{"bomFormat":"CycloneDX","specVersion":"1.6","serialNumber":"urn:uuid:ec5416ad-327e-4f92-81c9-9b4e94c79379","version":2,"metadata":{"timestamp":"2025-05-01T19:27:07Z","tools":{"components":[{"type":"application","name":"owasp-depscan","version":"6.0.0","purl":"pkg:pypi/owasp-depscan@6.0.0","bom-ref":"pkg:pypi/owasp-depscan@6.0.0"}]}},"components":[{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-web","version":"1.5.1.RELEASE","description":"Starter for building web, including RESTful, applications using Spring\n\t\tMVC. Uses Tomcat as the default embedded container","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-web/1.5.1.RELEASE/spring-boot-starter-web-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-web/1.5.1.RELEASE/spring-boot-starter-web-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-web/1.5.1.RELEASE/spring-boot-starter-web-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-web/1.5.1.RELEASE/spring-boot-starter-web-1.5.1.RELEASE.jar"}]},"tags":["framework","tomcat"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter","version":"1.5.1.RELEASE","description":"Core starter, including auto-configuration support, logging and YAML","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter/1.5.1.RELEASE/spring-boot-starter-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter/1.5.1.RELEASE/spring-boot-starter-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter/1.5.1.RELEASE/spring-boot-starter-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter/1.5.1.RELEASE/spring-boot-starter-1.5.1.RELEASE.jar"}]},"tags":["framework","logging"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot","version":"1.5.1.RELEASE","description":"Spring Boot","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/spring-projects/spring-boot"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot/1.5.1.RELEASE/spring-boot-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot/1.5.1.RELEASE/spring-boot-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot/1.5.1.RELEASE/spring-boot-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot/1.5.1.RELEASE/spring-boot-1.5.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-autoconfigure","version":"1.5.1.RELEASE","description":"Spring Boot AutoConfigure","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/spring-projects/spring-boot"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-autoconfigure/1.5.1.RELEASE/spring-boot-autoconfigure-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-autoconfigure/1.5.1.RELEASE/spring-boot-autoconfigure-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-autoconfigure/1.5.1.RELEASE/spring-boot-autoconfigure-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-autoconfigure/1.5.1.RELEASE/spring-boot-autoconfigure-1.5.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-logging","version":"1.5.1.RELEASE","description":"Starter for logging using Logback. Default logging starter","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-logging/1.5.1.RELEASE/spring-boot-starter-logging-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-logging/1.5.1.RELEASE/spring-boot-starter-logging-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-logging/1.5.1.RELEASE/spring-boot-starter-logging-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-logging/1.5.1.RELEASE/spring-boot-starter-logging-1.5.1.RELEASE.jar"}]},"tags":["framework","logging"]},{"publisher":"QOS.ch","group":"ch.qos.logback","name":"logback-classic","version":"1.1.9","description":"logback-classic module","scope":"required","purl":"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/ceki/logback"}],"type":"library","bom-ref":"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ch/qos/logback/logback-classic/1.1.9/logback-classic-1.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ch/qos/logback/logback-classic/1.1.9/logback-classic-1.1.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ch/qos/logback/logback-classic/1.1.9/logback-classic-1.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ch/qos/logback/logback-classic/1.1.9/logback-classic-1.1.9.jar"}]},"tags":["sql","xml"]},{"publisher":"QOS.ch","group":"ch.qos.logback","name":"logback-core","version":"1.1.9","description":"logback-core module","scope":"required","purl":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/ceki/logback"}],"type":"library","bom-ref":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ch/qos/logback/logback-core/1.1.9/logback-core-1.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ch/qos/logback/logback-core/1.1.9/logback-core-1.1.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ch/qos/logback/logback-core/1.1.9/logback-core-1.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ch/qos/logback/logback-core/1.1.9/logback-core-1.1.9.jar"}]},"tags":["driver","registry","sql","xml"]},{"publisher":"QOS.ch","group":"org.slf4j","name":"jul-to-slf4j","version":"1.7.22","description":"JUL to SLF4J bridge","scope":"required","purl":"pkg:maven/org.slf4j/jul-to-slf4j@1.7.22?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/qos-ch/slf4j"}],"type":"framework","bom-ref":"pkg:maven/org.slf4j/jul-to-slf4j@1.7.22?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/jul-to-slf4j/1.7.22/jul-to-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/jul-to-slf4j/1.7.22/jul-to-slf4j-1.7.22.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/jul-to-slf4j/1.7.22/jul-to-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/jul-to-slf4j/1.7.22/jul-to-slf4j-1.7.22.jar"}]},"tags":["framework","slf4j"]},{"publisher":"QOS.ch","group":"org.slf4j","name":"log4j-over-slf4j","version":"1.7.22","description":"Log4j implemented over SLF4J","scope":"required","purl":"pkg:maven/org.slf4j/log4j-over-slf4j@1.7.22?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/qos-ch/slf4j"}],"type":"framework","bom-ref":"pkg:maven/org.slf4j/log4j-over-slf4j@1.7.22?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/log4j-over-slf4j/1.7.22/log4j-over-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/log4j-over-slf4j/1.7.22/log4j-over-slf4j-1.7.22.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/log4j-over-slf4j/1.7.22/log4j-over-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/log4j-over-slf4j/1.7.22/log4j-over-slf4j-1.7.22.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-tomcat","version":"1.5.1.RELEASE","description":"Starter for using Tomcat as the embedded servlet container. Default\n\t\tservlet container starter used by spring-boot-starter-web","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-tomcat/1.5.1.RELEASE/spring-boot-starter-tomcat-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-tomcat/1.5.1.RELEASE/spring-boot-starter-tomcat-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-tomcat/1.5.1.RELEASE/spring-boot-starter-tomcat-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-tomcat/1.5.1.RELEASE/spring-boot-starter-tomcat-1.5.1.RELEASE.jar"}]},"tags":["framework","tomcat"]},{"group":"org.apache.tomcat.embed","name":"tomcat-embed-core","version":"8.5.11","description":"Core Tomcat implementation","scope":"required","purl":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-core/8.5.11/tomcat-embed-core-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-core/8.5.11/tomcat-embed-core-8.5.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-core/8.5.11/tomcat-embed-core-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-core/8.5.11/tomcat-embed-core-8.5.11.jar"}]},"tags":["framework","tomcat"]},{"group":"org.apache.tomcat.embed","name":"tomcat-embed-el","version":"8.5.11","description":"Core Tomcat implementation","scope":"required","purl":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-el@8.5.11?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-el@8.5.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-el/8.5.11/tomcat-embed-el-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-el/8.5.11/tomcat-embed-el-8.5.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-el/8.5.11/tomcat-embed-el-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-el/8.5.11/tomcat-embed-el-8.5.11.jar"}]},"tags":["framework","tomcat"]},{"group":"org.apache.tomcat.embed","name":"tomcat-embed-websocket","version":"8.5.11","description":"Core Tomcat implementation","scope":"required","purl":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-websocket/8.5.11/tomcat-embed-websocket-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/embed/tomcat-embed-websocket/8.5.11/tomcat-embed-websocket-8.5.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-websocket/8.5.11/tomcat-embed-websocket-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/embed/tomcat-embed-websocket/8.5.11/tomcat-embed-websocket-8.5.11.jar"}]},"tags":["framework","tomcat"]},{"group":"org.hibernate","name":"hibernate-validator","version":"5.3.4.Final","description":"Hibernate's Bean Validation (JSR-303) reference implementation.","scope":"required","purl":"pkg:maven/org.hibernate/hibernate-validator@5.3.4.Final?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/hibernate/hibernate-validator"}],"type":"framework","bom-ref":"pkg:maven/org.hibernate/hibernate-validator@5.3.4.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hibernate/hibernate-validator/5.3.4.Final/hibernate-validator-5.3.4.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hibernate/hibernate-validator/5.3.4.Final/hibernate-validator-5.3.4.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hibernate/hibernate-validator/5.3.4.Final/hibernate-validator-5.3.4.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hibernate/hibernate-validator/5.3.4.Final/hibernate-validator-5.3.4.Final.jar"}]},"tags":["framework","validation"]},{"group":"javax.validation","name":"validation-api","version":"1.1.0.Final","description":"\n Bean Validation API\n ","scope":"required","purl":"pkg:maven/javax.validation/validation-api@1.1.0.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/beanvalidation/beanvalidation-api"}],"type":"library","bom-ref":"pkg:maven/javax.validation/validation-api@1.1.0.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/validation/validation-api/1.1.0.Final/validation-api-1.1.0.Final.jar"}]},"tags":["validation"]},{"publisher":"JBoss by Red Hat","group":"org.jboss.logging","name":"jboss-logging","version":"3.3.0.Final","description":"The JBoss Logging Framework","scope":"required","purl":"pkg:maven/org.jboss.logging/jboss-logging@3.3.0.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/jboss-logging/jboss-logging"}],"type":"framework","bom-ref":"pkg:maven/org.jboss.logging/jboss-logging@3.3.0.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jboss/logging/jboss-logging/3.3.0.Final/jboss-logging-3.3.0.Final.jar"}]},"tags":["framework","logging"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-web","version":"4.3.6.RELEASE","description":"Spring Web","scope":"required","purl":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-web/4.3.6.RELEASE/spring-web-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-web/4.3.6.RELEASE/spring-web-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-web/4.3.6.RELEASE/spring-web-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-web/4.3.6.RELEASE/spring-web-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-webmvc","version":"4.3.6.RELEASE","description":"Spring Web MVC","scope":"required","purl":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-webmvc/4.3.6.RELEASE/spring-webmvc-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-webmvc/4.3.6.RELEASE/spring-webmvc-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-webmvc/4.3.6.RELEASE/spring-webmvc-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-webmvc/4.3.6.RELEASE/spring-webmvc-4.3.6.RELEASE.jar"}]},"tags":["framework","web"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-thymeleaf","version":"1.5.1.RELEASE","description":"Starter for building MVC web applications using Thymeleaf views","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-thymeleaf@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-thymeleaf@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-thymeleaf/1.5.1.RELEASE/spring-boot-starter-thymeleaf-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-thymeleaf/1.5.1.RELEASE/spring-boot-starter-thymeleaf-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-thymeleaf/1.5.1.RELEASE/spring-boot-starter-thymeleaf-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-thymeleaf/1.5.1.RELEASE/spring-boot-starter-thymeleaf-1.5.1.RELEASE.jar"}]},"tags":["framework","mvc","web"]},{"publisher":"The THYMELEAF team","group":"org.thymeleaf","name":"thymeleaf-spring4","version":"2.1.5.RELEASE","description":"XML/XHTML/HTML5 template engine for Java","scope":"required","purl":"pkg:maven/org.thymeleaf/thymeleaf-spring4@2.1.5.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:thymeleaf/thymeleaf-spring.git"}],"type":"framework","bom-ref":"pkg:maven/org.thymeleaf/thymeleaf-spring4@2.1.5.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/thymeleaf/thymeleaf-spring4/2.1.5.RELEASE/thymeleaf-spring4-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/thymeleaf/thymeleaf-spring4/2.1.5.RELEASE/thymeleaf-spring4-2.1.5.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/thymeleaf/thymeleaf-spring4/2.1.5.RELEASE/thymeleaf-spring4-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/thymeleaf/thymeleaf-spring4/2.1.5.RELEASE/thymeleaf-spring4-2.1.5.RELEASE.jar"}]},"tags":["framework","template"]},{"publisher":"The THYMELEAF team","group":"org.thymeleaf","name":"thymeleaf","version":"2.1.5.RELEASE","description":"XML/XHTML/HTML5 template engine for Java","scope":"required","purl":"pkg:maven/org.thymeleaf/thymeleaf@2.1.5.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:thymeleaf/thymeleaf.git"}],"type":"framework","bom-ref":"pkg:maven/org.thymeleaf/thymeleaf@2.1.5.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/thymeleaf/thymeleaf/2.1.5.RELEASE/thymeleaf-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/thymeleaf/thymeleaf/2.1.5.RELEASE/thymeleaf-2.1.5.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/thymeleaf/thymeleaf/2.1.5.RELEASE/thymeleaf-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/thymeleaf/thymeleaf/2.1.5.RELEASE/thymeleaf-2.1.5.RELEASE.jar"}]},"tags":["framework","template"]},{"publisher":"OpenSymphony","group":"ognl","name":"ognl","version":"3.0.8","description":"OGNL - Object Graph Navigation Library","scope":"required","purl":"pkg:maven/ognl/ognl@3.0.8?type=jar","type":"library","bom-ref":"pkg:maven/ognl/ognl@3.0.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ognl/ognl/3.0.8/ognl-3.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/ognl/ognl/3.0.8/ognl-3.0.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ognl/ognl/3.0.8/ognl-3.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/ognl/ognl/3.0.8/ognl-3.0.8.jar"}]},"tags":["graph"]},{"publisher":"The UNBESCAPE team","group":"org.unbescape","name":"unbescape","version":"1.1.0.RELEASE","description":"Advanced yet easy-to-use escape/unescape library for Java","scope":"required","purl":"pkg:maven/org.unbescape/unbescape@1.1.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:unbescape/unbescape.git"}],"type":"library","bom-ref":"pkg:maven/org.unbescape/unbescape@1.1.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/unbescape/unbescape/1.1.0.RELEASE/unbescape-1.1.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/unbescape/unbescape/1.1.0.RELEASE/unbescape-1.1.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/unbescape/unbescape/1.1.0.RELEASE/unbescape-1.1.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/unbescape/unbescape/1.1.0.RELEASE/unbescape-1.1.0.RELEASE.jar"}]},"tags":["xml"]},{"group":"nz.net.ultraq.thymeleaf","name":"thymeleaf-layout-dialect","version":"1.4.0","description":"A dialect for Thymeleaf that allows you to use layout/decorator templates to style your content.","scope":"required","purl":"pkg:maven/nz.net.ultraq.thymeleaf/thymeleaf-layout-dialect@1.4.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/ultraq/thymeleaf-layout-dialect"}],"type":"framework","bom-ref":"pkg:maven/nz.net.ultraq.thymeleaf/thymeleaf-layout-dialect@1.4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/nz/net/ultraq/thymeleaf/thymeleaf-layout-dialect/1.4.0/thymeleaf-layout-dialect-1.4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/nz/net/ultraq/thymeleaf/thymeleaf-layout-dialect/1.4.0/thymeleaf-layout-dialect-1.4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/nz/net/ultraq/thymeleaf/thymeleaf-layout-dialect/1.4.0/thymeleaf-layout-dialect-1.4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/nz/net/ultraq/thymeleaf/thymeleaf-layout-dialect/1.4.0/thymeleaf-layout-dialect-1.4.0.jar"}]},"tags":["framework","templates"]},{"publisher":"Apache Software Foundation","group":"org.codehaus.groovy","name":"groovy","version":"2.4.7","description":"Groovy: A powerful, dynamic language for the JVM","scope":"required","purl":"pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/apache/groovy.git"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/groovy/groovy/2.4.7/groovy-2.4.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/groovy/groovy/2.4.7/groovy-2.4.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/groovy/groovy/2.4.7/groovy-2.4.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/groovy/groovy/2.4.7/groovy-2.4.7.jar"}]},"tags":["registry","xml"]},{"publisher":"Oracle Corporation","group":"mysql","name":"mysql-connector-java","version":"8.0.12","description":"JDBC Type 4 driver for MySQL","scope":"required","purl":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/mysql/mysql-connector-j"}],"type":"library","bom-ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/mysql/mysql-connector-java/8.0.12/mysql-connector-java-8.0.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/mysql/mysql-connector-java/8.0.12/mysql-connector-java-8.0.12.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/mysql/mysql-connector-java/8.0.12/mysql-connector-java-8.0.