouncy Castle Denial of Service (DoS)","detail":"# Bouncy Castle Denial of Service (DoS) Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack. ## Related CVE(s) CGA-q98p-rjg3-8jq7, CVE-2023-33202","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"published":"2023-11-23T18:30:33","updated":"2024-10-22T05:28:59","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-40149","bom-ref":"CVE-2022-40149/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.0|!=1.5.1","status":"affected"},{"version":"1.5.1","status":"unaffected"}]}],"recommendation":"Update to version 1.5.1 to resolve CVE-2022-40149 or update to version 1.5.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149","name":"NVD"},"references":[{"id":"debian-msg-msg00011","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html"}},{"id":"CVE-2022-40149","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149","name":"NVD"}},{"id":"dsa-5312","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5312"}}],"advisories":[{"title":"CVE-2022-40149","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149"},{"title":"Debian Advisory dsa-5312","url":"https://www.debian.org/security/2023/dsa-5312"}],"cwes":[121,787],"description":"Jettison parser crash by stackoverflow","detail":"# Jettison parser crash by stackoverflow Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-09-17T00:00:41","updated":"2023-11-08T04:10:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-45685","bom-ref":"CVE-2022-45685/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.1|!=1.5.2","status":"affected"},{"version":"1.5.2","status":"unaffected"}]}],"recommendation":"Update to version 1.5.2 to resolve CVE-2022-45685 or update to version 1.5.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45685","name":"NVD"},"references":[{"id":"dsa-5312","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5312"}},{"id":"debian-msg-msg00045","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"}},{"id":"CVE-2022-45685","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45685","name":"NVD"}}],"advisories":[{"title":"Debian Advisory dsa-5312","url":"https://www.debian.org/security/2023/dsa-5312"},{"title":"CVE-2022-45685","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45685"}],"cwes":[787],"description":"Jettison Out-of-bounds Write vulnerability","detail":"# Jettison Out-of-bounds Write vulnerability A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-12-13T15:30:26","updated":"2023-11-08T04:10:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-45693","bom-ref":"CVE-2022-45693/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.1|!=1.5.2","status":"affected"},{"version":"1.5.2","status":"unaffected"}]}],"recommendation":"Update to version 1.5.2 to resolve CVE-2022-45693 or update to version 1.5.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45693","name":"NVD"},"references":[{"id":"CVE-2022-45693","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45693","name":"NVD"}},{"id":"dsa-5312","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5312"}},{"id":"debian-msg-msg00045","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"}}],"advisories":[{"title":"CVE-2022-45693","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45693"},{"title":"Debian Advisory dsa-5312","url":"https://www.debian.org/security/2023/dsa-5312"}],"cwes":[787],"description":"Jettison Out-of-bounds Write vulnerability","detail":"# Jettison Out-of-bounds Write vulnerability Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-12-13T15:30:27","updated":"2023-11-08T04:10:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-1436","bom-ref":"CVE-2023-1436/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.3|!=1.5.4","status":"affected"},{"version":"1.5.4","status":"unaffected"}]}],"recommendation":"Update to version 1.5.4.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1436","name":"NVD"},"references":[{"id":"jettison-json-array-dos-xray-427911","source":{"name":"JFrog Advisory","url":"https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911"}},{"id":"CVE-2023-1436","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1436","name":"NVD"}}],"advisories":[{"title":"JFrog Advisory jettison-json-array-dos-xray-427911","url":"https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911"},{"title":"CVE-2023-1436","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1436"}],"cwes":[674],"description":"Jettison vulnerable to infinite recursion","detail":"# Jettison vulnerable to infinite recursion An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-22T06:30:21","updated":"2024-02-20T05:34:09","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-40150","bom-ref":"CVE-2022-40150/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.1|!=1.5.2","status":"affected"},{"version":"1.5.2","status":"unaffected"}]}],"recommendation":"Update to version 1.5.2 to resolve CVE-2022-40150 or update to version 1.5.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150","name":"NVD"},"references":[{"id":"dsa-5312","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5312"}},{"id":"CVE-2022-40150","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150","name":"NVD"}},{"id":"debian-msg-msg00045","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"}}],"advisories":[{"title":"Debian Advisory dsa-5312","url":"https://www.debian.org/security/2023/dsa-5312"},{"title":"CVE-2022-40150","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150"}],"cwes":[400,674],"description":"Jettison memory exhaustion","detail":"# Jettison memory exhaustion Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-09-17T00:00:41","updated":"2024-02-16T08:08:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-25647","bom-ref":"CVE-2022-25647/pkg:maven/com.google.code.gson/gson@2.8.0?type=jar","affects":[{"ref":"pkg:maven/com.google.code.gson/gson@2.8.0?type=jar","versions":[{"range":"vers:maven/>=1.1|<=2.8.8|!=2.8.9","status":"affected"},{"version":"2.8.9","status":"unaffected"}]}],"recommendation":"Update to version 2.8.9.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25647","name":"NVD"},"references":[{"id":"CVE-2022-25647","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25647","name":"NVD"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"ntap-20220901-0009","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220901-0009"}},{"id":"SNYK-JAVA-COMGOOGLECODEGSON-1730327","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327"}},{"id":"dsa-5227","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2022/dsa-5227"}},{"id":"debian-msg-msg00009","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00009.html"}},{"id":"debian-msg-msg00015","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00015.html"}}],"advisories":[{"title":"CVE-2022-25647","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25647"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"NetApp Advisory ntap-20220901-0009","url":"https://security.netapp.com/advisory/ntap-20220901-0009"},{"title":"Snyk Advisory SNYK-JAVA-COMGOOGLECODEGSON-1730327","url":"https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327"},{"title":"Debian Advisory dsa-5227","url":"https://www.debian.org/security/2022/dsa-5227"}],"cwes":[502],"description":"Deserialization of Untrusted Data in Gson","detail":"# Deserialization of Untrusted Data in Gson The package `com.google.code.gson:gson` before 2.8.9 is vulnerable to Deserialization of Untrusted Data via the `writeReplace()` method in internal classes, which may lead to denial of service attacks.","ratings":[{"method":"CVSSv31","severity":"high","score":7.7,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H"}],"published":"2022-05-03T00:00:44","updated":"2025-01-14T10:57:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.netflix-commons/netflix-eventbus@0.3.0?type=jar\", \"pkg:maven/com.netflix.netflix-commons/netflix-infix@0.3.0?type=jar\", \"pkg:maven/com.google.code.gson/gson@2.8.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-24823","bom-ref":"CVE-2022-24823/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.9.Final|!=4.1.77.Final","status":"affected"},{"version":"4.1.77.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.77.Final to resolve CVE-2022-24823 or update to version 4.1.108.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24823","name":"NVD"},"references":[{"id":"GHSA-5mcr-gq6c-3hq2","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"ntap-20220616-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220616-0004"}},{"id":"CVE-2022-24823","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24823","name":"NVD"}},{"id":"GHSA-269q-hmxg-m83q","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q"}}],"advisories":[{"title":"GitHub Advisory GHSA-5mcr-gq6c-3hq2","url":"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"NetApp Advisory ntap-20220616-0004","url":"https://security.netapp.com/advisory/ntap-20220616-0004"},{"title":"CVE-2022-24823","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24823"},{"title":"GitHub Advisory GHSA-269q-hmxg-m83q","url":"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q"}],"cwes":[378,379,668],"description":"Local Information Disclosure Vulnerability in io.netty:netty-codec-http","detail":"# Local Information Disclosure Vulnerability in io.netty:netty-codec-http ### Description ### [GHSA-5mcr-gq6c-3hq2](https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2) (CVE-2021-21290) contains an insufficient fix for the vulnerability identified. ### Impact ### When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. ### Vulnerability Details ### To fix the vulnerability the code was changed to the following: ```java @SuppressJava6Requirement(reason = \"Guarded by version check\") public static File createTempFile(String prefix, String suffix, File directory) throws IOException { if (javaVersion() >= 7) { if (directory == null) { return Files.createTempFile(prefix, suffix).toFile(); } return Files.createTempFile(directory.toPath(), prefix, suffix).toFile(); } if (directory == null) { return File.createTempFile(prefix, suffix); } File file = File.createTempFile(prefix, suffix, directory); // Try to adjust the perms, if this fails there is not much else we can do... file.setReadable(false, false); file.setReadable(true, true); return file; } ``` Unfortunately, this logic path was left vulnerable: ```java if (directory == null) { return File.createTempFile(prefix, suffix); } ``` This file is still readable by all local users. ### Patches ### Update to 4.1.77.Final ### Workarounds ### Specify your own `java.io.tmpdir` when you start the JVM or use `DefaultHttpDataFactory.setBaseDir(...)` to set the directory to something that is only readable by the current user or update to Java 7 or above. ### References ### - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### For more information ### If you have any questions or comments about this advisory: Open an issue in [netty](https://github.com/netty/netty)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2022-05-10T08:46:50","updated":"2025-01-14T10:57:26","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-29025","bom-ref":"CVE-2024-29025/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.99.Final|!=4.1.108.Final","status":"affected"},{"version":"4.1.108.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.108.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29025","name":"NVD"},"references":[{"id":"debian-msg-msg00015","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00015.html"}},{"id":"GHSA-5jpm-x58v-624v","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v"}},{"id":"CVE-2024-29025","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29025","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-5jpm-x58v-624v","url":"https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v"},{"title":"CVE-2024-29025","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29025"}],"cwes":[770],"description":"Netty's HttpPostRequestDecoder can OOM","detail":"# Netty's HttpPostRequestDecoder can OOM ### Summary The `HttpPostRequestDecoder` can be tricked to accumulate data. I have spotted currently two attack vectors ### Details 1. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpData` list. 2. The decoder cumulates bytes in the `undecodedChunk` buffer until it can decode a field, this field can cumulate data without limits ### PoC Here is a Netty branch that provides a fix + tests : https://github.com/vietj/netty/tree/post-request-decoder Here is a reproducer with Vert.x (which uses this decoder) https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3 ### Impact Any Netty based HTTP server that uses the `HttpPostRequestDecoder` to decode a form. ## Related CVE(s) CGA-4f97-xch2-fqp3, CGA-cvrj-h7rr-r975, CVE-2024-29025","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2024-03-25T19:40:50","updated":"2024-10-22T05:29:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-21290","bom-ref":"CVE-2021-21290/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0|<4.1.59.Final","status":"affected"},{"version":"4.1.59.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.59.Final to resolve CVE-2021-21290 or update to version 4.1.108.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21290","name":"NVD"},"references":[{"id":"GHSA-5mcr-gq6c-3hq2","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"ntap-20220210-0011","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0011"}},{"id":"apache-msg-r743149dcc8db1de473e6bff0b3ddf10140a7357bc2add75f7d1fbb12","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r743149dcc8db1de473e6bff0b3ddf10140a7357bc2add75f7d1fbb12@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E"}},{"id":"apache-msg-r0857b613604c696bf9743f0af047360baaded48b1c75cf6945a083c5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0857b613604c696bf9743f0af047360baaded48b1c75cf6945a083c5@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r5e4a540089760c8ecc2c411309d74264f1dad634ad93ad583ca16214","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e4a540089760c8ecc2c411309d74264f1dad634ad93ad583ca16214@%3Ccommits.kafka.apache.org%3E"}},{"id":"apache-msg-r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r5bf303d7c04da78f276765da08559fdc62420f1df539b277ca31f63b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5bf303d7c04da78f276765da08559fdc62420f1df539b277ca31f63b@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-rdba4f78ac55f803893a1a2265181595e79e3aa027e2e651dfba98c18","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdba4f78ac55f803893a1a2265181595e79e3aa027e2e651dfba98c18@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E"}},{"id":"CVE-2021-21290","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21290","name":"NVD"}},{"id":"apache-msg-ra503756ced78fdc2136bd33e87cb7553028645b261b1f5c6186a121e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra503756ced78fdc2136bd33e87cb7553028645b261b1f5c6186a121e@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E"}},{"id":"apache-msg-r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r71dbb66747ff537640bb91eb0b2b24edef21ac07728097016f58b01f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r71dbb66747ff537640bb91eb0b2b24edef21ac07728097016f58b01f@%3Ccommits.kafka.apache.org%3E"}},{"id":"apache-msg-rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E"}},{"id":"apache-msg-r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r10308b625e49d4e9491d7e079606ca0df2f0a4d828f1ad1da64ba47b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r10308b625e49d4e9491d7e079606ca0df2f0a4d828f1ad1da64ba47b@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r326ec431f06eab7cb7113a7a338e59731b8d556d05258457f12bac1b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r326ec431f06eab7cb7113a7a338e59731b8d556d05258457f12bac1b@%3Cdev.kafka.apache.org%3E"}},{"id":"apache-msg-r5c701840aa2845191721e39821445e1e8c59711e71942b7796a6ec29","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5c701840aa2845191721e39821445e1e8c59711e71942b7796a6ec29@%3Cusers.activemq.apache.org%3E"}},{"id":"apache-msg-r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"dsa-4885","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4885"}},{"id":"apache-msg-r2748097ea4b774292539cf3de6e3b267fc7a88d6c8ec40f4e2e87bd4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2748097ea4b774292539cf3de6e3b267fc7a88d6c8ec40f4e2e87bd4@%3Cdev.kafka.apache.org%3E"}},{"id":"apache-msg-rc488f80094872ad925f0c73d283d4c00d32def81977438e27a3dc2bb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc488f80094872ad925f0c73d283d4c00d32def81977438e27a3dc2bb@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"debian-msg-msg00016","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/02/msg00016.html"}},{"id":"apache-msg-rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E"}}],"advisories":[{"title":"GitHub Advisory GHSA-5mcr-gq6c-3hq2","url":"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"NetApp Advisory ntap-20220210-0011","url":"https://security.netapp.com/advisory/ntap-20220210-0011"},{"title":"CVE-2021-21290","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21290"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Debian Advisory dsa-4885","url":"https://www.debian.org/security/2021/dsa-4885"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}],"cwes":[378,379,668],"description":"","detail":"Refer to the supporting media","ratings":[{"method":"CVSSv31","severity":"medium","score":6.2,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2021-02-08T21:17:48","updated":"2025-01-14T10:57:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2019-20444","bom-ref":"CVE-2019-20444/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0|<4.1.44","status":"affected"},{"version":"4.1.44","status":"unaffected"}]}],"recommendation":"Update to version 4.1.44 to resolve CVE-2019-20444 or update to version 4.1.108.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20444","name":"NVD"},"references":[{"id":"RHSA-2020:0601","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0601"}},{"id":"apache-msg-ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0805","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0805"}},{"id":"apache-msg-rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E"}},{"id":"RHSA-2020:0811","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0811"}},{"id":"apache-msg-rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E"}},{"id":"fedoraproject-msg-TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46"}},{"id":"apache-msg-r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E"}},{"id":"debian-msg-msg00003","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html"}},{"id":"apache-msg-r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E"}},{"id":"debian-msg-msg00017","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"RHSA-2020:0806","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0806"}},{"id":"apache-msg-r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0804","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0804"}},{"id":"RHSA-2020:0567","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0567"}},{"id":"apache-msg-raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E"}},{"id":"apache-msg-r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E"}},{"id":"apache-msg-r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E"}},{"id":"apache-msg-r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"RHSA-2020:0605","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0605"}},{"id":"apache-msg-rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"dsa-4885","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4885"}},{"id":"CVE-2019-20444","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20444","name":"NVD"}},{"id":"apache-msg-r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E"}},{"id":"apache-msg-r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"RHSA-2020:0606","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0606"}},{"id":"apache-msg-rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E"}},{"id":"apache-msg-r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0497","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0497"}},{"id":"debian-msg-msg00004","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html"}},{"id":"apache-msg-re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html"}},{"id":"apache-msg-re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2020:0601","url":"https://access.redhat.com/errata/RHSA-2020:0601"},{"title":"Red Hat Advisory RHSA-2020:0805","url":"https://access.redhat.com/errata/RHSA-2020:0805"},{"title":"Red Hat Advisory RHSA-2020:0811","url":"https://access.redhat.com/errata/RHSA-2020:0811"},{"title":"Red Hat Advisory RHSA-2020:0806","url":"https://access.redhat.com/errata/RHSA-2020:0806"},{"title":"Red Hat Advisory RHSA-2020:0804","url":"https://access.redhat.com/errata/RHSA-2020:0804"},{"title":"Red Hat Advisory RHSA-2020:0567","url":"https://access.redhat.com/errata/RHSA-2020:0567"},{"title":"Red Hat Advisory RHSA-2020:0605","url":"https://access.redhat.com/errata/RHSA-2020:0605"},{"title":"Debian Advisory dsa-4885","url":"https://www.debian.org/security/2021/dsa-4885"},{"title":"CVE-2019-20444","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20444"},{"title":"Red Hat Advisory RHSA-2020:0606","url":"https://access.redhat.com/errata/RHSA-2020:0606"},{"title":"Red Hat Advisory RHSA-2020:0497","url":"https://access.redhat.com/errata/RHSA-2020:0497"}],"cwes":[444],"description":"HTTP Request Smuggling in Netty","detail":"# HTTP Request Smuggling in Netty HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an \"invalid fold.\"","ratings":[{"method":"CVSSv31","severity":"critical","score":9.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"published":"2020-02-21T18:55:24","updated":"2024-03-11T05:19:31","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-43797","bom-ref":"CVE-2021-43797/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0|<4.1.71.Final","status":"affected"},{"version":"4.1.71.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.71.Final to resolve CVE-2021-43797 or update to version 4.1.108.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43797","name":"NVD"},"references":[{"id":"GHSA-wx5j-54mm-rqqq","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"dsa-5316","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5316"}},{"id":"ntap-20220107-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220107-0003"}},{"id":"CVE-2021-43797","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43797","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-wx5j-54mm-rqqq","url":"https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Debian Advisory dsa-5316","url":"https://www.debian.org/security/2023/dsa-5316"},{"title":"NetApp Advisory ntap-20220107-0003","url":"https://security.netapp.com/advisory/ntap-20220107-0003"},{"title":"CVE-2021-43797","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43797"}],"cwes":[444],"description":"HTTP request smuggling in netty","detail":"# HTTP request smuggling in netty ### Impact Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"published":"2021-12-09T19:09:17","updated":"2024-02-22T05:37:31","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-37137","bom-ref":"CVE-2021-37137/pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0|<4.1.68.Final","status":"affected"},{"version":"4.1.68.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.68.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37137","name":"NVD"},"references":[{"id":"GHSA-9vjp-v76f-g363","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363"}},{"id":"apache-msg-rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E"}},{"id":"CVE-2021-37137","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37137","name":"NVD"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"dsa-5316","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5316"}},{"id":"apache-msg-r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E"}},{"id":"ntap-20220210-0012","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0012"}},{"id":"apache-msg-r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"}},{"id":"apache-msg-r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}}],"advisories":[{"title":"GitHub Advisory GHSA-9vjp-v76f-g363","url":"https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363"},{"title":"CVE-2021-37137","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37137"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Debian Advisory dsa-5316","url":"https://www.debian.org/security/2023/dsa-5316"},{"title":"NetApp Advisory ntap-20220210-0012","url":"https://security.netapp.com/advisory/ntap-20220210-0012"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}],"cwes":[400],"description":"\\tSnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way","detail":"# SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way ### Impact The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk. ### Impact All users of SnappyFrameDecoder are affected and so the application may be in risk for a DoS attach due excessive memory usage. ### References https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-09-09T17:11:31","updated":"2024-03-11T05:32:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-37136","bom-ref":"CVE-2021-37136/pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.9.Final|!=4.1.68.Final","status":"affected"},{"version":"4.1.68.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.68.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37136","name":"NVD"},"references":[{"id":"CVE-2021-37136","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37136","name":"NVD"}},{"id":"apache-msg-rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"dsa-5316","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5316"}},{"id":"apache-msg-r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E"}},{"id":"ntap-20220210-0012","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0012"}},{"id":"apache-msg-r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"}},{"id":"apache-msg-r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E"}},{"id":"GHSA-grg4-wf29-r9vv","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}}],"advisories":[{"title":"CVE-2021-37136","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37136"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Debian Advisory dsa-5316","url":"https://www.debian.org/security/2023/dsa-5316"},{"title":"NetApp Advisory ntap-20220210-0012","url":"https://security.netapp.com/advisory/ntap-20220210-0012"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"GitHub Advisory GHSA-grg4-wf29-r9vv","url":"https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}],"cwes":[400],"description":"Bzip2Decoder doesn't allow setting size restrictions for decompressed data","detail":"# Bzip2Decoder doesn't allow setting size restrictions for decompressed data ### Impact The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack ### Workarounds No workarounds other than not using the `Bzip2Decoder` ### References Relevant code areas: https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-09-09T17:11:21","updated":"2024-03-11T05:19:43","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-34462","bom-ref":"CVE-2023-34462/pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.93.Final|!=4.1.94.Final","status":"affected"},{"version":"4.1.94.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.94.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34462","name":"NVD"},"references":[{"id":"GHSA-6mjq-h674-j845","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845"}},{"id":"ntap-20230803-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230803-0001"}},{"id":"ntap-20240621-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0007"}},{"id":"dsa-5558","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5558"}},{"id":"CVE-2023-34462","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34462","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-6mjq-h674-j845","url":"https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845"},{"title":"NetApp Advisory ntap-20230803-0001","url":"https://security.netapp.com/advisory/ntap-20230803-0001"},{"title":"NetApp Advisory ntap-20240621-0007","url":"https://security.netapp.com/advisory/ntap-20240621-0007"},{"title":"Debian Advisory dsa-5558","url":"https://www.debian.org/security/2023/dsa-5558"},{"title":"CVE-2023-34462","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34462"}],"cwes":[400,770],"description":"netty-handler SniHandler 16MB allocation","detail":"# netty-handler SniHandler 16MB allocation ### Summary The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. ### Details The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler` 1/ allocate a 16MB `ByteBuf` 2/ not fail `decode` method `in` buffer 3/ get out of the loop without an exception The combination of this without the use of a timeout makes easy to connect to a TCP server and allocate 16MB of heap memory per connection. ### Impact If the user has no idle timeout handler configured it might be possible for a remote peer to send a client hello packet which lead the server to buffer up to 16MB of data per connection. This could lead to a OutOfMemoryError and so result in a DDOS. ## Related CVE(s) CGA-4p9j-8g99-x3wm, CVE-2023-34462","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-06-20T16:33:22","updated":"2024-10-22T05:29:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2019-20445","bom-ref":"CVE-2019-20445/pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0|<4.1.45","status":"affected"},{"version":"4.1.45","status":"unaffected"}]}],"recommendation":"Update to version 4.1.45 to resolve CVE-2019-20445 or update to version 4.1.94.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20445","name":"NVD"},"references":[{"id":"RHSA-2020:0601","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0601"}},{"id":"apache-msg-ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74@%3Cissues.flume.apache.org%3E"}},{"id":"CVE-2019-20445","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20445","name":"NVD"}},{"id":"RHSA-2020:0805","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0805"}},{"id":"apache-msg-rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E"}},{"id":"RHSA-2020:0811","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0811"}},{"id":"apache-msg-rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E"}},{"id":"fedoraproject-msg-TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46"}},{"id":"apache-msg-r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E"}},{"id":"debian-msg-msg00003","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html"}},{"id":"debian-msg-msg00017","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E"}},{"id":"RHSA-2020:0806","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0806"}},{"id":"apache-msg-r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663@%3Cissues.flume.apache.org%3E"}},{"id":"apache-msg-r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0567","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0567"}},{"id":"RHSA-2020:0804","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0804"}},{"id":"apache-msg-raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E"}},{"id":"apache-msg-r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0605","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0605"}},{"id":"apache-msg-r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"apache-msg-rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2@%3Cissues.flume.apache.org%3E"}},{"id":"apache-msg-rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11@%3Cissues.spark.apache.org%3E"}},{"id":"apache-msg-r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E"}},{"id":"dsa-4885","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4885"}},{"id":"apache-msg-rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E"}},{"id":"RHSA-2020:0606","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0606"}},{"id":"apache-msg-r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E"}},{"id":"RHSA-2020:0497","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0497"}},{"id":"debian-msg-msg00004","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html"}},{"id":"apache-msg-re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html"}},{"id":"apache-msg-r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2020:0601","url":"https://access.redhat.com/errata/RHSA-2020:0601"},{"title":"CVE-2019-20445","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20445"},{"title":"Red Hat Advisory RHSA-2020:0805","url":"https://access.redhat.com/errata/RHSA-2020:0805"},{"title":"Red Hat Advisory RHSA-2020:0811","url":"https://access.redhat.com/errata/RHSA-2020:0811"},{"title":"Red Hat Advisory RHSA-2020:0806","url":"https://access.redhat.com/errata/RHSA-2020:0806"},{"title":"Red Hat Advisory RHSA-2020:0567","url":"https://access.redhat.com/errata/RHSA-2020:0567"},{"title":"Red Hat Advisory RHSA-2020:0804","url":"https://access.redhat.com/errata/RHSA-2020:0804"},{"title":"Red Hat Advisory RHSA-2020:0605","url":"https://access.redhat.com/errata/RHSA-2020:0605"},{"title":"Debian Advisory dsa-4885","url":"https://www.debian.org/security/2021/dsa-4885"},{"title":"Red Hat Advisory RHSA-2020:0606","url":"https://access.redhat.com/errata/RHSA-2020:0606"},{"title":"Red Hat Advisory RHSA-2020:0497","url":"https://access.redhat.com/errata/RHSA-2020:0497"}],"cwes":[444],"description":"HTTP Request Smuggling in Netty","detail":"# HTTP Request Smuggling in Netty HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"2020-02-21T18:55:04","updated":"2024-12-08T05:34:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2025-25193","bom-ref":"CVE-2025-25193/pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.99.Final|!=4.1.118.Final","status":"affected"},{"version":"4.1.118.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.118.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-25193","name":"NVD"},"references":[{"id":"ntap-20250221-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250221-0006"}},{"id":"GHSA-389x-839f-4rhx","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx"}},{"id":"CVE-2025-25193","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-25193","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20250221-0006","url":"https://security.netapp.com/advisory/ntap-20250221-0006"},{"title":"GitHub Advisory GHSA-389x-839f-4rhx","url":"https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx"},{"title":"CVE-2025-25193","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-25193"}],"cwes":[400],"description":"Denial of Service attack on windows app using Netty","detail":"# Denial of Service attack on windows app using Netty ### Summary An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attemps to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. ### Details A similar issue was previously reported in https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. ### PoC The PoC is the same as for https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv with the detail that the file should only contain null-bytes; 0x00. When the null-bytes are encountered by the `InputStreamReader`, it will issue replacement characters in its charset decoding, which will fill up the line-buffer in the `BufferedReader.readLine()`, because the replacement character is not a line-break character. ### Impact Impact is the same as https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-02-10T18:14:47","updated":"2025-03-19T15:06:40","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-transport-native-epoll@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-47535","bom-ref":"CVE-2024-47535/pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.99.Final|!