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/mysql/mysql-connector-java/8.0.12/mysql-connector-java-8.0.12.jar"}]},"tags":["algorithm","driver","network","sql","xml"]},{"publisher":"Google","group":"com.google.protobuf","name":"protobuf-java","version":"2.6.0","description":"\n Protocol Buffers are a way of encoding structured data in an efficient yet\n extensible format.\n ","scope":"required","purl":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","externalReferences":[{"type":"vcs","url":"http://code.google.com/p/protobuf/source/browse"}],"type":"library","bom-ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/protobuf/protobuf-java/2.6.0/protobuf-java-2.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/protobuf/protobuf-java/2.6.0/protobuf-java-2.6.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/protobuf/protobuf-java/2.6.0/protobuf-java-2.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/protobuf/protobuf-java/2.6.0/protobuf-java-2.6.0.jar"}]},"tags":["registry"]},{"publisher":"Alibaba Group","group":"com.alibaba","name":"fastjson","version":"1.2.24","description":"\n\t\tFastjson is a JSON processor (JSON parser + JSON generator) written in Java\n\t","scope":"required","purl":"pkg:maven/com.alibaba/fastjson@1.2.24?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/alibaba/fastjson"}],"type":"library","bom-ref":"pkg:maven/com.alibaba/fastjson@1.2.24?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/alibaba/fastjson/1.2.24/fastjson-1.2.24.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/alibaba/fastjson/1.2.24/fastjson-1.2.24.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/alibaba/fastjson/1.2.24/fastjson-1.2.24.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/alibaba/fastjson/1.2.24/fastjson-1.2.24.jar"}]},"tags":["json"]},{"publisher":"JDOM","group":"org.jdom","name":"jdom2","version":"2.0.6","description":"\n\t\tA complete, Java-based solution for accessing, manipulating, \n\t\tand outputting XML data\n\t","scope":"required","purl":"pkg:maven/org.jdom/jdom2@2.0.6?type=jar","type":"library","bom-ref":"pkg:maven/org.jdom/jdom2@2.0.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jdom/jdom2/2.0.6/jdom2-2.0.6.jar"}]},"tags":["xml"]},{"group":"org.dom4j","name":"dom4j","version":"2.1.0","description":"flexible XML framework for Java","scope":"required","purl":"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","type":"framework","bom-ref":"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/dom4j/dom4j/2.1.0/dom4j-2.1.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/dom4j/dom4j/2.1.0/dom4j-2.1.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/dom4j/dom4j/2.1.0/dom4j-2.1.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/dom4j/dom4j/2.1.0/dom4j-2.1.0.jar"}]},"tags":["framework","xml"]},{"publisher":"Codehaus","group":"jaxen","name":"jaxen","version":"1.1.6","description":"Jaxen is a universal Java XPath engine.","scope":"required","purl":"pkg:maven/jaxen/jaxen@1.1.6?type=jar","externalReferences":[{"type":"vcs","url":"http://fisheye.codehaus.org/browse/jaxen/"}],"type":"library","bom-ref":"pkg:maven/jaxen/jaxen@1.1.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/jaxen/jaxen/1.1.6/jaxen-1.1.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/jaxen/jaxen/1.1.6/jaxen-1.1.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/jaxen/jaxen/1.1.6/jaxen-1.1.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/jaxen/jaxen/1.1.6/jaxen-1.1.6.jar"}]}},{"group":"com.google.guava","name":"guava","version":"23.0","description":"\n Guava is a suite of core and expanded libraries that include\n utility classes, google's collections, io classes, and much\n much more.\n ","scope":"required","purl":"pkg:maven/com.google.guava/guava@23.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/google/guava"}],"type":"library","bom-ref":"pkg:maven/com.google.guava/guava@23.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/guava/guava/23.0/guava-23.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/guava/guava/23.0/guava-23.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/guava/guava/23.0/guava-23.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/guava/guava/23.0/guava-23.0.jar"}]},"tags":["network","registry","stripe","xml"]},{"group":"com.google.code.findbugs","name":"jsr305","version":"1.3.9","description":"JSR305 Annotations for Findbugs","scope":"required","purl":"pkg:maven/com.google.code.findbugs/jsr305@1.3.9?type=jar","externalReferences":[{"type":"vcs","url":"http://findbugs.googlecode.com/svn/trunk/"}],"type":"library","bom-ref":"pkg:maven/com.google.code.findbugs/jsr305@1.3.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar"}]}},{"group":"com.google.errorprone","name":"error_prone_annotations","version":"2.0.18","scope":"required","purl":"pkg:maven/com.google.errorprone/error_prone_annotations@2.0.18?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/google/error-prone"}],"type":"library","bom-ref":"pkg:maven/com.google.errorprone/error_prone_annotations@2.0.18?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar"}]}},{"group":"com.google.j2objc","name":"j2objc-annotations","version":"1.1","description":"\n A set of annotations that provide additional information to the J2ObjC\n translator to modify the result of translation.\n ","scope":"required","purl":"pkg:maven/com.google.j2objc/j2objc-annotations@1.1?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.sonatype.org/spice/tags/oss-parent-7"}],"type":"library","bom-ref":"pkg:maven/com.google.j2objc/j2objc-annotations@1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/j2objc/j2objc-annotations/1.1/j2objc-annotations-1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/j2objc/j2objc-annotations/1.1/j2objc-annotations-1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/j2objc/j2objc-annotations/1.1/j2objc-annotations-1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/j2objc/j2objc-annotations/1.1/j2objc-annotations-1.1.jar"}]}},{"group":"org.codehaus.mojo","name":"animal-sniffer-annotations","version":"1.14","description":"\n Animal Sniffer Parent project.\n ","scope":"required","purl":"pkg:maven/org.codehaus.mojo/animal-sniffer-annotations@1.14?type=jar","externalReferences":[{"type":"vcs","url":"http://fisheye.codehaus.org/browse/mojo/tags/animal-sniffer-parent-1.14"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.mojo/animal-sniffer-annotations@1.14?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/mojo/animal-sniffer-annotations/1.14/animal-sniffer-annotations-1.14.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/mojo/animal-sniffer-annotations/1.14/animal-sniffer-annotations-1.14.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/mojo/animal-sniffer-annotations/1.14/animal-sniffer-annotations-1.14.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/mojo/animal-sniffer-annotations/1.14/animal-sniffer-annotations-1.14.jar"}]}},{"publisher":"Apache Software Foundation","group":"commons-collections","name":"commons-collections","version":"3.1","description":"Types that extend and augment the Java Collections Framework.","scope":"required","purl":"pkg:maven/commons-collections/commons-collections@3.1?type=jar","type":"framework","bom-ref":"pkg:maven/commons-collections/commons-collections@3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-collections/commons-collections/3.1/commons-collections-3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-collections/commons-collections/3.1/commons-collections-3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-collections/commons-collections/3.1/commons-collections-3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-collections/commons-collections/3.1/commons-collections-3.1.jar"}]},"tags":["framework"]},{"group":"commons-lang","name":"commons-lang","version":"2.4","description":"\n Commons Lang, a package of Java utility classes for the\n classes that are in java.lang's hierarchy, or are considered to be so\n standard as to justify existence in java.lang.\n ","scope":"required","purl":"pkg:maven/commons-lang/commons-lang@2.4?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/lang/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-lang/commons-lang@2.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-lang/commons-lang/2.4/commons-lang-2.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-lang/commons-lang/2.4/commons-lang-2.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-lang/commons-lang/2.4/commons-lang-2.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-lang/commons-lang/2.4/commons-lang-2.4.jar"}]}},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"httpclient","version":"4.5.12","description":"\n Apache HttpComponents Client\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpclient/4.5.12/httpclient-4.5.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpclient/4.5.12/httpclient-4.5.12.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpclient/4.5.12/httpclient-4.5.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpclient/4.5.12/httpclient-4.5.12.jar"}]},"tags":["framework"]},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"httpcore","version":"4.4.6","description":"\n Apache HttpComponents Core (blocking I/O)\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/httpcore@4.4.6?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/repos/asf/httpcomponents/httpcore/tags/4.4.6"}],"type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/httpcore@4.4.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpcore/4.4.6/httpcore-4.4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpcore/4.4.6/httpcore-4.4.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpcore/4.4.6/httpcore-4.4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpcore/4.4.6/httpcore-4.4.6.jar"}]},"tags":["framework"]},{"group":"commons-codec","name":"commons-codec","version":"1.10","description":"\r\n The Apache Commons Codec package contains simple encoder and decoders for\r\n various formats such as Base64 and Hexadecimal. In addition to these\r\n widely used encoders and decoders, the codec package also maintains a\r\n collection of phonetic encoding utilities.\r\n ","scope":"required","purl":"pkg:maven/commons-codec/commons-codec@1.10?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/codec/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-codec/commons-codec@1.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-codec/commons-codec/1.10/commons-codec-1.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-codec/commons-codec/1.10/commons-codec-1.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-codec/commons-codec/1.10/commons-codec-1.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-codec/commons-codec/1.10/commons-codec-1.10.jar"}]},"tags":["codec"]},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"fluent-hc","version":"4.3.6","description":"\n HttpComponents Client fluent API\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/fluent-hc@4.3.6?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/repos/asf/httpcomponents/httpclient/tags/4.3.6"}],"type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/fluent-hc@4.3.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/fluent-hc/4.3.6/fluent-hc-4.3.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/fluent-hc/4.3.6/fluent-hc-4.3.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/fluent-hc/4.3.6/fluent-hc-4.3.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/fluent-hc/4.3.6/fluent-hc-4.3.6.jar"}]},"tags":["framework"]},{"group":"commons-logging","name":"commons-logging","version":"1.1.3","description":"Commons Logging is a thin adapter allowing configurable bridging to other,\n well known logging systems.","scope":"required","purl":"pkg:maven/commons-logging/commons-logging@1.1.3?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/commons/proper/logging/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-logging/commons-logging@1.1.3?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-logging/commons-logging/1.1.3/commons-logging-1.1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-logging/commons-logging/1.1.3/commons-logging-1.1.3.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-logging/commons-logging/1.1.3/commons-logging-1.1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-logging/commons-logging/1.1.3/commons-logging-1.1.3.jar"}]},"tags":["logging"]},{"group":"org.apache.logging.log4j","name":"log4j-core","version":"2.9.1","description":"The Apache Log4j Implementation","scope":"required","purl":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","externalReferences":[{"type":"vcs","url":"https://git-wip-us.apache.org/repos/asf?p=logging-log4j2.git;a=summary"}],"type":"framework","bom-ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/logging/log4j/log4j-core/2.9.1/log4j-core-2.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/logging/log4j/log4j-core/2.9.1/log4j-core-2.9.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/logging/log4j/log4j-core/2.9.1/log4j-core-2.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/logging/log4j/log4j-core/2.9.1/log4j-core-2.9.1.jar"}]},"tags":["framework"]},{"group":"org.apache.logging.log4j","name":"log4j-api","version":"2.9.1","description":"The Apache Log4j API","scope":"required","purl":"pkg:maven/org.apache.logging.log4j/log4j-api@2.9.1?type=jar","externalReferences":[{"type":"vcs","url":"https://git-wip-us.apache.org/repos/asf?p=logging-log4j2.git;a=summary"}],"type":"framework","bom-ref":"pkg:maven/org.apache.logging.log4j/log4j-api@2.9.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/logging/log4j/log4j-api/2.9.1/log4j-api-2.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/logging/log4j/log4j-api/2.9.1/log4j-api-2.9.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/logging/log4j/log4j-api/2.9.1/log4j-api-2.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/logging/log4j/log4j-api/2.9.1/log4j-api-2.9.1.jar"}]},"tags":["framework"]},{"group":"com.squareup.okhttp","name":"okhttp","version":"2.5.0","description":"An HTTP+SPDY client for Android and Java applications","scope":"required","purl":"pkg:maven/com.squareup.okhttp/okhttp@2.5.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/square/okhttp/"}],"type":"library","bom-ref":"pkg:maven/com.squareup.okhttp/okhttp@2.5.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/squareup/okhttp/okhttp/2.5.0/okhttp-2.5.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/squareup/okhttp/okhttp/2.5.0/okhttp-2.5.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/squareup/okhttp/okhttp/2.5.0/okhttp-2.5.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/squareup/okhttp/okhttp/2.5.0/okhttp-2.5.0.jar"}]},"tags":["network"]},{"group":"com.squareup.okio","name":"okio","version":"1.6.0","description":"A modern I/O API for Java","scope":"required","purl":"pkg:maven/com.squareup.okio/okio@1.6.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/square/okio/"}],"type":"library","bom-ref":"pkg:maven/com.squareup.okio/okio@1.6.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/squareup/okio/okio/1.6.0/okio-1.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/squareup/okio/okio/1.6.0/okio-1.6.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/squareup/okio/okio/1.6.0/okio-1.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/squareup/okio/okio/1.6.0/okio-1.6.0.jar"}]},"tags":["api"]},{"group":"org.apache.commons","name":"commons-digester3","version":"3.2","description":"\n The Apache Commons Digester package lets you configure an XML to Java\n object mapping module which triggers certain actions called rules whenever\n a particular pattern of nested XML elements is recognized.\n ","scope":"required","purl":"pkg:maven/org.apache.commons/commons-digester3@3.2?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/digester/tags/DIGESTER3_3_2_RC2"}],"type":"framework","bom-ref":"pkg:maven/org.apache.commons/commons-digester3@3.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/commons/commons-digester3/3.2/commons-digester3-3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/commons/commons-digester3/3.2/commons-digester3-3.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/commons/commons-digester3/3.2/commons-digester3-3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/commons/commons-digester3/3.2/commons-digester3-3.2.jar"}]},"tags":["framework","xml"]},{"group":"cglib","name":"cglib","version":"2.2.2","description":"Code generation library","scope":"required","purl":"pkg:maven/cglib/cglib@2.2.2?type=jar","externalReferences":[{"type":"vcs","url":"http://cglib.cvs.sourceforge.net/cglib"}],"type":"library","bom-ref":"pkg:maven/cglib/cglib@2.2.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/cglib/cglib/2.2.2/cglib-2.2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/cglib/cglib/2.2.2/cglib-2.2.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/cglib/cglib/2.2.2/cglib-2.2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/cglib/cglib/2.2.2/cglib-2.2.2.jar"}]}},{"publisher":"ObjectWeb","group":"asm","name":"asm","version":"3.3.1","description":"A very small and fast Java bytecode manipulation framework","scope":"required","purl":"pkg:maven/asm/asm@3.3.1?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.forge.objectweb.org/cgi-bin/viewcvs.cgi/asm/trunk/"}],"type":"framework","bom-ref":"pkg:maven/asm/asm@3.3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/asm/asm/3.3.1/asm-3.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/asm/asm/3.3.1/asm-3.3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/asm/asm/3.3.1/asm-3.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/asm/asm/3.3.1/asm-3.3.1.jar"}]},"tags":["bytecode","framework"]},{"group":"org.jolokia","name":"jolokia-core","version":"1.6.0","description":"jar file containing servlet and helper classes","scope":"required","purl":"pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar","type":"library","bom-ref":"pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jolokia/jolokia-core/1.6.0/jolokia-core-1.6.0.jar"}]},"tags":["network"]},{"group":"com.googlecode.json-simple","name":"json-simple","version":"1.1.1","description":"A simple Java toolkit for JSON","scope":"required","purl":"pkg:maven/com.googlecode.json-simple/json-simple@1.1.1?type=jar","externalReferences":[{"type":"vcs","url":"http://json-simple.googlecode.com/svn/trunk/"}],"type":"library","bom-ref":"pkg:maven/com.googlecode.json-simple/json-simple@1.1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/googlecode/json-simple/json-simple/1.1.1/json-simple-1.1.1.jar"}]}},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-actuator","version":"1.5.1.RELEASE","description":"Starter for using Spring Boot's Actuator which provides production\n\t\tready features to help you monitor and manage your application","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-actuator@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-actuator@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-actuator/1.5.1.RELEASE/spring-boot-starter-actuator-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-actuator/1.5.1.RELEASE/spring-boot-starter-actuator-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-actuator/1.5.1.RELEASE/spring-boot-starter-actuator-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-actuator/1.5.1.RELEASE/spring-boot-starter-actuator-1.5.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-actuator","version":"1.5.1.RELEASE","description":"Spring Boot Actuator","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/spring-projects/spring-boot"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-actuator/1.5.1.RELEASE/spring-boot-actuator-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-actuator/1.5.1.RELEASE/spring-boot-actuator-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-actuator/1.5.1.RELEASE/spring-boot-actuator-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-actuator/1.5.1.RELEASE/spring-boot-actuator-1.5.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.cloud","name":"spring-cloud-starter-netflix-eureka-client","version":"1.4.0.RELEASE","description":"Spring Cloud Starter Netflix Eureka Client","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-eureka-client/1.4.0.RELEASE/spring-cloud-starter-netflix-eureka-client-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-eureka-client/1.4.0.RELEASE/spring-cloud-starter-netflix-eureka-client-1.4.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-eureka-client/1.4.0.RELEASE/spring-cloud-starter-netflix-eureka-client-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-eureka-client/1.4.0.RELEASE/spring-cloud-starter-netflix-eureka-client-1.4.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.cloud","name":"spring-cloud-starter","version":"1.1.3.RELEASE","description":"Spring Cloud Starter","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-starter@1.1.3.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-commons"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-starter@1.1.3.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter/1.1.3.RELEASE/spring-cloud-starter-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter/1.1.3.RELEASE/spring-cloud-starter-1.1.3.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter/1.1.3.RELEASE/spring-cloud-starter-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter/1.1.3.RELEASE/spring-cloud-starter-1.1.3.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"org.springframework.cloud","name":"spring-cloud-context","version":"1.1.3.RELEASE","description":"Spring Cloud Context","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-context@1.1.3.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-commons"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-context@1.1.3.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-context/1.1.3.RELEASE/spring-cloud-context-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-context/1.1.3.RELEASE/spring-cloud-context-1.1.3.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-context/1.1.3.RELEASE/spring-cloud-context-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-context/1.1.3.RELEASE/spring-cloud-context-1.1.3.RELEASE.jar"}]},"tags":["cloud","framework"]},{"publisher":"spring.io","group":"org.springframework.security","name":"spring-security-crypto","version":"4.2.1.RELEASE","description":"spring-security-crypto","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-crypto/4.2.1.RELEASE/spring-security-crypto-4.2.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-crypto/4.2.1.RELEASE/spring-security-crypto-4.2.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-crypto/4.2.1.RELEASE/spring-security-crypto-4.2.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-crypto/4.2.1.RELEASE/spring-security-crypto-4.2.1.RELEASE.jar"}]},"tags":["framework"]},{"group":"org.springframework.cloud","name":"spring-cloud-commons","version":"1.1.3.RELEASE","description":"Spring Cloud Commons","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-commons@1.1.3.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-commons"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-commons@1.1.3.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-commons/1.1.3.RELEASE/spring-cloud-commons-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-commons/1.1.3.RELEASE/spring-cloud-commons-1.1.3.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-commons/1.1.3.RELEASE/spring-cloud-commons-1.1.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-commons/1.1.3.RELEASE/spring-cloud-commons-1.1.3.RELEASE.jar"}]},"tags":["cloud","framework"]},{"publisher":"SpringSource","group":"org.springframework.security","name":"spring-security-rsa","version":"1.0.3.RELEASE","description":"Spring Security RSA is a small utility library for RSA ciphers.\n\tIt belongs to the family of Spring Security crypto libraries that handle encoding and decoding text as\n\ta general, useful thing to be able to do.","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/spring-projects/spring-security-rsa"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-rsa/1.0.3.RELEASE/spring-security-rsa-1.0.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-rsa/1.0.3.RELEASE/spring-security-rsa-1.0.3.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-rsa/1.0.3.RELEASE/spring-security-rsa-1.0.3.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-rsa/1.0.3.RELEASE/spring-security-rsa-1.0.3.RELEASE.jar"}]},"tags":["crypto","framework","security"]},{"group":"org.bouncycastle","name":"bcpkix-jdk15on","version":"1.55","description":"The Bouncy Castle Java APIs for CMS, PKCS, EAC, TSP, CMP, CRMF, OCSP, and certificate generation. This jar contains APIs for JDK 1.5 to JDK 1.8. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs.","scope":"required","purl":"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/bcgit/bc-java"}],"type":"framework","bom-ref":"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/bouncycastle/bcpkix-jdk15on/1.55/bcpkix-jdk15on-1.55.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/bouncycastle/bcpkix-jdk15on/1.55/bcpkix-jdk15on-1.55.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/bouncycastle/bcpkix-jdk15on/1.55/bcpkix-jdk15on-1.55.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/bouncycastle/bcpkix-jdk15on/1.55/bcpkix-jdk15on-1.55.jar"}]},"tags":["certificate","framework"]},{"group":"org.bouncycastle","name":"bcprov-jdk15on","version":"1.55","description":"The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.","scope":"required","purl":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/bcgit/bc-java"}],"type":"framework","bom-ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar"}]},"tags":["api","crypto","framework","jce"]},{"group":"org.springframework.cloud","name":"spring-cloud-netflix-core","version":"1.2.0.RELEASE","description":"Spring Cloud Netflix Core","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-netflix-core@1.2.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-netflix"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-netflix-core@1.2.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-netflix-core/1.2.0.RELEASE/spring-cloud-netflix-core-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-netflix-core/1.2.0.RELEASE/spring-cloud-netflix-core-1.2.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-netflix-core/1.2.0.RELEASE/spring-cloud-netflix-core-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-netflix-core/1.2.0.RELEASE/spring-cloud-netflix-core-1.2.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"org.springframework.cloud","name":"spring-cloud-netflix-eureka-client","version":"1.2.0.RELEASE","description":"Spring Cloud Netflix Eureka Client","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-netflix-eureka-client@1.2.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-cloud/spring-cloud-netflix"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-netflix-eureka-client@1.2.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-netflix-eureka-client/1.2.0.RELEASE/spring-cloud-netflix-eureka-client-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-netflix-eureka-client/1.2.0.RELEASE/spring-cloud-netflix-eureka-client-1.2.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-netflix-eureka-client/1.2.0.RELEASE/spring-cloud-netflix-eureka-client-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-netflix-eureka-client/1.2.0.RELEASE/spring-cloud-netflix-eureka-client-1.2.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"com.netflix.eureka","name":"eureka-client","version":"1.4.11","description":"eureka-client","scope":"required","purl":"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/Netflix/eureka.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/eureka/eureka-client/1.4.11/eureka-client-1.4.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/eureka/eureka-client/1.4.11/eureka-client-1.4.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/eureka/eureka-client/1.4.11/eureka-client-1.4.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/eureka/eureka-client/1.4.11/eureka-client-1.4.11.jar"}]},"tags":["cloud","registry","xml"]},{"group":"org.codehaus.jettison","name":"jettison","version":"1.3.7","description":"A StAX implementation for JSON.","scope":"required","purl":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","externalReferences":[{"type":"vcs","url":"scm:svn:https://svn.codehaus.org/jettison/tags/jettison-1.3.7"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/jettison/jettison/1.3.7/jettison-1.3.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/jettison/jettison/1.3.7/jettison-1.3.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/jettison/jettison/1.3.7/jettison-1.3.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/jettison/jettison/1.3.7/jettison-1.3.7.jar"}]},"tags":["json"]},{"group":"stax","name":"stax-api","version":"1.0.1","description":"StAX API is the standard java XML processing API defined by JSR-173","scope":"required","purl":"pkg:maven/stax/stax-api@1.0.1?type=jar","type":"library","bom-ref":"pkg:maven/stax/stax-api@1.0.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/stax/stax-api/1.0.1/stax-api-1.0.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/stax/stax-api/1.0.1/stax-api-1.0.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/stax/stax-api/1.0.1/stax-api-1.0.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/stax/stax-api/1.0.1/stax-api-1.0.1.jar"}]},"tags":["api","xml"]},{"group":"com.netflix.netflix-commons","name":"netflix-eventbus","version":"0.3.0","description":"netflix-eventbus","scope":"required","purl":"pkg:maven/com.netflix.netflix-commons/netflix-eventbus@0.3.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/netflix-commons.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.netflix-commons/netflix-eventbus@0.3.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-eventbus/0.3.0/netflix-eventbus-0.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-eventbus/0.3.0/netflix-eventbus-0.3.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-eventbus/0.3.0/netflix-eventbus-0.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-eventbus/0.3.0/netflix-eventbus-0.3.0.jar"}]}},{"group":"com.netflix.netflix-commons","name":"netflix-infix","version":"0.3.0","description":"netflix-infix","scope":"required","purl":"pkg:maven/com.netflix.netflix-commons/netflix-infix@0.3.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/netflix-commons.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.netflix-commons/netflix-infix@0.3.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-infix/0.3.0/netflix-infix-0.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-infix/0.3.0/netflix-infix-0.3.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-infix/0.3.0/netflix-infix-0.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-infix/0.3.0/netflix-infix-0.3.0.jar"}]}},{"group":"commons-jxpath","name":"commons-jxpath","version":"1.3","description":"A Java-based implementation of XPath 1.0 that, in addition to XML processing, can inspect/modify Java object graphs (the library's explicit purpose) and even mixed Java/XML structures.","scope":"required","purl":"pkg:maven/commons-jxpath/commons-jxpath@1.3?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/commons/proper/jxpath/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-jxpath/commons-jxpath@1.3?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-jxpath/commons-jxpath/1.3/commons-jxpath-1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-jxpath/commons-jxpath/1.3/commons-jxpath-1.3.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-jxpath/commons-jxpath/1.3/commons-jxpath-1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-jxpath/commons-jxpath/1.3/commons-jxpath-1.3.jar"}]},"tags":["xml"]},{"publisher":"Joda.org","group":"joda-time","name":"joda-time","version":"2.9.7","description":"Date and time library to replace JDK date handling","scope":"required","purl":"pkg:maven/joda-time/joda-time@2.9.7?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/JodaOrg/joda-time"}],"type":"library","bom-ref":"pkg:maven/joda-time/joda-time@2.9.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/joda-time/joda-time/2.9.7/joda-time-2.9.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/joda-time/joda-time/2.9.7/joda-time-2.9.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/joda-time/joda-time/2.9.7/joda-time-2.9.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/joda-time/joda-time/2.9.7/joda-time-2.9.7.jar"}]}},{"group":"org.antlr","name":"antlr-runtime","version":"3.4","description":"A framework for constructing recognizers, compilers, and translators from grammatical descriptions containing Java, C#, C++, or Python actions.","scope":"required","purl":"pkg:maven/org.antlr/antlr-runtime@3.4?type=jar","externalReferences":[{"type":"vcs","url":"http://fisheye2.cenqua.com/browse/antlr"}],"type":"framework","bom-ref":"pkg:maven/org.antlr/antlr-runtime@3.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/antlr/antlr-runtime/3.4/antlr-runtime-3.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/antlr/antlr-runtime/3.4/antlr-runtime-3.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/antlr/antlr-runtime/3.4/antlr-runtime-3.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/antlr/antlr-runtime/3.4/antlr-runtime-3.4.jar"}]},"tags":["framework"]},{"group":"org.antlr","name":"stringtemplate","version":"3.2.1","description":"StringTemplate is a java template engine for generating source code,\r\nweb pages, emails, or any other formatted text output.\r\n\r\nStringTemplate is particularly good at multi-targeted code generators,\r\nmultiple site skins, and internationalization/localization. \r\n\r\nIt evolved over years of effort developing jGuru.com. \r\n\r\nStringTemplate also generates the stringtemplate website: http://www.stringtemplate.org\r\nand powers the ANTLR v3 code generator. Its distinguishing characteristic \r\nis that unlike other engines, it strictly enforces model-view separation.\r\n\r\nStrict separation makes websites and code generators more flexible\r\nand maintainable; it also provides an excellent defense against malicious\r\ntemplate authors.\r\n\r\nThere are currently about 600 StringTemplate source downloads a month.\r\n ","scope":"required","purl":"pkg:maven/org.antlr/stringtemplate@3.2.1?type=jar","externalReferences":[{"type":"vcs","url":"http://fisheye2.cenqua.com/browse/stringtemplate"}],"type":"library","bom-ref":"pkg:maven/org.antlr/stringtemplate@3.2.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/antlr/stringtemplate/3.2.1/stringtemplate-3.2.1.jar"}]},"tags":["template"]},{"group":"antlr","name":"antlr","version":"2.7.7","description":"\n A framework for constructing recognizers, compilers,\n and translators from grammatical descriptions containing\n Java, C#, C++, or Python actions.\n ","scope":"required","purl":"pkg:maven/antlr/antlr@2.7.7?type=jar","type":"framework","bom-ref":"pkg:maven/antlr/antlr@2.7.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/antlr/antlr/2.7.7/antlr-2.7.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/antlr/antlr/2.7.7/antlr-2.7.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/antlr/antlr/2.7.7/antlr-2.7.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/antlr/antlr/2.7.7/antlr-2.7.7.jar"}]},"tags":["framework"]},{"group":"com.google.code.gson","name":"gson","version":"2.8.0","description":"Gson JSON library","scope":"required","purl":"pkg:maven/com.google.code.gson/gson@2.8.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/google/gson/"}],"type":"library","bom-ref":"pkg:maven/com.google.code.gson/gson@2.8.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/code/gson/gson/2.8.0/gson-2.8.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/code/gson/gson/2.8.0/gson-2.8.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/code/gson/gson/2.8.0/gson-2.8.