=4.1.115.Final","status":"affected"},{"version":"4.1.115.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.115.Final to resolve CVE-2024-47535 or update to version 4.1.118.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47535","name":"NVD"},"references":[{"id":"GHSA-xq3w-v528-46rv","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv"}},{"id":"CVE-2024-47535","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47535","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-xq3w-v528-46rv","url":"https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv"},{"title":"CVE-2024-47535","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47535"}],"cwes":[400],"description":"","detail":"Refer to the supporting media","ratings":[{"method":"CVSSv4","severity":"medium","score":5.4,"vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"}],"published":"2024-11-12T19:53:17","updated":"2025-02-18T16:16:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-transport-native-epoll@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-38821","bom-ref":"CVE-2024-38821/pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","versions":[{"range":"vers:maven/>=3.0.0.RELEASE|<=5.7.9|!=5.7.13","status":"affected"},{"version":"5.7.13","status":"unaffected"}]}],"recommendation":"Update to version 5.7.13.","source":{"url":"https://spring.io/security/cve-2024-38821"},"references":[{"id":"ntap-20250124-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250124-0006"}},{"id":"cve-2024-38821","source":{"url":"https://spring.io/security/cve-2024-38821"}},{"id":"CVE-2024-38821","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38821","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20250124-0006","url":"https://security.netapp.com/advisory/ntap-20250124-0006"},{"title":"cve-2024-38821","url":"https://spring.io/security/cve-2024-38821"},{"title":"CVE-2024-38821","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38821"}],"cwes":[285,770],"description":"Spring Security vulnerable to Authorization Bypass of Static Resources in WebFlux Applications","detail":"# Spring Security vulnerable to Authorization Bypass of Static Resources in WebFlux Applications Spring WebFlux applications that have Spring Security authorization rules on static resources can be bypassed under certain circumstances. For this to impact an application, all of the following must be true: * It must be a WebFlux application * It must be using Spring's static resources support * It must have a non-permitAll authorization rule applied to the static resources support","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"}],"published":"2024-10-28T09:30:53","updated":"2025-01-24T22:05:51","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2021-22112","bom-ref":"CVE-2021-22112/pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","versions":[{"range":"vers:maven/>=3.0.0.RELEASE|<=5.2.8.RELEASE|!=5.2.9","status":"affected"},{"version":"5.2.9","status":"unaffected"}]}],"recommendation":"Update to version 5.2.9 to resolve CVE-2021-22112 or update to version 5.7.13 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22112","name":"NVD"},"references":[{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E"}},{"id":"openwall-oss-security-msg-2021-02-19-7","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/02/19/7"}},{"id":"CVE-2021-22112","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22112","name":"NVD"}},{"id":"apache-msg-r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804@%3Cpluto-scm.portals.apache.org%3E"}},{"id":"cve-2021-22112","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2021-22112"}},{"id":"apache-msg-r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1@%3Cpluto-dev.portals.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"CVE-2021-22112","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22112"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Vmware Advisory cve-2021-22112","url":"https://tanzu.vmware.com/security/cve-2021-22112"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}],"cwes":[269],"description":"Privilege escalation in spring security","detail":"# Privilege escalation in spring security Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to run with elevated privileges in a small portion of the application, the bug can be leveraged to extend those privileges to the rest of the application.","ratings":[{"method":"CVSSv31","severity":"high","score":8.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-05-10T15:22:39","updated":"2024-03-15T05:19:47","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2022-22978","bom-ref":"CVE-2022-22978/pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","versions":[{"range":"vers:maven/>=3.0.0.RELEASE|<=5.4.9|!=5.4.11","status":"affected"},{"version":"5.4.11","status":"unaffected"}]}],"recommendation":"Update to version 5.4.11 to resolve CVE-2022-22978 or update to version 5.7.13 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22978","name":"NVD"},"references":[{"id":"CVE-2022-22978","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22978","name":"NVD"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"ntap-20220707-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220707-0003"}},{"id":"cve-2022-22978","source":{"url":"https://spring.io/security/cve-2022-22978"}},{"id":"cve-2022-22978","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22978"}}],"advisories":[{"title":"CVE-2022-22978","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22978"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"NetApp Advisory ntap-20220707-0003","url":"https://security.netapp.com/advisory/ntap-20220707-0003"},{"title":"cve-2022-22978","url":"https://spring.io/security/cve-2022-22978"},{"title":"Vmware Advisory cve-2022-22978","url":"https://tanzu.vmware.com/security/cve-2022-22978"}],"cwes":[285,863],"description":"Authorization bypass in Spring Security","detail":"# Authorization bypass in Spring Security In Spring Security versions 5.5.6 and 5.5.7 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-05-20T00:00:39","updated":"2024-10-04T20:33:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2020-5408","bom-ref":"CVE-2020-5408/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=2.0.0|<=4.2.9.RELEASE|!=4.2.16","status":"affected"},{"version":"4.2.16","status":"unaffected"}]}],"recommendation":"Update to version 4.2.16 to resolve CVE-2020-5408 or update to version 5.7.14 to resolve additional vulnerabilities for this package.","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2020-5408"},"references":[{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"cve-2020-5408","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2020-5408"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"CVE-2020-5408","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5408","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Vmware Advisory cve-2020-5408","url":"https://tanzu.vmware.com/security/cve-2020-5408"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"CVE-2020-5408","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5408"}],"cwes":[329,330],"description":"Insufficient Entropy in Spring Security","detail":"# Insufficient Entropy in Spring Security Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2020-06-15T19:34:31","updated":"2023-11-08T04:03:55","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2024-22257","bom-ref":"CVE-2024-22257/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=2.0.0|<=5.7.9|!=5.7.12","status":"affected"},{"version":"5.7.12","status":"unaffected"}]}],"recommendation":"Update to version 5.7.12 to resolve CVE-2024-22257 or update to version 5.7.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22257","name":"NVD"},"references":[{"id":"CVE-2024-22257","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22257","name":"NVD"}},{"id":"cve-2024-22257","source":{"url":"https://spring.io/security/cve-2024-22257"}},{"id":"ntap-20240419-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240419-0005"}}],"advisories":[{"title":"CVE-2024-22257","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22257"},{"title":"cve-2024-22257","url":"https://spring.io/security/cve-2024-22257"},{"title":"NetApp Advisory ntap-20240419-0005","url":"https://security.netapp.com/advisory/ntap-20240419-0005"}],"cwes":[287,862],"description":"Erroneous authentication pass in Spring Security","detail":"# Erroneous authentication pass in Spring Security In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to 5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, versions 6.2.x prior to 6.2.3, an application is possible vulnerable to broken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter. Specifically, an application is vulnerable if: The application uses AuthenticatedVoter directly and a null authentication parameter is passed to it resulting in an erroneous true return value. An application is not vulnerable if any of the following is true: * The application does not use AuthenticatedVoter#vote directly. * The application does not pass null to AuthenticatedVoter#vote. Note that AuthenticatedVoter is deprecated since 5.8, use implementations of AuthorizationManager as a replacement.","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N"}],"published":"2024-03-18T15:30:51","updated":"2025-02-13T19:11:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2022-22978","bom-ref":"CVE-2022-22978/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=2.0.0|<=5.4.9|!=5.4.11","status":"affected"},{"version":"5.4.11","status":"unaffected"}]}],"recommendation":"Update to version 5.4.11 to resolve CVE-2022-22978 or update to version 5.7.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22978","name":"NVD"},"references":[{"id":"CVE-2022-22978","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22978","name":"NVD"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"ntap-20220707-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220707-0003"}},{"id":"cve-2022-22978","source":{"url":"https://spring.io/security/cve-2022-22978"}},{"id":"cve-2022-22978","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22978"}}],"advisories":[{"title":"CVE-2022-22978","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22978"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"NetApp Advisory ntap-20220707-0003","url":"https://security.netapp.com/advisory/ntap-20220707-0003"},{"title":"cve-2022-22978","url":"https://spring.io/security/cve-2022-22978"},{"title":"Vmware Advisory cve-2022-22978","url":"https://tanzu.vmware.com/security/cve-2022-22978"}],"cwes":[285,863],"description":"Authorization bypass in Spring Security","detail":"# Authorization bypass in Spring Security In Spring Security versions 5.5.6 and 5.5.7 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-05-20T00:00:39","updated":"2024-10-04T20:33:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2024-38827","bom-ref":"CVE-2024-38827/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=2.0.0|<=5.7.9|!=5.7.14","status":"affected"},{"version":"5.7.14","status":"unaffected"}]}],"recommendation":"Update to version 5.7.14.","source":{"url":"https://spring.io/security/cve-2024-38827"},"references":[{"id":"ntap-20250124-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250124-0007"}},{"id":"cve-2024-38827","source":{"url":"https://spring.io/security/cve-2024-38827"}},{"id":"CVE-2024-38827","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38827","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20250124-0007","url":"https://security.netapp.com/advisory/ntap-20250124-0007"},{"title":"cve-2024-38827","url":"https://spring.io/security/cve-2024-38827"},{"title":"CVE-2024-38827","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38827"}],"cwes":[639],"description":"Spring Framework has Authorization Bypass for Case Sensitive Comparisons","detail":"# Spring Framework has Authorization Bypass for Case Sensitive Comparisons The usage of String.toLowerCase()\u00a0and String.toUpperCase()\u00a0has some Locale\u00a0dependent exceptions that could potentially result in authorization rules not working properly.","ratings":[{"method":"CVSSv4","severity":"medium","score":6.