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/code/gson/gson/2.8.0/gson-2.8.0.jar"}]},"tags":["json"]},{"group":"org.apache.commons","name":"commons-math","version":"2.2","description":"The Math project is a library of lightweight, self-contained mathematics and statistics components addressing the most common practical problems not immediately available in the Java programming language or commons-lang.","scope":"required","purl":"pkg:maven/org.apache.commons/commons-math@2.2?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/math/trunk"}],"type":"framework","bom-ref":"pkg:maven/org.apache.commons/commons-math@2.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/commons/commons-math/2.2/commons-math-2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/commons/commons-math/2.2/commons-math-2.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/commons/commons-math/2.2/commons-math-2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/commons/commons-math/2.2/commons-math-2.2.jar"}]},"tags":["framework"]},{"group":"com.netflix.archaius","name":"archaius-core","version":"0.7.4","description":"archaius-core","scope":"required","purl":"pkg:maven/com.netflix.archaius/archaius-core@0.7.4?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/archaius.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.archaius/archaius-core@0.7.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/archaius/archaius-core/0.7.4/archaius-core-0.7.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/archaius/archaius-core/0.7.4/archaius-core-0.7.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/archaius/archaius-core/0.7.4/archaius-core-0.7.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/archaius/archaius-core/0.7.4/archaius-core-0.7.4.jar"}]}},{"publisher":"Sun Microsystems, Inc","group":"javax.ws.rs","name":"jsr311-api","version":"1.1.1","scope":"required","purl":"pkg:maven/javax.ws.rs/jsr311-api@1.1.1?type=jar","type":"library","bom-ref":"pkg:maven/javax.ws.rs/jsr311-api@1.1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar"}]},"tags":["matrix"]},{"group":"com.netflix.servo","name":"servo-core","version":"0.10.1","description":"servo-core","scope":"required","purl":"pkg:maven/com.netflix.servo/servo-core@0.10.1?type=jar","externalReferences":[{"type":"vcs","url":"scm:https://github.com/Netflix/servo.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.servo/servo-core@0.10.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/servo/servo-core/0.10.1/servo-core-0.10.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/servo/servo-core/0.10.1/servo-core-0.10.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/servo/servo-core/0.10.1/servo-core-0.10.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/servo/servo-core/0.10.1/servo-core-0.10.1.jar"}]},"tags":["registry"]},{"group":"com.netflix.servo","name":"servo-internal","version":"0.10.1","description":"servo-internal","scope":"required","purl":"pkg:maven/com.netflix.servo/servo-internal@0.10.1?type=jar","externalReferences":[{"type":"vcs","url":"scm:https://github.com/Netflix/servo.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.servo/servo-internal@0.10.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/servo/servo-internal/0.10.1/servo-internal-0.10.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/servo/servo-internal/0.10.1/servo-internal-0.10.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/servo/servo-internal/0.10.1/servo-internal-0.10.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/servo/servo-internal/0.10.1/servo-internal-0.10.1.jar"}]}},{"publisher":"Oracle Corporation","group":"com.sun.jersey","name":"jersey-core","version":"1.19.1","description":"\n Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)\n production quality Reference Implementation for building\n RESTful Web services.\n ","scope":"required","purl":"pkg:maven/com.sun.jersey/jersey-core@1.19.1?type=jar","externalReferences":[{"type":"vcs","url":"http://java.net/projects/jersey/sources/svn/show/tags/1.19.1"}],"type":"framework","bom-ref":"pkg:maven/com.sun.jersey/jersey-core@1.19.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/jersey-core/1.19.1/jersey-core-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/jersey-core/1.19.1/jersey-core-1.19.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/jersey-core/1.19.1/jersey-core-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/jersey-core/1.19.1/jersey-core-1.19.1.jar"}]},"tags":["framework","web"]},{"publisher":"Oracle Corporation","group":"com.sun.jersey","name":"jersey-client","version":"1.19.1","description":"\n Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)\n production quality Reference Implementation for building\n RESTful Web services.\n ","scope":"required","purl":"pkg:maven/com.sun.jersey/jersey-client@1.19.1?type=jar","externalReferences":[{"type":"vcs","url":"http://java.net/projects/jersey/sources/svn/show/tags/1.19.1"}],"type":"framework","bom-ref":"pkg:maven/com.sun.jersey/jersey-client@1.19.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/jersey-client/1.19.1/jersey-client-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/jersey-client/1.19.1/jersey-client-1.19.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/jersey-client/1.19.1/jersey-client-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/jersey-client/1.19.1/jersey-client-1.19.1.jar"}]},"tags":["framework","web"]},{"group":"com.sun.jersey.contribs","name":"jersey-apache-client4","version":"1.19.1","description":"\n Projects that provide additional functionality to jersey, like integration\n with other projects/frameworks.\n ","scope":"required","purl":"pkg:maven/com.sun.jersey.contribs/jersey-apache-client4@1.19.1?type=jar","type":"framework","bom-ref":"pkg:maven/com.sun.jersey.contribs/jersey-apache-client4@1.19.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/contribs/jersey-apache-client4/1.19.1/jersey-apache-client4-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/sun/jersey/contribs/jersey-apache-client4/1.19.1/jersey-apache-client4-1.19.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/contribs/jersey-apache-client4/1.19.1/jersey-apache-client4-1.19.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/sun/jersey/contribs/jersey-apache-client4/1.19.1/jersey-apache-client4-1.19.1.jar"}]},"tags":["framework"]},{"publisher":"Google, Inc.","group":"com.google.inject","name":"guice","version":"4.0","description":"\n Guice is a lightweight dependency injection framework for Java 6 and above\n ","scope":"required","purl":"pkg:maven/com.google.inject/guice@4.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/google/guice"}],"type":"framework","bom-ref":"pkg:maven/com.google.inject/guice@4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/guice/4.0/guice-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/guice/4.0/guice-4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/guice/4.0/guice-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/guice/4.0/guice-4.0.jar"}]},"tags":["framework","injection"]},{"group":"javax.inject","name":"javax.inject","version":"1","description":"The javax.inject API","scope":"required","purl":"pkg:maven/javax.inject/javax.inject@1?type=jar","externalReferences":[{"type":"vcs","url":"http://code.google.com/p/atinject/source/checkout"}],"type":"library","bom-ref":"pkg:maven/javax.inject/javax.inject@1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/inject/javax.inject/1/javax.inject-1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/inject/javax.inject/1/javax.inject-1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/inject/javax.inject/1/javax.inject-1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/inject/javax.inject/1/javax.inject-1.jar"}]}},{"group":"com.netflix.governator","name":"governator-api","version":"1.12.10","description":"governator-api","scope":"required","purl":"pkg:maven/com.netflix.governator/governator-api@1.12.10?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/governator.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.governator/governator-api@1.12.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator-api/1.12.10/governator-api-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator-api/1.12.10/governator-api-1.12.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator-api/1.12.10/governator-api-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator-api/1.12.10/governator-api-1.12.10.jar"}]}},{"group":"com.netflix.eureka","name":"eureka-core","version":"1.4.11","description":"eureka-core","scope":"required","purl":"pkg:maven/com.netflix.eureka/eureka-core@1.4.11?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/Netflix/eureka.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.eureka/eureka-core@1.4.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/eureka/eureka-core/1.4.11/eureka-core-1.4.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/eureka/eureka-core/1.4.11/eureka-core-1.4.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/eureka/eureka-core/1.4.11/eureka-core-1.4.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/eureka/eureka-core/1.4.11/eureka-core-1.4.11.jar"}]},"tags":["network","registry"]},{"group":"com.netflix.governator","name":"governator","version":"1.12.10","description":"governator","scope":"required","purl":"pkg:maven/com.netflix.governator/governator@1.12.10?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/governator.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.governator/governator@1.12.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator/1.12.10/governator-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator/1.12.10/governator-1.12.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator/1.12.10/governator-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator/1.12.10/governator-1.12.10.jar"}]},"tags":["driver","framework"]},{"group":"com.netflix.governator","name":"governator-core","version":"1.12.10","description":"governator-core","scope":"required","purl":"pkg:maven/com.netflix.governator/governator-core@1.12.10?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/governator.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.governator/governator-core@1.12.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator-core/1.12.10/governator-core-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/governator/governator-core/1.12.10/governator-core-1.12.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator-core/1.12.10/governator-core-1.12.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/governator/governator-core/1.12.10/governator-core-1.12.10.jar"}]}},{"group":"com.google.inject.extensions","name":"guice-multibindings","version":"4.0","scope":"required","purl":"pkg:maven/com.google.inject.extensions/guice-multibindings@4.0?type=jar","type":"library","bom-ref":"pkg:maven/com.google.inject.extensions/guice-multibindings@4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-multibindings/4.0/guice-multibindings-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-multibindings/4.0/guice-multibindings-4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-multibindings/4.0/guice-multibindings-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-multibindings/4.0/guice-multibindings-4.0.jar"}]}},{"group":"com.google.inject.extensions","name":"guice-grapher","version":"4.0","scope":"required","purl":"pkg:maven/com.google.inject.extensions/guice-grapher@4.0?type=jar","type":"library","bom-ref":"pkg:maven/com.google.inject.extensions/guice-grapher@4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-grapher/4.0/guice-grapher-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-grapher/4.0/guice-grapher-4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-grapher/4.0/guice-grapher-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-grapher/4.0/guice-grapher-4.0.jar"}]}},{"group":"com.google.inject.extensions","name":"guice-assistedinject","version":"4.0","scope":"required","purl":"pkg:maven/com.google.inject.extensions/guice-assistedinject@4.0?type=jar","type":"library","bom-ref":"pkg:maven/com.google.inject.extensions/guice-assistedinject@4.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-assistedinject/4.0/guice-assistedinject-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/google/inject/extensions/guice-assistedinject/4.0/guice-assistedinject-4.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-assistedinject/4.0/guice-assistedinject-4.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/google/inject/extensions/guice-assistedinject/4.0/guice-assistedinject-4.0.jar"}]}},{"publisher":"ObjectWeb","group":"org.ow2.asm","name":"asm","version":"5.0.4","description":"A very small and fast Java bytecode manipulation framework","scope":"required","purl":"pkg:maven/org.ow2.asm/asm@5.0.4?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.forge.objectweb.org/cgi-bin/viewcvs.cgi/asm/trunk/"}],"type":"framework","bom-ref":"pkg:maven/org.ow2.asm/asm@5.0.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/ow2/asm/asm/5.0.4/asm-5.0.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/ow2/asm/asm/5.0.4/asm-5.0.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/ow2/asm/asm/5.0.4/asm-5.0.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/ow2/asm/asm/5.0.4/asm-5.0.4.jar"}]},"tags":["bytecode","framework"]},{"publisher":"Codehaus","group":"org.codehaus.woodstox","name":"woodstox-core-asl","version":"4.4.1","description":"Woodstox is a high-performance XML processor that\nimplements Stax (JSR-173) and SAX2 APIs","scope":"required","purl":"pkg:maven/org.codehaus.woodstox/woodstox-core-asl@4.4.1?type=jar","externalReferences":[{"type":"vcs","url":"http://xircles.codehaus.org/projects/woodstox/repos/primary/repo"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.woodstox/woodstox-core-asl@4.4.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/woodstox/woodstox-core-asl/4.4.1/woodstox-core-asl-4.4.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/woodstox/woodstox-core-asl/4.4.1/woodstox-core-asl-4.4.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/woodstox/woodstox-core-asl/4.4.1/woodstox-core-asl-4.4.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/woodstox/woodstox-core-asl/4.4.1/woodstox-core-asl-4.4.1.jar"}]},"tags":["xml"]},{"group":"javax.xml.stream","name":"stax-api","version":"1.0-2","description":"\n StAX is a standard XML processing API that allows you to stream XML data from and to your application.\n ","scope":"required","purl":"pkg:maven/javax.xml.stream/stax-api@1.0-2?type=jar","type":"library","bom-ref":"pkg:maven/javax.xml.stream/stax-api@1.0-2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/xml/stream/stax-api/1.0-2/stax-api-1.0-2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/javax/xml/stream/stax-api/1.0-2/stax-api-1.0-2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/xml/stream/stax-api/1.0-2/stax-api-1.0-2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/javax/xml/stream/stax-api/1.0-2/stax-api-1.0-2.jar"}]},"tags":["api","stream","xml"]},{"publisher":"fasterxml.com","group":"org.codehaus.woodstox","name":"stax2-api","version":"3.1.4","description":"tax2 API is an extension to basic Stax 1.0 API that adds significant new functionality, such as full-featured bi-direction validation interface and high-performance Typed Access API.\n ","scope":"required","purl":"pkg:maven/org.codehaus.woodstox/stax2-api@3.1.4?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/FasterXML/stax2-api"}],"type":"library","bom-ref":"pkg:maven/org.codehaus.woodstox/stax2-api@3.1.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/codehaus/woodstox/stax2-api/3.1.4/stax2-api-3.1.4.jar"}]},"tags":["api","validation"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.cloud","name":"spring-cloud-starter-netflix-archaius","version":"1.4.0.RELEASE","description":"Spring Cloud Starter Netflix Archaius","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-archaius@1.4.0.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-archaius@1.4.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-archaius/1.4.0.RELEASE/spring-cloud-starter-netflix-archaius-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-archaius/1.4.0.RELEASE/spring-cloud-starter-netflix-archaius-1.4.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-archaius/1.4.0.RELEASE/spring-cloud-starter-netflix-archaius-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-archaius/1.4.0.RELEASE/spring-cloud-starter-netflix-archaius-1.4.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"commons-configuration","name":"commons-configuration","version":"1.8","description":"\r\n Tools to assist in the reading of configuration/preferences files in\r\n various formats\r\n ","scope":"required","purl":"pkg:maven/commons-configuration/commons-configuration@1.8?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/configuration/trunk"}],"type":"library","bom-ref":"pkg:maven/commons-configuration/commons-configuration@1.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-configuration/commons-configuration/1.8/commons-configuration-1.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-configuration/commons-configuration/1.8/commons-configuration-1.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-configuration/commons-configuration/1.8/commons-configuration-1.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-configuration/commons-configuration/1.8/commons-configuration-1.8.jar"}]},"tags":["tools"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.cloud","name":"spring-cloud-starter-netflix-ribbon","version":"1.4.0.RELEASE","description":"Spring Cloud Starter Netflix Ribbon","scope":"required","purl":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-ribbon@1.4.0.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-ribbon@1.4.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-ribbon/1.4.0.RELEASE/spring-cloud-starter-netflix-ribbon-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/cloud/spring-cloud-starter-netflix-ribbon/1.4.0.RELEASE/spring-cloud-starter-netflix-ribbon-1.4.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-ribbon/1.4.0.RELEASE/spring-cloud-starter-netflix-ribbon-1.4.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/cloud/spring-cloud-starter-netflix-ribbon/1.4.0.RELEASE/spring-cloud-starter-netflix-ribbon-1.4.0.RELEASE.jar"}]},"tags":["cloud","framework"]},{"group":"com.netflix.ribbon","name":"ribbon","version":"2.2.0","description":"ribbon","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon/2.2.0/ribbon-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon/2.2.0/ribbon-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon/2.2.0/ribbon-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon/2.2.0/ribbon-2.2.0.jar"}]},"tags":["matrix"]},{"group":"com.netflix.ribbon","name":"ribbon-transport","version":"2.2.0","description":"ribbon-transport","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-transport@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-transport@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-transport/2.2.0/ribbon-transport-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-transport/2.2.0/ribbon-transport-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-transport/2.2.0/ribbon-transport-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-transport/2.2.0/ribbon-transport-2.2.0.jar"}]}},{"group":"io.reactivex","name":"rxnetty-contexts","version":"0.4.9","description":"rxnetty-contexts","scope":"required","purl":"pkg:maven/io.reactivex/rxnetty-contexts@0.4.9?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:ReactiveX/RxNetty.git"}],"type":"framework","bom-ref":"pkg:maven/io.reactivex/rxnetty-contexts@0.4.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty-contexts/0.4.9/rxnetty-contexts-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty-contexts/0.4.9/rxnetty-contexts-0.4.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty-contexts/0.4.9/rxnetty-contexts-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty-contexts/0.4.9/rxnetty-contexts-0.4.9.jar"}]},"tags":["framework"]},{"group":"io.reactivex","name":"rxnetty-servo","version":"0.4.9","description":"rxnetty-servo","scope":"required","purl":"pkg:maven/io.reactivex/rxnetty-servo@0.4.9?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:ReactiveX/RxNetty.git"}],"type":"framework","bom-ref":"pkg:maven/io.reactivex/rxnetty-servo@0.4.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty-servo/0.4.9/rxnetty-servo-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty-servo/0.4.9/rxnetty-servo-0.4.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty-servo/0.4.9/rxnetty-servo-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty-servo/0.4.9/rxnetty-servo-0.4.9.jar"}]},"tags":["framework"]},{"group":"com.netflix.hystrix","name":"hystrix-core","version":"1.5.5","description":"hystrix-core","scope":"required","purl":"pkg:maven/com.netflix.hystrix/hystrix-core@1.5.5?type=jar","type":"library","bom-ref":"pkg:maven/com.netflix.hystrix/hystrix-core@1.5.5?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/hystrix/hystrix-core/1.5.5/hystrix-core-1.5.5.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/hystrix/hystrix-core/1.5.5/hystrix-core-1.5.5.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/hystrix/hystrix-core/1.5.5/hystrix-core-1.5.5.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/hystrix/hystrix-core/1.5.5/hystrix-core-1.5.5.jar"}]},"tags":["stripe"]},{"group":"org.hdrhistogram","name":"HdrHistogram","version":"2.1.9","description":"\n HdrHistogram supports the recording and analyzing sampled data value\n counts across a configurable integer value range with configurable value\n precision within the range. Value precision is expressed as the number of\n significant digits in the value recording, and provides control over value\n quantization behavior across the value range and the subsequent value\n resolution at any given level.\n ","scope":"required","purl":"pkg:maven/org.hdrhistogram/HdrHistogram@2.1.9?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git://github.com/HdrHistogram/HdrHistogram.git"}],"type":"library","bom-ref":"pkg:maven/org.hdrhistogram/HdrHistogram@2.1.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hdrhistogram/HdrHistogram/2.1.9/HdrHistogram-2.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hdrhistogram/HdrHistogram/2.1.9/HdrHistogram-2.1.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hdrhistogram/HdrHistogram/2.1.9/HdrHistogram-2.1.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hdrhistogram/HdrHistogram/2.1.9/HdrHistogram-2.1.9.jar"}]}},{"group":"io.reactivex","name":"rxnetty","version":"0.4.9","description":"rxnetty","scope":"required","purl":"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:ReactiveX/RxNetty.git"}],"type":"framework","bom-ref":"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty/0.4.9/rxnetty-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxnetty/0.4.9/rxnetty-0.4.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty/0.4.9/rxnetty-0.4.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxnetty/0.4.9/rxnetty-0.4.9.jar"}]},"tags":["framework"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-codec-http","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-codec-http/4.0.27.Final/netty-codec-http-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-codec-http/4.0.27.Final/netty-codec-http-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-codec-http/4.0.27.Final/netty-codec-http-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-codec-http/4.0.27.Final/netty-codec-http-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-codec","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-codec/4.0.27.Final/netty-codec-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-codec/4.0.27.Final/netty-codec-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-codec/4.0.27.Final/netty-codec-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-codec/4.0.27.Final/netty-codec-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-handler","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-handler/4.0.27.Final/netty-handler-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-handler/4.0.27.Final/netty-handler-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-handler/4.0.27.Final/netty-handler-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-handler/4.0.27.Final/netty-handler-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-transport-native-epoll","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-transport-native-epoll@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-transport-native-epoll@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-transport-native-epoll/4.0.27.Final/netty-transport-native-epoll-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-transport-native-epoll/4.0.27.Final/netty-transport-native-epoll-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-transport-native-epoll/4.0.27.Final/netty-transport-native-epoll-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-transport-native-epoll/4.0.27.Final/netty-transport-native-epoll-4.0.27.Final.jar"}]},"tags":["event-driven","framework","native","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-common","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-common/4.0.27.Final/netty-common-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-common/4.0.27.Final/netty-common-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-common/4.0.27.Final/netty-common-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-common/4.0.27.Final/netty-common-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-buffer","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-buffer@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-buffer@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-buffer/4.0.27.Final/netty-buffer-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-buffer/4.0.27.Final/netty-buffer-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-buffer/4.0.27.Final/netty-buffer-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-buffer/4.0.27.Final/netty-buffer-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"publisher":"The Netty Project","group":"io.netty","name":"netty-transport","version":"4.0.27.Final","description":"\n Netty is an asynchronous event-driven network application framework for\n rapid development of maintainable high performance protocol servers and\n clients.\n ","scope":"required","purl":"pkg:maven/io.netty/netty-transport@4.0.27.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netty/netty"}],"type":"framework","bom-ref":"pkg:maven/io.netty/netty-transport@4.0.27.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-transport/4.0.27.Final/netty-transport-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/netty/netty-transport/4.0.27.Final/netty-transport-4.0.27.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-transport/4.0.27.Final/netty-transport-4.0.27.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/netty/netty-transport/4.0.27.Final/netty-transport-4.0.27.Final.jar"}]},"tags":["event-driven","framework","performance"]},{"group":"com.netflix.ribbon","name":"ribbon-core","version":"2.2.0","description":"ribbon-core","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-core@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-core@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-core/2.2.0/ribbon-core-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-core/2.2.0/ribbon-core-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-core/2.2.0/ribbon-core-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-core/2.2.0/ribbon-core-2.2.0.jar"}]}},{"group":"com.netflix.ribbon","name":"ribbon-httpclient","version":"2.2.0","description":"ribbon-httpclient","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-httpclient@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-httpclient@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-httpclient/2.2.0/ribbon-httpclient-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-httpclient/2.2.0/ribbon-httpclient-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-httpclient/2.2.0/ribbon-httpclient-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-httpclient/2.2.0/ribbon-httpclient-2.2.0.jar"}]}},{"group":"com.netflix.netflix-commons","name":"netflix-commons-util","version":"0.1.1","description":"netflix-commons-util developed by Netflix","scope":"required","purl":"pkg:maven/com.netflix.netflix-commons/netflix-commons-util@0.1.1?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:Netflix/netflix-commons.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.netflix-commons/netflix-commons-util@0.1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-commons-util/0.1.1/netflix-commons-util-0.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-commons-util/0.1.1/netflix-commons-util-0.1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-commons-util/0.1.1/netflix-commons-util-0.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-commons-util/0.1.1/netflix-commons-util-0.1.1.jar"}]}},{"group":"com.netflix.ribbon","name":"ribbon-loadbalancer","version":"2.2.0","description":"ribbon-loadbalancer","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-loadbalancer@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-loadbalancer@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-loadbalancer/2.2.0/ribbon-loadbalancer-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-loadbalancer/2.2.0/ribbon-loadbalancer-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-loadbalancer/2.2.0/ribbon-loadbalancer-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-loadbalancer/2.2.0/ribbon-loadbalancer-2.2.0.jar"}]}},{"group":"com.netflix.netflix-commons","name":"netflix-statistics","version":"0.1.1","description":"netflix-statistics developed by Netflix","scope":"required","purl":"pkg:maven/com.netflix.netflix-commons/netflix-statistics@0.1.1?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:Netflix/netflix-commons.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.netflix-commons/netflix-statistics@0.1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-statistics/0.1.1/netflix-statistics-0.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/netflix-commons/netflix-statistics/0.1.1/netflix-statistics-0.1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-statistics/0.1.1/netflix-statistics-0.1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/netflix-commons/netflix-statistics/0.1.1/netflix-statistics-0.1.1.jar"}]}},{"group":"io.reactivex","name":"rxjava","version":"1.1.10","description":"rxjava","scope":"required","purl":"pkg:maven/io.reactivex/rxjava@1.1.10?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/ReactiveX/RxJava.git"}],"type":"framework","bom-ref":"pkg:maven/io.reactivex/rxjava@1.1.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxjava/1.1.10/rxjava-1.1.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/reactivex/rxjava/1.1.10/rxjava-1.1.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxjava/1.1.10/rxjava-1.1.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/reactivex/rxjava/1.1.10/rxjava-1.1.10.jar"}]},"tags":["framework"]},{"group":"com.netflix.ribbon","name":"ribbon-eureka","version":"2.2.0","description":"ribbon-eureka","scope":"required","purl":"pkg:maven/com.netflix.ribbon/ribbon-eureka@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git@github.com:Netflix/ribbon.git"}],"type":"library","bom-ref":"pkg:maven/com.netflix.ribbon/ribbon-eureka@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-eureka/2.2.0/ribbon-eureka-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/netflix/ribbon/ribbon-eureka/2.2.0/ribbon-eureka-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-eureka/2.2.0/ribbon-eureka-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/netflix/ribbon/ribbon-eureka/2.2.0/ribbon-eureka-2.2.0.jar"}]}},{"publisher":"FasterXML.com","group":"com.fasterxml.uuid","name":"java-uuid-generator","version":"3.1.4","description":"\nJava UUID Generator (JUG) is a Java library for generating\nUniversally Unique IDentifiers, UUIDs (see http://en.wikipedia.org/wiki/UUID).\nIt can be used either as a component in a bigger application, or as a standalone command line tool.\nJUG generates UUIDs according to the IETF UUID draft specification.\nJUG supports all 3 official UUID generation methods.\n","scope":"required","purl":"pkg:maven/com.fasterxml.uuid/java-uuid-generator@3.1.4?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:cowtowncoder/java-uuid-generator.git"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml.uuid/java-uuid-generator@3.1.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/uuid/java-uuid-generator/3.1.4/java-uuid-generator-3.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/uuid/java-uuid-generator/3.1.4/java-uuid-generator-3.1.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/uuid/java-uuid-generator/3.1.4/java-uuid-generator-3.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/uuid/java-uuid-generator/3.1.4/java-uuid-generator-3.1.4.jar"}]},"tags":["xml"]},{"publisher":"spring.io","group":"org.springframework.security","name":"spring-security-web","version":"4.2.12.RELEASE","description":"spring-security-web","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-web/4.2.12.RELEASE/spring-security-web-4.2.12.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-web/4.2.12.RELEASE/spring-security-web-4.2.12.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-web/4.2.12.RELEASE/spring-security-web-4.2.12.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-web/4.2.12.RELEASE/spring-security-web-4.2.12.RELEASE.jar"}]},"tags":["framework"]},{"group":"aopalliance","name":"aopalliance","version":"1.0","description":"AOP Alliance","scope":"required","purl":"pkg:maven/aopalliance/aopalliance@1.0?type=jar","type":"library","bom-ref":"pkg:maven/aopalliance/aopalliance@1.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/aopalliance/aopalliance/1.0/aopalliance-1.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/aopalliance/aopalliance/1.0/aopalliance-1.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/aopalliance/aopalliance/1.0/aopalliance-1.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/aopalliance/aopalliance/1.0/aopalliance-1.0.jar"}]}},{"publisher":"spring.io","group":"org.springframework.security","name":"spring-security-core","version":"4.2.1.RELEASE","description":"spring-security-core","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-core/4.2.1.RELEASE/spring-security-core-4.2.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-core/4.2.1.RELEASE/spring-security-core-4.2.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-core/4.2.1.RELEASE/spring-security-core-4.2.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-core/4.2.1.RELEASE/spring-security-core-4.2.1.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-beans","version":"4.3.6.RELEASE","description":"Spring Beans","scope":"required","purl":"pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-beans/4.3.6.RELEASE/spring-beans-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-beans/4.3.6.RELEASE/spring-beans-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-beans/4.3.6.RELEASE/spring-beans-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-beans/4.3.6.RELEASE/spring-beans-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-context","version":"4.3.6.RELEASE","description":"Spring Context","scope":"required","purl":"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-context/4.3.6.RELEASE/spring-context-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-context/4.3.6.RELEASE/spring-context-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-context/4.3.6.RELEASE/spring-context-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-context/4.3.6.RELEASE/spring-context-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-core","version":"4.3.6.RELEASE","description":"Spring Core","scope":"required","purl":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-core/4.3.6.RELEASE/spring-core-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-core/4.3.6.RELEASE/spring-core-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-core/4.3.6.RELEASE/spring-core-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-core/4.3.6.RELEASE/spring-core-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"spring.io","group":"org.springframework.security","name":"spring-security-config","version":"4.2.12.RELEASE","description":"spring-security-config","scope":"required","purl":"pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-config/4.2.12.RELEASE/spring-security-config-4.2.12.