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"}],"published":"2024-12-02T15:31:41","updated":"2025-01-24T22:03:01","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2019-3795","bom-ref":"CVE-2019-3795/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=4.2.0|<4.2.12","status":"affected"},{"version":"4.2.12","status":"unaffected"}]}],"recommendation":"Update to version 4.2.12 to resolve CVE-2019-3795 or update to version 5.7.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2019-3795"},"references":[{"id":"GHSA-v2r2-7qm7-jj6v","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-v2r2-7qm7-jj6v"}},{"id":"securityfocus-msg-107802","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/107802"}},{"id":"cve-2019-3795","source":{"url":"https://pivotal.io/security/cve-2019-3795"}},{"id":"debian-msg-msg00026","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00026.html"}},{"id":"CVE-2019-3795","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3795","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-v2r2-7qm7-jj6v","url":"https://github.com/advisories/GHSA-v2r2-7qm7-jj6v"},{"title":"cve-2019-3795","url":"https://pivotal.io/security/cve-2019-3795"},{"title":"CVE-2019-3795","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3795"}],"cwes":[330],"description":"Spring Security uses insufficiently random values","detail":"# Spring Security uses insufficiently random values Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an honest application must provide a seed and make the resulting random material available to an attacker for inspection.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2019-04-16T15:10:59","updated":"2023-11-08T04:01:34","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2019-11272","bom-ref":"CVE-2019-11272/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=2.0.0|<=4.2.9.RELEASE|!=4.2.13","status":"affected"},{"version":"4.2.13","status":"unaffected"}]}],"recommendation":"Update to version 4.2.13 to resolve CVE-2019-11272 or update to version 5.7.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2019-11272"},"references":[{"id":"cve-2019-11272","source":{"url":"https://pivotal.io/security/cve-2019-11272"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html"}},{"id":"CVE-2019-11272","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11272","name":"NVD"}}],"advisories":[{"title":"cve-2019-11272","url":"https://pivotal.io/security/cve-2019-11272"},{"title":"CVE-2019-11272","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11272"}],"cwes":[287,522],"description":"Insufficiently Protected Credentials and Improper Authentication in Spring Security","detail":"# Insufficiently Protected Credentials and Improper Authentication in Spring Security Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of ?null?.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2019-06-27T17:24:58","updated":"2023-11-08T04:01:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2018-1199","bom-ref":"CVE-2018-1199/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=4.2.0|<4.2.4","status":"affected"},{"version":"4.2.4","status":"unaffected"}]}],"recommendation":"Update to version 4.2.4 to resolve CVE-2018-1199 or update to version 5.7.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-1199"},"references":[{"id":"RHSA-2018:2405","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2405"}},{"id":"apache-msg-dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E"}},{"id":"cve-2018-1199","source":{"url":"https://pivotal.io/security/cve-2018-1199"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"GHSA-v596-fwhq-8x48","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-v596-fwhq-8x48"}},{"id":"CVE-2018-1199","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199","name":"NVD"}},{"id":"apache-msg-ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:2405","url":"https://access.redhat.com/errata/RHSA-2018:2405"},{"title":"cve-2018-1199","url":"https://pivotal.io/security/cve-2018-1199"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"GitHub Advisory GHSA-v596-fwhq-8x48","url":"https://github.com/advisories/GHSA-v596-fwhq-8x48"},{"title":"CVE-2018-1199","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199"}],"cwes":[20],"description":"Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core","detail":"# Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2018-10-17T20:01:54","updated":"2024-03-15T16:11:19","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2022-22970","bom-ref":"CVE-2022-22970/pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.2.9.RELEASE|!=5.2.22.RELEASE","status":"affected"},{"version":"5.2.22.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 5.2.22.RELEASE.","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22970"},"references":[{"id":"ntap-20220616-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220616-0006"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"cve-2022-22970","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22970"}},{"id":"CVE-2022-22970","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22970","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20220616-0006","url":"https://security.netapp.com/advisory/ntap-20220616-0006"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Vmware Advisory cve-2022-22970","url":"https://tanzu.vmware.com/security/cve-2022-22970"},{"title":"CVE-2022-22970","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22970"}],"cwes":[770],"description":"Denial of service in Spring Framework","detail":"# Denial of service in Spring Framework In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-05-13T00:00:28","updated":"2024-03-14T21:14:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2024-38820","bom-ref":"CVE-2024-38820/pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=6.1.9|!=6.1.14","status":"affected"},{"version":"6.1.14","status":"unaffected"}]}],"recommendation":"Update to version 6.1.14.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38820","name":"NVD"},"references":[{"id":"CVE-2024-38820","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38820","name":"NVD"}},{"id":"ntap-20241129-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241129-0003"}},{"id":"cve-2024-38820","source":{"url":"https://spring.io/security/cve-2024-38820"}}],"advisories":[{"title":"CVE-2024-38820","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38820"},{"title":"NetApp Advisory ntap-20241129-0003","url":"https://security.netapp.com/advisory/ntap-20241129-0003"},{"title":"cve-2024-38820","url":"https://spring.io/security/cve-2024-38820"}],"cwes":[178],"description":"Spring Framework DataBinder Case Sensitive Match Exception","detail":"# Spring Framework DataBinder Case Sensitive Match Exception The fix for CVE-2022-22968 made disallowedFields\u00a0patterns in DataBinder\u00a0case insensitive. However, String.toLowerCase()\u00a0has some Locale dependent exceptions that could potentially result in fields not protected as expected.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"published":"2024-10-18T06:30:32","updated":"2024-11-29T12:46:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 30 locations"}]},{"id":"CVE-2022-22968","bom-ref":"CVE-2022-22968/pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.2.9.RELEASE|!=5.2.21.RELEASE","status":"affected"},{"version":"5.2.21.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 5.2.21.RELEASE to resolve CVE-2022-22968 or update to version 6.1.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22968","name":"NVD"},"references":[{"id":"CVE-2022-22968","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22968","name":"NVD"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"ntap-20220602-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220602-0004"}},{"id":"cve-2022-22968","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22968"}}],"advisories":[{"title":"CVE-2022-22968","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22968"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"NetApp Advisory ntap-20220602-0004","url":"https://security.netapp.com/advisory/ntap-20220602-0004"},{"title":"Vmware Advisory cve-2022-22968","url":"https://tanzu.vmware.com/security/cve-2022-22968"}],"cwes":[178],"description":"Improper handling of case sensitivity in Spring Framework","detail":"# Improper handling of case sensitivity in Spring Framework In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. Versions 5.3.19 and 5.2.21 contain a patch for this issue.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2022-04-15T00:00:32","updated":"2024-05-15T06:31:39","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 30 locations"}]},{"id":"CVE-2018-1272","bom-ref":"CVE-2018-1272/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=4.3.9.RELEASE|!=4.3.15","status":"affected"},{"version":"4.3.15","status":"unaffected"}]}],"recommendation":"Update to version 4.3.15 to resolve CVE-2018-1272 or update to version 4.3.20.RELEASE to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1272","name":"NVD"},"references":[{"id":"CVE-2018-1272","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1272","name":"NVD"}},{"id":"securityfocus-msg-103697","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/103697"}},{"id":"RHSA-2018:2669","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2669"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cve-2018-1272","source":{"url":"https://pivotal.io/security/cve-2018-1272"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"cpujul2018-4258247","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"RHSA-2018:1320","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1320"}},{"id":"GHSA-4487-x383-qpph","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-4487-x383-qpph"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"CVE-2018-1272","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1272"},{"title":"Red Hat Advisory RHSA-2018:2669","url":"https://access.redhat.com/errata/RHSA-2018:2669"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"cve-2018-1272","url":"https://pivotal.io/security/cve-2018-1272"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Oracle Advisory cpujul2018-4258247","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Red Hat Advisory RHSA-2018:1320","url":"https://access.redhat.com/errata/RHSA-2018:1320"},{"title":"GitHub Advisory GHSA-4487-x383-qpph","url":"https://github.com/advisories/GHSA-4487-x383-qpph"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[],"description":"Possible privilege escalation in org.springframework:spring-core","detail":"# Possible privilege escalation in org.springframework:spring-core Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2018-10-17T20:27:47","updated":"2024-12-05T05:30:27","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-11040","bom-ref":"CVE-2018-11040/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=4.3.0.RELEASE|<4.3.18.RELEASE","status":"affected"},{"version":"4.3.18.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 4.3.18.RELEASE to resolve CVE-2018-11040 or update to version 4.3.20.RELEASE to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-11040"},"references":[{"id":"debian-msg-msg00022","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"cve-2018-11040","source":{"url":"https://pivotal.io/security/cve-2018-11040"}},{"id":"CVE-2018-11040","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11040","name":"NVD"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"GHSA-f26x-pr96-vw86","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-f26x-pr96-vw86"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"cve-2018-11040","url":"https://pivotal.io/security/cve-2018-11040"},{"title":"CVE-2018-11040","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11040"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"GitHub Advisory GHSA-f26x-pr96-vw86","url":"https://github.com/advisories/GHSA-f26x-pr96-vw86"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[829],"description":"Moderate severity vulnerability that affects org.springframework:spring-core","detail":"# Moderate severity vulnerability that affects org.springframework:spring-core Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the \"jsonp\" and \"callback\" JSONP parameters, enabling cross-domain requests.