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/security/spring-security-config/4.2.12.RELEASE/spring-security-config-4.2.12.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-config/4.2.12.RELEASE/spring-security-config-4.2.12.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/security/spring-security-config/4.2.12.RELEASE/spring-security-config-4.2.12.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-aop","version":"4.3.6.RELEASE","description":"Spring AOP","scope":"required","purl":"pkg:maven/org.springframework/spring-aop@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-aop@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-aop/4.3.6.RELEASE/spring-aop-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-aop/4.3.6.RELEASE/spring-aop-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-aop/4.3.6.RELEASE/spring-aop-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-aop/4.3.6.RELEASE/spring-aop-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-security","version":"2.1.5.RELEASE","description":"Starter for using Spring Security","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-security@2.1.5.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-boot/spring-boot-starters/spring-boot-starter-security"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-security@2.1.5.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-security/2.1.5.RELEASE/spring-boot-starter-security-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-security/2.1.5.RELEASE/spring-boot-starter-security-2.1.5.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-security/2.1.5.RELEASE/spring-boot-starter-security-2.1.5.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-security/2.1.5.RELEASE/spring-boot-starter-security-2.1.5.RELEASE.jar"}]},"tags":["framework"]},{"group":"commons-net","name":"commons-net","version":"3.6","description":"\nApache Commons Net library contains a collection of network utilities and protocol implementations.\nSupported protocols include: Echo, Finger, FTP, NNTP, NTP, POP3(S), SMTP(S), Telnet, Whois\n ","scope":"required","purl":"pkg:maven/commons-net/commons-net@3.6?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/net/tags/NET_3_6"}],"type":"library","bom-ref":"pkg:maven/commons-net/commons-net@3.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-net/commons-net/3.6/commons-net-3.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-net/commons-net/3.6/commons-net-3.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-net/commons-net/3.6/commons-net-3.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-net/commons-net/3.6/commons-net-3.6.jar"}]}},{"publisher":"Apache Software Foundation","group":"commons-httpclient","name":"commons-httpclient","version":"3.1","description":"The HttpClient component supports the client-side of RFC 1945 (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework by which new request types (methods) or HTTP extensions can be created easily.","scope":"required","purl":"pkg:maven/commons-httpclient/commons-httpclient@3.1?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/jakarta/httpcomponents/oac.hc3x/trunk"}],"type":"framework","bom-ref":"pkg:maven/commons-httpclient/commons-httpclient@3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar"}]},"tags":["framework"]},{"group":"org.mybatis.spring.boot","name":"mybatis-spring-boot-starter","version":"1.3.2","description":"Spring Boot Support for MyBatis","scope":"required","purl":"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-starter@1.3.2?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/mybatis/spring-boot-starter/tree/master"}],"type":"framework","bom-ref":"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-starter@1.3.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/spring/boot/mybatis-spring-boot-starter/1.3.2/mybatis-spring-boot-starter-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/spring/boot/mybatis-spring-boot-starter/1.3.2/mybatis-spring-boot-starter-1.3.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/spring/boot/mybatis-spring-boot-starter/1.3.2/mybatis-spring-boot-starter-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/spring/boot/mybatis-spring-boot-starter/1.3.2/mybatis-spring-boot-starter-1.3.2.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.boot","name":"spring-boot-starter-jdbc","version":"1.5.1.RELEASE","description":"Starter for using JDBC with the Tomcat JDBC connection pool","scope":"required","purl":"pkg:maven/org.springframework.boot/spring-boot-starter-jdbc@1.5.1.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.boot/spring-boot-starter-jdbc@1.5.1.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-jdbc/1.5.1.RELEASE/spring-boot-starter-jdbc-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/boot/spring-boot-starter-jdbc/1.5.1.RELEASE/spring-boot-starter-jdbc-1.5.1.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-jdbc/1.5.1.RELEASE/spring-boot-starter-jdbc-1.5.1.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/boot/spring-boot-starter-jdbc/1.5.1.RELEASE/spring-boot-starter-jdbc-1.5.1.RELEASE.jar"}]},"tags":["framework","jdbc","tomcat"]},{"group":"org.apache.tomcat","name":"tomcat-jdbc","version":"8.5.11","description":"Tomcat JDBC Pool Package","scope":"required","purl":"pkg:maven/org.apache.tomcat/tomcat-jdbc@8.5.11?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat/tomcat-jdbc@8.5.11?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-jdbc/8.5.11/tomcat-jdbc-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-jdbc/8.5.11/tomcat-jdbc-8.5.11.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-jdbc/8.5.11/tomcat-jdbc-8.5.11.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-jdbc/8.5.11/tomcat-jdbc-8.5.11.jar"}]},"tags":["framework","jdbc","pool"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-jdbc","version":"4.3.6.RELEASE","description":"Spring JDBC","scope":"required","purl":"pkg:maven/org.springframework/spring-jdbc@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-jdbc@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-jdbc/4.3.6.RELEASE/spring-jdbc-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-jdbc/4.3.6.RELEASE/spring-jdbc-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-jdbc/4.3.6.RELEASE/spring-jdbc-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-jdbc/4.3.6.RELEASE/spring-jdbc-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-tx","version":"4.3.6.RELEASE","description":"Spring Transaction","scope":"required","purl":"pkg:maven/org.springframework/spring-tx@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-tx@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-tx/4.3.6.RELEASE/spring-tx-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-tx/4.3.6.RELEASE/spring-tx-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-tx/4.3.6.RELEASE/spring-tx-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-tx/4.3.6.RELEASE/spring-tx-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"group":"org.mybatis.spring.boot","name":"mybatis-spring-boot-autoconfigure","version":"1.3.2","description":"Spring Boot Support for MyBatis","scope":"required","purl":"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-autoconfigure@1.3.2?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/mybatis/spring-boot-starter/tree/master"}],"type":"framework","bom-ref":"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-autoconfigure@1.3.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/spring/boot/mybatis-spring-boot-autoconfigure/1.3.2/mybatis-spring-boot-autoconfigure-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/spring/boot/mybatis-spring-boot-autoconfigure/1.3.2/mybatis-spring-boot-autoconfigure-1.3.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/spring/boot/mybatis-spring-boot-autoconfigure/1.3.2/mybatis-spring-boot-autoconfigure-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/spring/boot/mybatis-spring-boot-autoconfigure/1.3.2/mybatis-spring-boot-autoconfigure-1.3.2.jar"}]},"tags":["framework"]},{"publisher":"MyBatis.org","group":"org.mybatis","name":"mybatis","version":"3.4.6","description":"\n The MyBatis SQL mapper framework makes it easier to use a relational database with object-oriented\n applications. MyBatis couples objects with stored procedures or SQL statements using a XML descriptor or\n annotations. Simplicity is the biggest advantage of the MyBatis data mapper over object relational mapping\n tools.\n ","scope":"required","purl":"pkg:maven/org.mybatis/mybatis@3.4.6?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/mybatis/mybatis-3"}],"type":"framework","bom-ref":"pkg:maven/org.mybatis/mybatis@3.4.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/mybatis/3.4.6/mybatis-3.4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/mybatis/3.4.6/mybatis-3.4.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/mybatis/3.4.6/mybatis-3.4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/mybatis/3.4.6/mybatis-3.4.6.jar"}]},"tags":["database","framework","sql","tools","xml"]},{"publisher":"MyBatis.org","group":"org.mybatis","name":"mybatis-spring","version":"1.3.2","description":"An easy-to-use Spring bridge for MyBatis sql mapping framework.","scope":"required","purl":"pkg:maven/org.mybatis/mybatis-spring@1.3.2?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/mybatis/spring"}],"type":"framework","bom-ref":"pkg:maven/org.mybatis/mybatis-spring@1.3.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/mybatis-spring/1.3.2/mybatis-spring-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mybatis/mybatis-spring/1.3.2/mybatis-spring-1.3.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/mybatis-spring/1.3.2/mybatis-spring-1.3.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mybatis/mybatis-spring/1.3.2/mybatis-spring-1.3.2.jar"}]},"tags":["framework","sql"]},{"publisher":"The Apache Software Foundation","group":"org.apache.velocity","name":"velocity","version":"1.7","description":"Apache Velocity is a general purpose template engine.","scope":"required","purl":"pkg:maven/org.apache.velocity/velocity@1.7?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/velocity/engine/trunk"}],"type":"framework","bom-ref":"pkg:maven/org.apache.velocity/velocity@1.7?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/velocity/velocity/1.7/velocity-1.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/velocity/velocity/1.7/velocity-1.7.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/velocity/velocity/1.7/velocity-1.7.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/velocity/velocity/1.7/velocity-1.7.jar"}]},"tags":["framework","template"]},{"publisher":"XStream","group":"com.thoughtworks.xstream","name":"xstream","version":"1.4.20","description":"\n XStream is a serialization library from Java objects to XML and back.\n ","scope":"required","purl":"pkg:maven/com.thoughtworks.xstream/xstream@1.4.20?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/x-stream/xstream"}],"type":"library","bom-ref":"pkg:maven/com.thoughtworks.xstream/xstream@1.4.20?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/thoughtworks/xstream/xstream/1.4.20/xstream-1.4.20.jar"}]},"tags":["serialization","xml"]},{"group":"io.github.x-stream","name":"mxparser","version":"1.2.2","description":"\n MXParser is a fork of xpp3_min 1.1.7 containing only the parser with merged changes of the Plexus fork.\n ","scope":"required","purl":"pkg:maven/io.github.x-stream/mxparser@1.2.2?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/x-stream/mxparser"}],"type":"library","bom-ref":"pkg:maven/io.github.x-stream/mxparser@1.2.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/github/x-stream/mxparser/1.2.2/mxparser-1.2.2.jar"}]},"tags":["parse"]},{"group":"xmlpull","name":"xmlpull","version":"1.1.3.1","scope":"required","purl":"pkg:maven/xmlpull/xmlpull@1.1.3.1?type=jar","type":"library","bom-ref":"pkg:maven/xmlpull/xmlpull@1.1.3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xmlpull/xmlpull/1.1.3.1/xmlpull-1.1.3.1.jar"}]},"tags":["xml"]},{"publisher":"Apache Software Foundation","group":"org.apache.poi","name":"poi","version":"3.10-FINAL","description":"Apache POI - Java API To Access Microsoft Format Files","scope":"required","purl":"pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi/3.10-FINAL/poi-3.10-FINAL.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi/3.10-FINAL/poi-3.10-FINAL.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi/3.10-FINAL/poi-3.10-FINAL.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi/3.10-FINAL/poi-3.10-FINAL.jar"}]},"tags":["api","framework"]},{"publisher":"Apache Software Foundation","group":"org.apache.poi","name":"poi-ooxml","version":"3.9","description":"Apache POI - Java API To Access Microsoft Format Files","scope":"required","purl":"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi-ooxml/3.9/poi-ooxml-3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi-ooxml/3.9/poi-ooxml-3.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi-ooxml/3.9/poi-ooxml-3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi-ooxml/3.9/poi-ooxml-3.9.jar"}]},"tags":["api","framework"]},{"publisher":"Apache Software Foundation","group":"org.apache.poi","name":"poi-ooxml-schemas","version":"3.9","description":"Apache POI - Java API To Access Microsoft Format Files","scope":"required","purl":"pkg:maven/org.apache.poi/poi-ooxml-schemas@3.9?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.poi/poi-ooxml-schemas@3.9?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi-ooxml-schemas/3.9/poi-ooxml-schemas-3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/poi/poi-ooxml-schemas/3.9/poi-ooxml-schemas-3.9.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi-ooxml-schemas/3.9/poi-ooxml-schemas-3.9.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/poi/poi-ooxml-schemas/3.9/poi-ooxml-schemas-3.9.jar"}]},"tags":["api","framework"]},{"publisher":"XmlBeans","group":"org.apache.xmlbeans","name":"xmlbeans","version":"2.3.0","description":"XmlBeans main jar","scope":"required","purl":"pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/repos/asf/xmlbeans/"}],"type":"framework","bom-ref":"pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/xmlbeans/xmlbeans/2.3.0/xmlbeans-2.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/xmlbeans/xmlbeans/2.3.0/xmlbeans-2.3.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/xmlbeans/xmlbeans/2.3.0/xmlbeans-2.3.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/xmlbeans/xmlbeans/2.3.0/xmlbeans-2.3.0.jar"}]},"tags":["framework"]},{"publisher":"MetaStuff Ltd.","group":"dom4j","name":"dom4j","version":"1.6.1","description":"dom4j: the flexible XML framework for Java","scope":"required","purl":"pkg:maven/dom4j/dom4j@1.6.1?type=jar","externalReferences":[{"type":"vcs","url":"http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/dom4j/dom4j/"}],"type":"framework","bom-ref":"pkg:maven/dom4j/dom4j@1.6.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/dom4j/dom4j/1.6.1/dom4j-1.6.1.jar"}]},"tags":["framework","xml"]},{"group":"com.monitorjbl","name":"xlsx-streamer","version":"2.0.0","description":"Streaming Excel reader","scope":"required","purl":"pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/monitorjbl/excel-streaming-reader.git"}],"type":"library","bom-ref":"pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/monitorjbl/xlsx-streamer/2.0.0/xlsx-streamer-2.0.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/monitorjbl/xlsx-streamer/2.0.0/xlsx-streamer-2.0.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/monitorjbl/xlsx-streamer/2.0.0/xlsx-streamer-2.0.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/monitorjbl/xlsx-streamer/2.0.0/xlsx-streamer-2.0.0.jar"}]},"tags":["xml"]},{"group":"com.rackspace.apache","name":"xerces2-xsd11","version":"2.11.1","description":"A processor for parsing, validating, serializing and manipulating XML, written in Java","scope":"required","purl":"pkg:maven/com.rackspace.apache/xerces2-xsd11@2.11.1?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/sharwell/xerces2-j/tree/rackspace-master-xsd11"}],"type":"library","bom-ref":"pkg:maven/com.rackspace.apache/xerces2-xsd11@2.11.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/rackspace/apache/xerces2-xsd11/2.11.1/xerces2-xsd11-2.11.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/rackspace/apache/xerces2-xsd11/2.11.1/xerces2-xsd11-2.11.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/rackspace/apache/xerces2-xsd11/2.11.1/xerces2-xsd11-2.11.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/rackspace/apache/xerces2-xsd11/2.11.1/xerces2-xsd11-2.11.1.jar"}]},"tags":["xml"]},{"group":"com.rackspace.eclipse.webtools.sourceediting","name":"org.eclipse.wst.xml.xpath2.processor","version":"2.1.100","description":"Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/ ","scope":"required","purl":"pkg:maven/com.rackspace.eclipse.webtools.sourceediting/org.eclipse.wst.xml.xpath2.processor@2.1.100?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/sharwell/webtools.sourceediting.xpath/tree/master/bundles/org.eclipse.wst.xml.xpath2.processor"}],"type":"library","bom-ref":"pkg:maven/com.rackspace.eclipse.webtools.sourceediting/org.eclipse.wst.xml.xpath2.processor@2.1.100?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/rackspace/eclipse/webtools/sourceediting/org.eclipse.wst.xml.xpath2.processor/2.1.100/org.eclipse.wst.xml.xpath2.processor-2.1.100.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/rackspace/eclipse/webtools/sourceediting/org.eclipse.wst.xml.xpath2.processor/2.1.100/org.eclipse.wst.xml.xpath2.processor-2.1.100.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/rackspace/eclipse/webtools/sourceediting/org.eclipse.wst.xml.xpath2.processor/2.1.100/org.eclipse.wst.xml.xpath2.processor-2.1.100.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/rackspace/eclipse/webtools/sourceediting/org.eclipse.wst.xml.xpath2.processor/2.1.100/org.eclipse.wst.xml.xpath2.processor-2.1.100.jar"}]},"tags":["xml"]},{"group":"edu.princeton.cup","name":"java-cup","version":"10k","description":"LALR Parser Generator in Java","scope":"required","purl":"pkg:maven/edu.princeton.cup/java-cup@10k?type=jar","externalReferences":[{"type":"vcs","url":"https://www2.in.tum.de/repos/cup/develop/"}],"type":"library","bom-ref":"pkg:maven/edu.princeton.cup/java-cup@10k?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/edu/princeton/cup/java-cup/10k/java-cup-10k.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/edu/princeton/cup/java-cup/10k/java-cup-10k.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/edu/princeton/cup/java-cup/10k/java-cup-10k.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/edu/princeton/cup/java-cup/10k/java-cup-10k.jar"}]}},{"group":"com.ibm.icu","name":"icu4j","version":"4.6","description":"\n International Component for Unicode for Java (ICU4J) is a mature, widely used Java library\n providing Unicode and Globalization support \n ","scope":"required","purl":"pkg:maven/com.ibm.icu/icu4j@4.6?type=jar","externalReferences":[{"type":"vcs","url":"http://source.icu-project.org/repos/icu/icu4j/trunk/"}],"type":"library","bom-ref":"pkg:maven/com.ibm.icu/icu4j@4.6?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/ibm/icu/icu4j/4.6/icu4j-4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/ibm/icu/icu4j/4.6/icu4j-4.6.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/ibm/icu/icu4j/4.6/icu4j-4.6.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/ibm/icu/icu4j/4.6/icu4j-4.6.jar"}]},"tags":["algorithm","registry","xml"]},{"publisher":"Apache Software Foundation","group":"xml-resolver","name":"xml-resolver","version":"1.2","description":"xml-commons provides an Apache-hosted set of DOM, SAX, and \n JAXP interfaces for use in other xml-based projects. Our hope is that we \n can standardize on both a common version and packaging scheme for these \n critical XML standards interfaces to make the lives of both our developers \n and users easier.","scope":"required","purl":"pkg:maven/xml-resolver/xml-resolver@1.2?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/xml/commons/tags/xml-commons-resolver-1_2/"}],"type":"library","bom-ref":"pkg:maven/xml-resolver/xml-resolver@1.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xml-resolver/xml-resolver/1.2/xml-resolver-1.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xml-resolver/xml-resolver/1.2/xml-resolver-1.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xml-resolver/xml-resolver/1.2/xml-resolver-1.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xml-resolver/xml-resolver/1.2/xml-resolver-1.2.jar"}]},"tags":["xml"]},{"group":"xml-apis","name":"xml-apis","version":"1.4.01","description":"xml-commons provides an Apache-hosted set of DOM, SAX, and \r\n JAXP interfaces for use in other xml-based projects. Our hope is that we \r\n can standardize on both a common version and packaging scheme for these \r\n critical XML standards interfaces to make the lives of both our developers \r\n and users easier. The External Components portion of xml-commons contains \r\n interfaces that are defined by external standards organizations. For DOM, \r\n that's the W3C; for SAX it's David Megginson and sax.sourceforge.net; for \r\n JAXP it's Sun.","scope":"required","purl":"pkg:maven/xml-apis/xml-apis@1.4.01?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/viewvc/xml/commons/tags/xml-commons-external-1_4_01/"}],"type":"library","bom-ref":"pkg:maven/xml-apis/xml-apis@1.4.01?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xml-apis/xml-apis/1.4.01/xml-apis-1.4.01.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/xml-apis/xml-apis/1.4.01/xml-apis-1.4.01.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xml-apis/xml-apis/1.4.01/xml-apis-1.4.01.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/xml-apis/xml-apis/1.4.01/xml-apis-1.4.01.jar"}]},"tags":["xml"]},{"publisher":"QOS.ch","group":"org.slf4j","name":"slf4j-api","version":"1.7.22","description":"The slf4j API","scope":"required","purl":"pkg:maven/org.slf4j/slf4j-api@1.7.22?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/qos-ch/slf4j"}],"type":"framework","bom-ref":"pkg:maven/org.slf4j/slf4j-api@1.7.22?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/slf4j-api/1.7.22/slf4j-api-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/slf4j-api/1.7.22/slf4j-api-1.7.22.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/slf4j-api/1.7.22/slf4j-api-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/slf4j-api/1.7.22/slf4j-api-1.7.22.jar"}]},"tags":["framework","slf4j"]},{"publisher":"Jonathan Hedley","group":"org.jsoup","name":"jsoup","version":"1.10.2","description":"jsoup is a Java library for working with real-world HTML. It provides a very convenient API for extracting and manipulating data, using the best of DOM, CSS, and jquery-like methods. jsoup implements the WHATWG HTML5 specification, and parses HTML to the same DOM as modern browsers do.","scope":"required","purl":"pkg:maven/org.jsoup/jsoup@1.10.2?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/jhy/jsoup"}],"type":"library","bom-ref":"pkg:maven/org.jsoup/jsoup@1.10.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jsoup/jsoup/1.10.2/jsoup-1.10.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jsoup/jsoup/1.10.2/jsoup-1.10.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jsoup/jsoup/1.10.2/jsoup-1.10.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jsoup/jsoup/1.10.2/jsoup-1.10.2.jar"}]},"tags":["api","html"]},{"group":"commons-io","name":"commons-io","version":"2.5","description":"\nThe Apache Commons IO library contains utility classes, stream implementations, file filters, \nfile comparators, endian transformation classes, and much more.\n ","scope":"required","purl":"pkg:maven/commons-io/commons-io@2.5?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/io/tags/commons-io-2.5"}],"type":"library","bom-ref":"pkg:maven/commons-io/commons-io@2.5?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-io/commons-io/2.5/commons-io-2.5.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-io/commons-io/2.5/commons-io-2.5.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-io/commons-io/2.5/commons-io-2.5.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-io/commons-io/2.5/commons-io-2.5.jar"}]},"tags":["stream"]},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"httpasyncclient","version":"4.1.4","description":"\n Apache HttpComponents AsyncClient\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/httpasyncclient@4.1.4?type=jar","externalReferences":[{"type":"vcs","url":"https://svn.apache.org/repos/asf/httpcomponents/httpasyncclient/branches/4.1.x"}],"type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/httpasyncclient@4.1.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpasyncclient/4.1.4/httpasyncclient-4.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpasyncclient/4.1.4/httpasyncclient-4.1.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpasyncclient/4.1.4/httpasyncclient-4.1.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpasyncclient/4.1.4/httpasyncclient-4.1.4.jar"}]},"tags":["framework"]},{"publisher":"The Apache Software Foundation","group":"org.apache.httpcomponents","name":"httpcore-nio","version":"4.4.10","description":"\n Apache HttpComponents Core (non-blocking I/O)\n ","scope":"required","purl":"pkg:maven/org.apache.httpcomponents/httpcore-nio@4.4.10?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.httpcomponents/httpcore-nio@4.4.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpcore-nio/4.4.10/httpcore-nio-4.4.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/httpcomponents/httpcore-nio/4.4.10/httpcore-nio-4.4.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpcore-nio/4.4.10/httpcore-nio-4.4.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/httpcomponents/httpcore-nio/4.4.10/httpcore-nio-4.4.10.jar"}]},"tags":["framework"]},{"group":"io.springfox","name":"springfox-swagger2","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-swagger2@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-swagger2@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger2/2.9.2/springfox-swagger2-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger2/2.9.2/springfox-swagger2-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger2/2.9.2/springfox-swagger2-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger2/2.9.2/springfox-swagger2-2.9.2.jar"}]},"tags":["api"]},{"group":"io.swagger","name":"swagger-annotations","version":"1.5.20","scope":"required","purl":"pkg:maven/io.swagger/swagger-annotations@1.5.20?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/swagger-api/swagger-core"}],"type":"library","bom-ref":"pkg:maven/io.swagger/swagger-annotations@1.5.20?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/swagger/swagger-annotations/1.5.20/swagger-annotations-1.5.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/swagger/swagger-annotations/1.5.20/swagger-annotations-1.5.20.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/swagger/swagger-annotations/1.5.20/swagger-annotations-1.5.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/swagger/swagger-annotations/1.5.20/swagger-annotations-1.5.20.jar"}]}},{"group":"io.swagger","name":"swagger-models","version":"1.5.20","scope":"required","purl":"pkg:maven/io.swagger/swagger-models@1.5.20?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/swagger-api/swagger-core"}],"type":"library","bom-ref":"pkg:maven/io.swagger/swagger-models@1.5.20?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/swagger/swagger-models/1.5.20/swagger-models-1.5.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/swagger/swagger-models/1.5.20/swagger-models-1.5.20.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/swagger/swagger-models/1.5.20/swagger-models-1.5.20.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/swagger/swagger-models/1.5.20/swagger-models-1.5.20.jar"}]},"tags":["xml"]},{"group":"io.springfox","name":"springfox-spi","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-spi@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-spi@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-spi/2.9.2/springfox-spi-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-spi/2.9.2/springfox-spi-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-spi/2.9.2/springfox-spi-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-spi/2.9.2/springfox-spi-2.9.2.jar"}]},"tags":["api"]},{"group":"io.springfox","name":"springfox-core","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-core@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-core@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-core/2.9.2/springfox-core-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-core/2.9.2/springfox-core-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-core/2.9.2/springfox-core-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-core/2.9.2/springfox-core-2.9.2.jar"}]},"tags":["api"]},{"group":"net.bytebuddy","name":"byte-buddy","version":"1.8.12","description":"Byte Buddy is a Java library for creating Java classes at run time.\r\n This artifact is a build of Byte Buddy with all ASM dependencies repackaged into its own name space.","scope":"required","purl":"pkg:maven/net.bytebuddy/byte-buddy@1.8.12?type=jar","type":"library","bom-ref":"pkg:maven/net.bytebuddy/byte-buddy@1.8.12?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/bytebuddy/byte-buddy/1.8.12/byte-buddy-1.8.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/bytebuddy/byte-buddy/1.8.12/byte-buddy-1.8.12.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/bytebuddy/byte-buddy/1.8.12/byte-buddy-1.8.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/bytebuddy/byte-buddy/1.8.12/byte-buddy-1.8.12.jar"}]},"tags":["registry"]},{"group":"io.springfox","name":"springfox-schema","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-schema@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-schema@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-schema/2.9.2/springfox-schema-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-schema/2.9.2/springfox-schema-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-schema/2.9.2/springfox-schema-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-schema/2.9.2/springfox-schema-2.9.2.jar"}]},"tags":["api"]},{"group":"io.springfox","name":"springfox-swagger-common","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-swagger-common@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-swagger-common@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger-common/2.9.2/springfox-swagger-common-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger-common/2.9.2/springfox-swagger-common-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger-common/2.9.2/springfox-swagger-common-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger-common/2.9.2/springfox-swagger-common-2.9.2.jar"}]},"tags":["api"]},{"group":"io.springfox","name":"springfox-spring-web","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-spring-web@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-spring-web@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-spring-web/2.9.2/springfox-spring-web-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-spring-web/2.9.2/springfox-spring-web-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-spring-web/2.9.2/springfox-spring-web-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-spring-web/2.9.2/springfox-spring-web-2.9.2.jar"}]},"tags":["api"]},{"publisher":"fasterxml.com","group":"com.fasterxml","name":"classmate","version":"1.3.3","description":"Library for introspecting types with full generic information\n including resolving of field and method types.\n ","scope":"required","purl":"pkg:maven/com.fasterxml/classmate@1.3.3?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/cowtowncoder/java-classmate"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml/classmate@1.3.3?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/classmate/1.3.3/classmate-1.3.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/classmate/1.3.3/classmate-1.3.3.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/classmate/1.3.3/classmate-1.3.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/classmate/1.3.3/classmate-1.3.3.jar"}]},"tags":["xml"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.plugin","name":"spring-plugin-core","version":"1.2.0.RELEASE","description":"Core plugin infrastructure","scope":"required","purl":"pkg:maven/org.springframework.plugin/spring-plugin-core@1.2.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-plugin"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.plugin/spring-plugin-core@1.2.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/plugin/spring-plugin-core/1.2.0.RELEASE/spring-plugin-core-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/plugin/spring-plugin-core/1.2.0.RELEASE/spring-plugin-core-1.2.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/plugin/spring-plugin-core/1.2.0.RELEASE/spring-plugin-core-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/plugin/spring-plugin-core/1.2.0.RELEASE/spring-plugin-core-1.2.0.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.plugin","name":"spring-plugin-metadata","version":"1.2.0.RELEASE","description":"Extension package for metadata based plugins","scope":"required","purl":"pkg:maven/org.springframework.plugin/spring-plugin-metadata@1.2.0.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-plugin"}],"type":"framework","bom-ref":"pkg:maven/org.springframework.plugin/spring-plugin-metadata@1.2.0.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/plugin/spring-plugin-metadata/1.2.0.RELEASE/spring-plugin-metadata-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/plugin/spring-plugin-metadata/1.2.0.RELEASE/spring-plugin-metadata-1.2.0.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/plugin/spring-plugin-metadata/1.2.0.RELEASE/spring-plugin-metadata-1.2.0.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/plugin/spring-plugin-metadata/1.2.0.RELEASE/spring-plugin-metadata-1.2.0.RELEASE.jar"}]},"tags":["framework"]},{"group":"org.mapstruct","name":"mapstruct","version":"1.2.0.Final","description":"An annotation processor for generating type-safe bean mappers","scope":"required","purl":"pkg:maven/org.mapstruct/mapstruct@1.2.0.Final?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/mapstruct/mapstruct/"}],"type":"library","bom-ref":"pkg:maven/org.mapstruct/mapstruct@1.2.0.Final?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mapstruct/mapstruct/1.2.0.Final/mapstruct-1.2.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/mapstruct/mapstruct/1.2.0.Final/mapstruct-1.2.0.Final.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mapstruct/mapstruct/1.2.0.Final/mapstruct-1.2.0.Final.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/mapstruct/mapstruct/1.2.0.Final/mapstruct-1.2.0.Final.jar"}]}},{"group":"io.springfox","name":"springfox-swagger-ui","version":"2.9.2","description":"JSON API documentation for spring based applications","scope":"required","purl":"pkg:maven/io.springfox/springfox-swagger-ui@2.9.2?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:springfox/springfox.git"}],"type":"library","bom-ref":"pkg:maven/io.springfox/springfox-swagger-ui@2.9.2?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger-ui/2.9.2/springfox-swagger-ui-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/springfox/springfox-swagger-ui/2.9.2/springfox-swagger-ui-2.9.2.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger-ui/2.9.2/springfox-swagger-ui-2.9.2.