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-16T17:43:45","updated":"2024-05-15T06:31:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-15756","bom-ref":"CVE-2018-15756/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=4.2.0.RELEASE|<4.3.20.RELEASE","status":"affected"},{"version":"4.3.20.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 4.3.20.RELEASE.","source":{"url":"https://pivotal.io/security/cve-2018-15756"},"references":[{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"apache-msg-d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd@%3Cissues.activemq.apache.org%3E"}},{"id":"debian-msg-msg00022","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html"}},{"id":"apache-msg-7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3@%3Cissues.activemq.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cve-2018-15756","source":{"url":"https://pivotal.io/security/cve-2018-15756"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"securityfocus-msg-105703","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/105703"}},{"id":"apache-msg-bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc@%3Cissues.activemq.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68@%3Cissues.activemq.apache.org%3E"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228@%3Cissues.activemq.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"CVE-2018-15756","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-15756","name":"NVD"}},{"id":"apache-msg-8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd@%3Cissues.activemq.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12@%3Cissues.activemq.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"cve-2018-15756","url":"https://pivotal.io/security/cve-2018-15756"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"CVE-2018-15756","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-15756"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}],"cwes":[],"description":"Denial of Service in Spring Framework","detail":"# Denial of Service in Spring Framework Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2020-06-15T19:34:50","updated":"2024-12-01T05:32:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-1271","bom-ref":"CVE-2018-1271/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=4.3.9.RELEASE|!=4.3.15","status":"affected"},{"version":"4.3.15","status":"unaffected"}]}],"recommendation":"Update to version 4.3.15 to resolve CVE-2018-1271 or update to version 4.3.20.RELEASE to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-1271"},"references":[{"id":"RHSA-2018:2669","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2669"}},{"id":"cve-2018-1271","source":{"url":"https://pivotal.io/security/cve-2018-1271"}},{"id":"RHSA-2018:2939","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2939"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"cpujul2018-4258247","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}},{"id":"GHSA-g8hw-794c-4j9g","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-g8hw-794c-4j9g"}},{"id":"securityfocus-msg-103699","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/103699"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"RHSA-2018:1320","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1320"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"CVE-2018-1271","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1271","name":"NVD"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:2669","url":"https://access.redhat.com/errata/RHSA-2018:2669"},{"title":"cve-2018-1271","url":"https://pivotal.io/security/cve-2018-1271"},{"title":"Red Hat Advisory RHSA-2018:2939","url":"https://access.redhat.com/errata/RHSA-2018:2939"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Oracle Advisory cpujul2018-4258247","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"title":"GitHub Advisory GHSA-g8hw-794c-4j9g","url":"https://github.com/advisories/GHSA-g8hw-794c-4j9g"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Red Hat Advisory RHSA-2018:1320","url":"https://access.redhat.com/errata/RHSA-2018:1320"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"CVE-2018-1271","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1271"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}],"cwes":[22],"description":"Path Traversal in org.springframework:spring-core","detail":"# Path Traversal in org.springframework:spring-core Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T20:07:03","updated":"2024-03-17T05:16:56","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-1257","bom-ref":"CVE-2018-1257/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=4.3.9.RELEASE|!=4.3.17","status":"affected"},{"version":"4.3.17","status":"unaffected"}]}],"recommendation":"Update to version 4.3.17 to resolve CVE-2018-1257 or update to version 4.3.20.RELEASE to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-1257"},"references":[{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"securityfocus-msg-104260","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/104260"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"cve-2018-1257","source":{"url":"https://pivotal.io/security/cve-2018-1257"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"CVE-2018-1257","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1257","name":"NVD"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"RHSA-2018:1809","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1809"}},{"id":"RHSA-2018:3768","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:3768"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"GHSA-rcpf-vj53-7h2m","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-rcpf-vj53-7h2m"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"cve-2018-1257","url":"https://pivotal.io/security/cve-2018-1257"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"CVE-2018-1257","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1257"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Red Hat Advisory RHSA-2018:1809","url":"https://access.redhat.com/errata/RHSA-2018:1809"},{"title":"Red Hat Advisory RHSA-2018:3768","url":"https://access.redhat.com/errata/RHSA-2018:3768"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"GitHub Advisory GHSA-rcpf-vj53-7h2m","url":"https://github.com/advisories/GHSA-rcpf-vj53-7h2m"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[],"description":"Denial of Service in org.springframework:spring-core","detail":"# Denial of Service in org.springframework:spring-core Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2018-10-17T20:02:20","updated":"2024-12-03T06:11:33","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-1199","bom-ref":"CVE-2018-1199/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=4.3.0|<4.3.14","status":"affected"},{"version":"4.3.14","status":"unaffected"}]}],"recommendation":"Update to version 4.3.14 to resolve CVE-2018-1199 or update to version 4.3.20.RELEASE to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-1199"},"references":[{"id":"RHSA-2018:2405","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2405"}},{"id":"apache-msg-dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E"}},{"id":"cve-2018-1199","source":{"url":"https://pivotal.io/security/cve-2018-1199"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"GHSA-v596-fwhq-8x48","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-v596-fwhq-8x48"}},{"id":"CVE-2018-1199","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199","name":"NVD"}},{"id":"apache-msg-ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:2405","url":"https://access.redhat.com/errata/RHSA-2018:2405"},{"title":"cve-2018-1199","url":"https://pivotal.io/security/cve-2018-1199"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"GitHub Advisory GHSA-v596-fwhq-8x48","url":"https://github.com/advisories/GHSA-v596-fwhq-8x48"},{"title":"CVE-2018-1199","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199"}],"cwes":[20],"description":"Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core","detail":"# Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2018-10-17T20:01:54","updated":"2024-03-15T16:11:19","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2021-37533","bom-ref":"CVE-2021-37533/pkg:maven/commons-net/commons-net@3.6?type=jar","affects":[{"ref":"pkg:maven/commons-net/commons-net@3.6?type=jar","versions":[{"range":"vers:maven/>=1.0.0|<=3.8.0|!=3.9.0","status":"affected"},{"version":"3.9.0","status":"unaffected"}]}],"recommendation":"Update to version 3.9.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37533","name":"NVD"},"references":[{"id":"dsa-5307","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2022/dsa-5307"}},{"id":"openwall-oss-security-msg-2022-12-03-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2022/12/03/1"}},{"id":"apache-msg-o6yn9r9x6s94v97264hmgol1sf48mvx7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7"}},{"id":"CVE-2021-37533","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37533","name":"NVD"}},{"id":"debian-msg-msg00038","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html"}},{"id":"NET-711","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/NET-711"}}],"advisories":[{"title":"Debian Advisory dsa-5307","url":"https://www.debian.org/security/2022/dsa-5307"},{"title":"CVE-2021-37533","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37533"},{"title":"Apache Advisory NET-711","url":"https://issues.apache.org/jira/browse/NET-711"}],"cwes":[20],"description":"Apache Commons Net vulnerable to information leakage via malicious server","detail":"# Apache Commons Net vulnerable to information leakage via malicious server Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"published":"2022-12-03T15:30:26","updated":"2023-11-08T04:06:18","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/commons-net/commons-net@3.6?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2020-26945","bom-ref":"CVE-2020-26945/pkg:maven/org.mybatis/mybatis@3.4.6?type=jar","affects":[{"ref":"pkg:maven/org.mybatis/mybatis@3.4.6?type=jar","versions":[{"range":"vers:maven/>=2.3.5|<=3.5.5|!=3.5.6","status":"affected"},{"version":"3.5.6","status":"unaffected"}]}],"recommendation":"Update to version 3.5.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26945","name":"NVD"},"references":[{"id":"CVE-2020-26945","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26945","name":"NVD"}}],"advisories":[{"title":"CVE-2020-26945","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26945"}],"cwes":[502],"description":"\"Deserialization errors in MyBatis\"","detail":"# \"Deserialization errors in MyBatis\" MyBatis before 3.5.6 mishandles deserialization of object streams leading to potential cache poisoning.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-04-22T16:14:38","updated":"2023-11-08T04:03:20","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-starter@1.3.2?type=jar\", \"pkg:maven/org.mybatis/mybatis@3.4.6?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 3 locations"}]},{"id":"CVE-2020-13936","bom-ref":"CVE-2020-13936/pkg:maven/org.apache.velocity/velocity@1.7?type=jar","affects":[{"ref":"pkg:maven/org.apache.velocity/velocity@1.7?type=jar","versions":[{"range":"vers:maven/>=1.5|<=1.7","status":"affected"}]}],"recommendation":"","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13936","name":"NVD"},"references":[{"id":"glsa-202107-52","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-52"}},{"id":"debian-msg-msg00019","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00019.html"}},{"id":"apache-msg-r7f209b837217d2a0fe5977fb692e7f15d37fa5de8214bcdc4c21d9a7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7f209b837217d2a0fe5977fb692e7f15d37fa5de8214bcdc4c21d9a7@%3Ccommits.turbine.apache.org%3E"}},{"id":"apache-msg-rd2a89e17e8a9b451ce655f1a34117752ea1d18a22ce580d8baa824fd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd2a89e17e8a9b451ce655f1a34117752ea1d18a22ce580d8baa824fd@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-re8e7482fe54d289fc0229e61cc64947b63b12c3c312e9f25bf6f3b8c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re8e7482fe54d289fc0229e61cc64947b63b12c3c312e9f25bf6f3b8c@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-r17cb932fab14801b14e5b97a7f05192f4f366ef260c10d4a8dba8ac9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r17cb932fab14801b14e5b97a7f05192f4f366ef260c10d4a8dba8ac9@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-r3ea4c4c908505b20a4c268330dfe7188b90c84dcf777728d02068ae6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3ea4c4c908505b20a4c268330dfe7188b90c84dcf777728d02068ae6@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E"}},{"id":"apache-msg-r0bc98e9cd080b4a13b905c571b9bed87e1a0878d44dbf21487c6cca4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0bc98e9cd080b4a13b905c571b9bed87e1a0878d44dbf21487c6cca4@%3Cdev.santuario.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"CVE-2020-13936","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13936","name":"NVD"}},{"id":"openwall-oss-security-msg-2021-03-10-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/03/10/1"}},{"id":"apache-msg-r293284c6806c73f51098001ea86a14271c39f72cd76af9e946d9d9ad","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r293284c6806c73f51098001ea86a14271c39f72cd76af9e946d9d9ad@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-r4cd59453b65d4ac290fcb3b71fdf32b4f1f8989025e89558deb5a245","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4cd59453b65d4ac290fcb3b71fdf32b4f1f8989025e89558deb5a245@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-rd7e865c87f9043c21d9c1fd9d4df866061d9a08cfc322771160d8058","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd7e865c87f9043c21d9c1fd9d4df866061d9a08cfc322771160d8058@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E"}},{"id":"apache-msg-r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"}},{"id":"apache-msg-re641197d204765130618086238c73dd2ce5a3f94b33785b587d72726","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re641197d204765130618086238c73dd2ce5a3f94b33785b587d72726@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-rbee7270556f4172322936b5ecc9fabf0c09f00d4fa56c9de1963c340","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbee7270556f4172322936b5ecc9fabf0c09f00d4fa56c9de1963c340@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-r39de20c7e9c808b1f96790875d33e58c9c0aabb44fd9227e7b3dc5da","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r39de20c7e9c808b1f96790875d33e58c9c0aabb44fd9227e7b3dc5da@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a@%3Cuser.velocity.apache.org%3E"}},{"id":"apache-msg-rf7d369de88dc88a1347006a3323b3746d849234db40a8edfd5ebc436","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf7d369de88dc88a1347006a3323b3746d849234db40a8edfd5ebc436@%3Cdev.ws.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E"}},{"id":"apache-msg-reab5978b54a9f4c078402161e30a89c42807b198814acadbe6c862c7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/reab5978b54a9f4c078402161e30a89c42807b198814acadbe6c862c7@%3Cdev.ws.apache.org%3E"}}],"advisories":[{"title":"Gentoo Advisory glsa-202107-52","url":"https://security.gentoo.org/glsa/202107-52"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"CVE-2020-13936","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13936"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}],"cwes":[20],"description":"Sandbox Bypass in Apache Velocity Engine","detail":"# Sandbox Bypass in Apache Velocity Engine An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.","ratings":[{"method":"CVSSv31","severity":"high","score":8.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-01-06T20:32:36","updated":"2024-03-15T05:20:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.velocity/velocity@1.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2019-12415","bom-ref":"CVE-2019-12415/pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar","affects":[{"ref":"pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar","versions":[{"range":"vers:maven/>=3.0-FINAL|<=4.1.0|!=4.1.1","status":"affected"},{"version":"4.1.1","status":"unaffected"}]}],"recommendation":"Update to version 4.1.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12415","name":"NVD"},"references":[{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"CVE-2019-12415","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12415","name":"NVD"}},{"id":"apache-msg-2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c@%3Cuser.tika.apache.org%3E"}},{"id":"apache-msg-d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c@%3Cuser.tika.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"}},{"id":"apache-msg-895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007@%3Cuser.tika.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"CVE-2019-12415","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12415"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[611],"description":"Improper Restriction of XML External Entity Reference in Apache POI ","detail":"# Improper Restriction of XML External Entity Reference in Apache POI In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2022-05-24T16:59:46","updated":"2023-11-08T04:01:04","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 1 locations"}]},{"id":"CVE-2025-31672","bom-ref":"CVE-2025-31672/pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar","affects":[{"ref":"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar","versions":[{"range":"vers:maven/>=3.5-FINAL|<=5.3.0|!=5.4.0","status":"affected"},{"version":"5.4.0","status":"unaffected"}]}],"recommendation":"Update to version 5.4.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-31672","name":"NVD"},"references":[{"id":"openwall-oss-security-msg-2025-04-08-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/04/08/2"}},{"id":"show_bug","source":{"name":"Apache Advisory","url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=69620"}},{"id":"CVE-2025-31672","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-31672","name":"NVD"}},{"id":"apache-msg-k14w8vcjqy4h34hh5kzldko78kpylkq5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/k14w8vcjqy4h34hh5kzldko78kpylkq5"}}],"advisories":[{"title":"Apache Advisory show_bug","url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=69620"},{"title":"CVE-2025-31672","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-31672"}],"cwes":[20],"description":"Apache POI OOXML Vulnerable to Improper Input Validation in OOXML File Parsing","detail":"# Apache POI OOXML Vulnerable to Improper Input Validation in OOXML File Parsing Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.","ratings":[{"method":"CVSSv4","severity":"medium","score":6.9,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"}],"published":"2025-04-09T12:30:24","updated":"2025-04-18T19:03:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2021-23926","bom-ref":"CVE-2021-23926/pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar","affects":[{"ref":"pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar","versions":[{"range":"vers:maven/>=2.2.0|<=2.6.0|!=3.0.0","status":"affected"},{"version":"3.0.0","status":"unaffected"}]}],"recommendation":"Update to version 3.0.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23926","name":"NVD"},"references":[{"id":"apache-msg-rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1@%3Cjava-dev.axis.apache.org%3E"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"CVE-2021-23926","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23926","name":"NVD"}},{"id":"apache-msg-r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed@%3Cjava-dev.axis.apache.org%3E"}},{"id":"debian-msg-msg00024","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00024.html"}},{"id":"XMLBEANS-517","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/XMLBEANS-517"}},{"id":"ntap-20210513-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210513-0004"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"CVE-2021-23926","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23926"},{"title":"Apache Advisory XMLBEANS-517","url":"https://issues.apache.org/jira/browse/XMLBEANS-517"},{"title":"NetApp Advisory ntap-20210513-0004","url":"https://security.netapp.com/advisory/ntap-20210513-0004"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[776],"description":"Improper Restriction of Recursive Entity References in Apache XMLBeans","detail":"# Improper Restriction of Recursive Entity References in Apache XMLBeans The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"published":"2021-06-16T17:37:11","updated":"2024-02-19T05:31:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar\", \"pkg:maven/org.apache.poi/poi-ooxml-schemas@3.9?type=jar\", \"pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2018-1000632","bom-ref":"CVE-2018-1000632/pkg:maven/dom4j/dom4j@1.6.1?type=jar","affects":[{"ref":"pkg:maven/dom4j/dom4j@1.6.1?type=jar","versions":[{"range":"vers:maven/>=1.1|<=1.6.1","status":"affected"},{"version":"2.1.1","status":"unaffected"}]}],"recommendation":"Update to version 2.1.1 to resolve CVE-2018-1000632 or update to version 2.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000632","name":"NVD"},"references":[{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"RHSA-2019:1160","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1160"}},{"id":"ntap-20190530-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190530-0001"}},{"id":"apache-msg-7f6e120e6ed473f4e00dde4c398fc6698eb383bd7857d20513e989ce","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7f6e120e6ed473f4e00dde4c398fc6698eb383bd7857d20513e989ce@%3Cdev.maven.apache.org%3E"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"RHSA-2019:1162","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1162"}},{"id":"CVE-2018-1000632","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000632","name":"NVD"}},{"id":"fedoraproject-msg-IOOVVCRQE6ATFD2JM2EMDXOQXTRIVZGP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOOVVCRQE6ATFD2JM2EMDXOQXTRIVZGP"}},{"id":"fedoraproject-msg-KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA"}},{"id":"dom4j-xml-injection","source":{"name":"Ihacktoprotect Advisory","url":"https://ihacktoprotect.com/post/dom4j-xml-injection"}},{"id":"apache-msg-9d4c1af6f702c3d6d6f229de57112ddccac8ce44446a01b7937ab9e0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/9d4c1af6f702c3d6d6f229de57112ddccac8ce44446a01b7937ab9e0@%3Ccommits.maven.apache.org%3E"}},{"id":"apache-msg-d7d960b2778e35ec9b4d40c8efd468c7ce7163bcf6489b633491c89f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d7d960b2778e35ec9b4d40c8efd468c7ce7163bcf6489b633491c89f@%3Cdev.maven.apache.org%3E"}},{"id":"RHSA-2019:0380","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0380"}},{"id":"RHSA-2019:0364","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0364"}},{"id":"apache-msg-rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E"}},{"id":"apache-msg-708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"}},{"id":"RHSA-2019:1159","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1159"}},{"id":"apache-msg-5a020ecaa3c701f408f612f7ba2ee37a021644c4a39da2079ed3ddbc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5a020ecaa3c701f408f612f7ba2ee37a021644c4a39da2079ed3ddbc@%3Ccommits.maven.apache.org%3E"}},{"id":"RHSA-2019:1161","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1161"}},{"id":"GHSA-6pcc-3rfx-4gpm","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-6pcc-3rfx-4gpm"}},{"id":"RHSA-2019:0362","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0362"}},{"id":"apache-msg-7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458@%3Cdev.maven.apache.org%3E"}},{"id":"debian-msg-msg00028","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00028.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-4a77652531d62299a30815cf5f233af183425db8e3c9a824a814e768","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4a77652531d62299a30815cf5f233af183425db8e3c9a824a814e768@%3Cdev.maven.apache.org%3E"}},{"id":"RHSA-2019:0365","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0365"}},{"id":"apache-msg-00571f362a7a2470fba50a31282c65637c40d2e21ebe6ee535a4ed74","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/00571f362a7a2470fba50a31282c65637c40d2e21ebe6ee535a4ed74@%3Ccommits.maven.apache.org%3E"}},{"id":"RHSA-2019:3172","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3172"}}],"advisories":[{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Red Hat Advisory RHSA-2019:1160","url":"https://access.redhat.com/errata/RHSA-2019:1160"},{"title":"NetApp Advisory ntap-20190530-0001","url":"https://security.netapp.com/advisory/ntap-20190530-0001"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Red Hat Advisory RHSA-2019:1162","url":"https://access.redhat.com/errata/RHSA-2019:1162"},{"title":"CVE-2018-1000632","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000632"},{"title":"Ihacktoprotect Advisory dom4j-xml-injection","url":"https://ihacktoprotect.com/post/dom4j-xml-injection"},{"title":"Red Hat Advisory RHSA-2019:0380","url":"https://access.redhat.com/errata/RHSA-2019:0380"},{"title":"Red Hat Advisory RHSA-2019:0364","url":"https://access.redhat.com/errata/RHSA-2019:0364"},{"title":"Red Hat Advisory RHSA-2019:1159","url":"https://access.redhat.com/errata/RHSA-2019:1159"},{"title":"Red Hat Advisory RHSA-2019:1161","url":"https://access.redhat.com/errata/RHSA-2019:1161"},{"title":"GitHub Advisory GHSA-6pcc-3rfx-4gpm","url":"https://github.com/advisories/GHSA-6pcc-3rfx-4gpm"},{"title":"Red Hat Advisory RHSA-2019:0362","url":"https://access.redhat.com/errata/RHSA-2019:0362"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2019:0365","url":"https://access.redhat.com/errata/RHSA-2019:0365"},{"title":"Red Hat Advisory RHSA-2019:3172","url":"https://access.redhat.com/errata/RHSA-2019:3172"}],"cwes":[91],"description":"Dom4j contains a XML Injection vulnerability","detail":"# Dom4j contains a XML Injection vulnerability dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2018-10-16T17:01:25","updated":"2024-03-14T05:33:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar\", \"pkg:maven/dom4j/dom4j@1.6.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 4 locations"}]},{"id":"CVE-2020-10683","bom-ref":"CVE-2020-10683/pkg:maven/dom4j/dom4j@1.6.1?type=jar","affects":[{"ref":"pkg:maven/dom4j/dom4j@1.6.1?type=jar","versions":[{"range":"vers:maven/>=1.1|<=1.6.1","status":"affected"},{"version":"2.1.3","status":"unaffected"}]}],"recommendation":"Update to version 2.1.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10683","name":"NVD"},"references":[{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"ntap-20200518-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200518-0002"}},{"id":"apache-msg-r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E"}},{"id":"XML_External_Entity_Prevention_Cheat_Sheet","source":{"name":"Owasp Advisory","url":"https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"opensuse-msg-msg00061","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html"}},{"id":"CVE-2020-10683","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10683","name":"NVD"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"redhat-bugzilla-1694235","source":{"name":"Red Hat Bugzilla","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1694235"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"NetApp Advisory ntap-20200518-0002","url":"https://security.netapp.com/advisory/ntap-20200518-0002"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Owasp Advisory XML_External_Entity_Prevention_Cheat_Sheet","url":"https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"CVE-2020-10683","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10683"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}],"cwes":[611],"description":"dom4j allows External Entities by default which might enable XXE attacks","detail":"# dom4j allows External Entities by default which might enable XXE attacks dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2020-06-05T16:13:36","updated":"2024-03-08T05:17:29","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar\", \"pkg:maven/dom4j/dom4j@1.6.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 4 locations"}]},{"id":"CVE-2022-23640","bom-ref":"CVE-2022-23640/pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar","affects":[{"ref":"pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar","versions":[{"range":"vers:maven/>=0.2.3|<=2.0.0|!=2.1.0","status":"affected"},{"version":"2.1.0","status":"unaffected"}]}],"recommendation":"Update to version 2.1.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23640","name":"NVD"},"references":[{"id":"CVE-2022-23640","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23640","name":"NVD"}},{"id":"GHSA-xvm2-9xvc-hx7f","source":{"name":"GitHub Advisory","url":"https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f"}}],"advisories":[{"title":"CVE-2022-23640","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23640"},{"title":"GitHub Advisory GHSA-xvm2-9xvc-hx7f","url":"https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f"}],"cwes":[611,776],"description":"Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer","detail":"# Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer ### Impact Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues. ### Patches Upgrade to version 2.1.0. ### Workarounds No known workaround. ### References https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73 ### For more information If you have any questions or comments about this advisory: * Open an issue in [monitorjbl/excel-streaming-reader](https://github.com/monitorjbl/excel-streaming-reader)","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-03-02T21:30:54","updated":"2024-02-16T08:13:13","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 1 locations"}]},{"id":"CVE-2024-47554","bom-ref":"CVE-2024-47554/pkg:maven/commons-io/commons-io@2.5?type=jar","affects":[{"ref":"pkg:maven/commons-io/commons-io@2.5?type=jar","versions":[{"range":"vers:maven/>=2.0|<2.14.0","status":"affected"},{"version":"2.14.0","status":"unaffected"}]}],"recommendation":"Update to version 2.14.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47554","name":"NVD"},"references":[{"id":"ntap-20250131-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250131-0010"}},{"id":"apache-msg-6ozr91rr9cj5lm0zyhv30bsp317hk5z1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1"}},{"id":"CVE-2024-47554","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47554","name":"NVD"}},{"id":"openwall-oss-security-msg-2024-10-03-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/10/03/2"}}],"advisories":[{"title":"NetApp Advisory ntap-20250131-0010","url":"https://security.netapp.com/advisory/ntap-20250131-0010"},{"title":"CVE-2024-47554","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47554"}],"cwes":[400],"description":"Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader","detail":"# Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The `org.apache.commons.io.input.XmlStreamReader` class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-10-03T12:30:48","updated":"2025-01-31T15:38:02","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/commons-io/commons-io@2.5?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2021-29425","bom-ref":"CVE-2021-29425/pkg:maven/commons-io/commons-io@2.5?type=jar","affects":[{"ref":"pkg:maven/commons-io/commons-io@2.5?type=jar","versions":[{"range":"vers:maven/>=0.1|<=2.6|!=2.7","status":"affected"},{"version":"2.7","status":"unaffected"}]}],"recommendation":"Update to version 2.7 to resolve CVE-2021-29425 or update to version 2.14.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29425","name":"NVD"},"references":[{"id":"apache-msg-r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E"}},{"id":"apache-msg-rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"apache-msg-red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E"}},{"id":"apache-msg-r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"debian-msg-msg00016","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html"}},{"id":"apache-msg-ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E"}},{"id":"apache-msg-r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E"}},{"id":"apache-msg-r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E"}},{"id":"apache-msg-r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E"}},{"id":"apache-msg-rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E"}},{"id":"ntap-20220210-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0004"}},{"id":"IO-556","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/IO-556"}},{"id":"apache-msg-r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E"}},{"id":"CVE-2021-29425","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29425","name":"NVD"}},{"id":"apache-msg-r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"NetApp Advisory ntap-20220210-0004","url":"https://security.netapp.com/advisory/ntap-20220210-0004"},{"title":"Apache Advisory IO-556","url":"https://issues.apache.org/jira/browse/IO-556"},{"title":"CVE-2021-29425","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29425"}],"cwes":[20,22],"description":"Path Traversal and Improper Input Validation in Apache Commons IO","detail":"# Path Traversal and Improper Input Validation in Apache Commons IO In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like \"//../foo\", or \"\\\\..\\foo\", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus \"limited\" path traversal), if the calling code would use the result to construct a path value.","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"published":"2021-04-26T16:04:00","updated":"2024-03-12T05:31:30","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/commons-io/commons-io@2.5?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2019-17495","bom-ref":"CVE-2019-17495/pkg:maven/io.springfox/springfox-swagger-ui@2.9.2?type=jar","affects":[{"ref":"pkg:maven/io.springfox/springfox-swagger-ui@2.9.2?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=2.9.2|!=2.10.0","status":"affected"},{"version":"2.10.0","status":"unaffected"}]}],"recommendation":"Update to version 2.10.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17495","name":"NVD"},"references":[{"id":"apache-msg-r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f@%3Ccommits.airflow.apache.org%3E"}},{"id":"CVE-2019-17495","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17495","name":"NVD"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf@%3Ccommits.airflow.apache.org%3E"}},{"id":"CVE-2019-17495","source":{"url":"https://security.snyk.io/vuln/maven?search=CVE-2019-17495"}},{"id":"apache-msg-ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f@%3Ccommits.airflow.apache.org%3E"}},{"id":"apache-msg-r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"CVE-2019-17495","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17495"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"CVE-2019-17495","url":"https://security.snyk.io/vuln/maven?search=CVE-2019-17495"}],"cwes":[352,79],"description":"Cross-site scripting in Swagger-UI","detail":"# Cross-site scripting in Swagger-UI A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that