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/springfox/springfox-swagger-ui/2.9.2/springfox-swagger-ui-2.9.2.jar"}]},"tags":["api"]},{"group":"org.projectlombok","name":"lombok","version":"1.18.30","description":"Spice up your java: Automatic Resource Management, automatic generation of getters, setters, equals, hashCode and toString, and more!","scope":"excluded","purl":"pkg:maven/org.projectlombok/lombok@1.18.30?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/projectlombok/lombok"}],"type":"library","bom-ref":"pkg:maven/org.projectlombok/lombok@1.18.30?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/projectlombok/lombok/1.18.30/lombok-1.18.30.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/projectlombok/lombok/1.18.30/lombok-1.18.30.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/projectlombok/lombok/1.18.30/lombok-1.18.30.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/projectlombok/lombok/1.18.30/lombok-1.18.30.jar"}]},"tags":["resource"]},{"group":"org.yaml","name":"snakeyaml","version":"1.21","description":"YAML 1.1 parser and emitter for Java","scope":"required","purl":"pkg:maven/org.yaml/snakeyaml@1.21?type=jar","externalReferences":[{"type":"vcs","url":"https://bitbucket.org/asomov/snakeyaml/src"}],"type":"library","bom-ref":"pkg:maven/org.yaml/snakeyaml@1.21?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/yaml/snakeyaml/1.21/snakeyaml-1.21.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/yaml/snakeyaml/1.21/snakeyaml-1.21.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/yaml/snakeyaml/1.21/snakeyaml-1.21.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/yaml/snakeyaml/1.21/snakeyaml-1.21.jar"}]}},{"publisher":"Spring IO","group":"org.springframework","name":"spring-test","version":"4.3.6.RELEASE","description":"Spring TestContext Framework","scope":"required","purl":"pkg:maven/org.springframework/spring-test@4.3.6.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-test@4.3.6.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-test/4.3.6.RELEASE/spring-test-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-test/4.3.6.RELEASE/spring-test-4.3.6.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-test/4.3.6.RELEASE/spring-test-4.3.6.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-test/4.3.6.RELEASE/spring-test-4.3.6.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"JUnit","group":"junit","name":"junit","version":"4.12","description":"JUnit is a unit testing framework for Java, created by Erich Gamma and Kent Beck.","scope":"required","purl":"pkg:maven/junit/junit@4.12?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/junit-team/junit/tree/master"}],"type":"framework","bom-ref":"pkg:maven/junit/junit@4.12?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/junit/junit/4.12/junit-4.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/junit/junit/4.12/junit-4.12.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/junit/junit/4.12/junit-4.12.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/junit/junit/4.12/junit-4.12.jar"}]},"tags":["framework","test"]},{"group":"org.hamcrest","name":"hamcrest-core","version":"1.3","description":"\r\n This is the core API of hamcrest matcher framework to be used by third-party framework providers. This includes the a foundation set of matcher implementations for common operations.\r\n ","scope":"required","purl":"pkg:maven/org.hamcrest/hamcrest-core@1.3?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/hamcrest/JavaHamcrest"}],"type":"framework","bom-ref":"pkg:maven/org.hamcrest/hamcrest-core@1.3?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/hamcrest/hamcrest-core/1.3/hamcrest-core-1.3.jar"}]},"tags":["api","framework"]},{"group":"commons-beanutils","name":"commons-beanutils","version":"1.9.4","description":"Apache Commons BeanUtils provides an easy-to-use but flexible wrapper around reflection and introspection.","scope":"required","purl":"pkg:maven/commons-beanutils/commons-beanutils@1.9.4?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/viewvc/commons/proper/beanutils/tags/BEANUTILS_1_9_3_RC3"}],"type":"library","bom-ref":"pkg:maven/commons-beanutils/commons-beanutils@1.9.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-beanutils/commons-beanutils/1.9.4/commons-beanutils-1.9.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/commons-beanutils/commons-beanutils/1.9.4/commons-beanutils-1.9.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-beanutils/commons-beanutils/1.9.4/commons-beanutils-1.9.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/commons-beanutils/commons-beanutils/1.9.4/commons-beanutils-1.9.4.jar"}]},"tags":["sql"]},{"group":"io.jsonwebtoken","name":"jjwt","version":"0.9.1","description":"Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/ ","scope":"required","purl":"pkg:maven/io.jsonwebtoken/jjwt@0.9.1?type=jar","type":"library","bom-ref":"pkg:maven/io.jsonwebtoken/jjwt@0.9.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar"}]},"tags":["algorithm","crypto"]},{"group":"com.auth0","name":"java-jwt","version":"4.0.0","description":"Java implementation of JSON Web Token (JWT)","scope":"required","purl":"pkg:maven/com.auth0/java-jwt@4.0.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/auth0/java-jwt"}],"type":"library","bom-ref":"pkg:maven/com.auth0/java-jwt@4.0.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/auth0/java-jwt/4.0.0/java-jwt-4.0.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/auth0/java-jwt/4.0.0/java-jwt-4.0.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/auth0/java-jwt/4.0.0/java-jwt-4.0.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/auth0/java-jwt/4.0.0/java-jwt-4.0.0.jar"}]},"tags":["json","token","web"]},{"group":"cn.hutool","name":"hutool-all","version":"5.8.10","description":"Hutool\u662f\u4e00\u4e2a\u5c0f\u800c\u5168\u7684Java\u5de5\u5177\u7c7b\u5e93\uff0c\u901a\u8fc7\u9759\u6001\u65b9\u6cd5\u5c01\u88c5\uff0c\u964d\u4f4e\u76f8\u5173API\u7684\u5b66\u4e60\u6210\u672c\uff0c\u63d0\u9ad8\u5de5\u4f5c\u6548\u7387\uff0c\u4f7fJava\u62e5\u6709\u51fd\u6570\u5f0f\u8bed\u8a00\u822c\u7684\u4f18\u96c5\uff0c\u8ba9Java\u8bed\u8a00\u4e5f\u53ef\u4ee5\u201c\u751c\u751c\u7684\u201d\u3002","scope":"required","purl":"pkg:maven/cn.hutool/hutool-all@5.8.10?type=jar","type":"library","bom-ref":"pkg:maven/cn.hutool/hutool-all@5.8.10?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/cn/hutool/hutool-all/5.8.10/hutool-all-5.8.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/cn/hutool/hutool-all/5.8.10/hutool-all-5.8.10.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/cn/hutool/hutool-all/5.8.10/hutool-all-5.8.10.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/cn/hutool/hutool-all/5.8.10/hutool-all-5.8.10.jar"}]},"tags":["algorithm","crypto","decrypt","driver","encrypt","graphics","registry","sql","xml"]},{"publisher":"Shigeru Chiba, www.javassist.org","group":"org.javassist","name":"javassist","version":"3.27.0-GA","description":"\n \tJavassist (JAVA programming ASSISTant) makes Java bytecode manipulation\n simple. It is a class library for editing bytecodes in Java.\n ","scope":"required","purl":"pkg:maven/org.javassist/javassist@3.27.0-GA?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git@github.com:jboss-javassist/javassist.git"}],"type":"framework","bom-ref":"pkg:maven/org.javassist/javassist@3.27.0-GA?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/javassist/javassist/3.27.0-GA/javassist-3.27.0-GA.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/javassist/javassist/3.27.0-GA/javassist-3.27.0-GA.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/javassist/javassist/3.27.0-GA/javassist-3.27.0-GA.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/javassist/javassist/3.27.0-GA/javassist-3.27.0-GA.jar"}]},"tags":["bytecode","framework"]},{"publisher":"Pivotal Software, Inc.","group":"org.springframework.data","name":"spring-data-commons","version":"1.13.11.RELEASE","description":"Global parent pom.xml to be used by Spring Data modules","scope":"required","purl":"pkg:maven/org.springframework.data/spring-data-commons@1.13.11.RELEASE?type=jar","type":"framework","bom-ref":"pkg:maven/org.springframework.data/spring-data-commons@1.13.11.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/data/spring-data-commons/1.13.11.RELEASE/spring-data-commons-1.13.11.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/data/spring-data-commons/1.13.11.RELEASE/spring-data-commons-1.13.11.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/data/spring-data-commons/1.13.11.RELEASE/spring-data-commons-1.13.11.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/data/spring-data-commons/1.13.11.RELEASE/spring-data-commons-1.13.11.RELEASE.jar"}]},"tags":["framework"]},{"publisher":"QOS.ch","group":"org.slf4j","name":"jcl-over-slf4j","version":"1.7.22","description":"JCL 1.1.1 implemented over SLF4J","scope":"required","purl":"pkg:maven/org.slf4j/jcl-over-slf4j@1.7.22?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/qos-ch/slf4j"}],"type":"framework","bom-ref":"pkg:maven/org.slf4j/jcl-over-slf4j@1.7.22?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/jcl-over-slf4j/1.7.22/jcl-over-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/slf4j/jcl-over-slf4j/1.7.22/jcl-over-slf4j-1.7.22.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/jcl-over-slf4j/1.7.22/jcl-over-slf4j-1.7.22.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/slf4j/jcl-over-slf4j/1.7.22/jcl-over-slf4j-1.7.22.jar"}]},"tags":["framework"]},{"group":"com.jayway.jsonpath","name":"json-path","version":"2.2.0","description":"Java port of Stefan Goessner JsonPath.","scope":"required","purl":"pkg:maven/com.jayway.jsonpath/json-path@2.2.0?type=jar","externalReferences":[{"type":"vcs","url":"scm:git:git://github.com/jayway/JsonPath.git"}],"type":"library","bom-ref":"pkg:maven/com.jayway.jsonpath/json-path@2.2.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/jayway/jsonpath/json-path/2.2.0/json-path-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/jayway/jsonpath/json-path/2.2.0/json-path-2.2.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/jayway/jsonpath/json-path/2.2.0/json-path-2.2.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/jayway/jsonpath/json-path/2.2.0/json-path-2.2.0.jar"}]},"tags":["jsonpath"]},{"publisher":"Chemouni Uriel","group":"net.minidev","name":"json-smart","version":"2.2.1","description":"\n JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.\n ","scope":"required","purl":"pkg:maven/net.minidev/json-smart@2.2.1?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netplex/json-smart-v2"}],"type":"library","bom-ref":"pkg:maven/net.minidev/json-smart@2.2.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar"}]},"tags":["json","parse"]},{"publisher":"Chemouni Uriel","group":"net.minidev","name":"accessors-smart","version":"1.1","description":"Java reflect give poor performance on getter setter an constructor calls,\naccessors-smart use ASM to speed up those calls.\n","scope":"required","purl":"pkg:maven/net.minidev/accessors-smart@1.1?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/netplex/json-smart-v2"}],"type":"library","bom-ref":"pkg:maven/net.minidev/accessors-smart@1.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/minidev/accessors-smart/1.1/accessors-smart-1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/net/minidev/accessors-smart/1.1/accessors-smart-1.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/minidev/accessors-smart/1.1/accessors-smart-1.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/net/minidev/accessors-smart/1.1/accessors-smart-1.1.jar"}]},"tags":["performance"]},{"group":"org.xmlbeam","name":"xmlprojector","version":"1.4.13","description":"The coolest XML library for Java around. Define typesafe views (projections) to xml. Use XPath to read and write XML. Bind XML to Java collections. Requires at least Java6, supports Java8 features and has no further runtime dependencies.","scope":"required","purl":"pkg:maven/org.xmlbeam/xmlprojector@1.4.13?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/SvenEwald/xmlbeam.git"}],"type":"library","bom-ref":"pkg:maven/org.xmlbeam/xmlprojector@1.4.13?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/xmlbeam/xmlprojector/1.4.13/xmlprojector-1.4.13.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/xmlbeam/xmlprojector/1.4.13/xmlprojector-1.4.13.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/xmlbeam/xmlprojector/1.4.13/xmlprojector-1.4.13.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/xmlbeam/xmlprojector/1.4.13/xmlprojector-1.4.13.jar"}]},"tags":["typesafe","xml"]},{"publisher":"PostgreSQL Global Development Group","group":"org.postgresql","name":"postgresql","version":"42.3.1","description":"PostgreSQL JDBC Driver Postgresql","scope":"required","purl":"pkg:maven/org.postgresql/postgresql@42.3.1?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/pgjdbc/pgjdbc"}],"type":"library","bom-ref":"pkg:maven/org.postgresql/postgresql@42.3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/postgresql/postgresql/42.3.1/postgresql-42.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/postgresql/postgresql/42.3.1/postgresql-42.3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/postgresql/postgresql/42.3.1/postgresql-42.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/postgresql/postgresql/42.3.1/postgresql-42.3.1.jar"}]},"tags":["jdbc"]},{"group":"org.checkerframework","name":"checker-qual","version":"3.5.0","description":"\n Checker Qual is the set of annotations (qualifiers) and supporting classes\n used by the Checker Framework to type check Java source code.\n\n Please\n see artifact:\n org.checkerframework:checker\n ","scope":"required","purl":"pkg:maven/org.checkerframework/checker-qual@3.5.0?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/typetools/checker-framework.git"}],"type":"framework","bom-ref":"pkg:maven/org.checkerframework/checker-qual@3.5.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/checkerframework/checker-qual/3.5.0/checker-qual-3.5.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/checkerframework/checker-qual/3.5.0/checker-qual-3.5.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/checkerframework/checker-qual/3.5.0/checker-qual-3.5.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/checkerframework/checker-qual/3.5.0/checker-qual-3.5.0.jar"}]},"tags":["framework"]},{"group":"com.ibm.db2","name":"jcc","version":"11.5.8.0","description":"IBM Data Server Driver for JDBC and SQLJ is a pure-Java driver (Type 4) that supports the JDBC 4 specification. You can use this JDBC driver for Java applications that access the Db2\u00ae LUW database server.","scope":"required","purl":"pkg:maven/com.ibm.db2/jcc@11.5.8.0?type=jar","type":"library","bom-ref":"pkg:maven/com.ibm.db2/jcc@11.5.8.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/ibm/db2/jcc/11.5.8.0/jcc-11.5.8.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/ibm/db2/jcc/11.5.8.0/jcc-11.5.8.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/ibm/db2/jcc/11.5.8.0/jcc-11.5.8.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/ibm/db2/jcc/11.5.8.0/jcc-11.5.8.0.jar"}]},"tags":["database","jdbc"]},{"group":"org.apache.shiro","name":"shiro-core","version":"1.2.4","description":"\r\n Apache Shiro is a powerful and flexible open-source security framework that cleanly handles\r\n authentication, authorization, enterprise session management, single sign-on and cryptography services.\r\n ","scope":"required","purl":"pkg:maven/org.apache.shiro/shiro-core@1.2.4?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/shiro/tags/shiro-root-1.2.4"}],"type":"framework","bom-ref":"pkg:maven/org.apache.shiro/shiro-core@1.2.4?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/shiro/shiro-core/1.2.4/shiro-core-1.2.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/shiro/shiro-core/1.2.4/shiro-core-1.2.4.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/shiro/shiro-core/1.2.4/shiro-core-1.2.4.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/shiro/shiro-core/1.2.4/shiro-core-1.2.4.jar"}]},"tags":["framework","security"]},{"group":"com.fasterxml.jackson.core","name":"jackson-databind","version":"2.9.8","description":"General data-binding functionality for Jackson: works on core streaming API","scope":"required","purl":"pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.9.8?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/FasterXML/jackson-databind"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.9.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar"}]},"tags":["sql","xml"]},{"publisher":"FasterXML","group":"com.fasterxml.jackson.core","name":"jackson-annotations","version":"2.9.8","description":"Core annotations used for value types, used by Jackson data binding package.\n ","scope":"required","purl":"pkg:maven/com.fasterxml.jackson.core/jackson-annotations@2.9.8?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/FasterXML/jackson-annotations"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml.jackson.core/jackson-annotations@2.9.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-annotations/2.9.8/jackson-annotations-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-annotations/2.9.8/jackson-annotations-2.9.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-annotations/2.9.8/jackson-annotations-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-annotations/2.9.8/jackson-annotations-2.9.8.jar"}]},"tags":["xml"]},{"group":"com.fasterxml.jackson.core","name":"jackson-core","version":"2.9.8","description":"Core Jackson processing abstractions (aka Streaming API), implementation for JSON","scope":"required","purl":"pkg:maven/com.fasterxml.jackson.core/jackson-core@2.9.8?type=jar","externalReferences":[{"type":"vcs","url":"http://github.com/FasterXML/jackson-core"}],"type":"library","bom-ref":"pkg:maven/com.fasterxml.jackson.core/jackson-core@2.9.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-core/2.9.8/jackson-core-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/fasterxml/jackson/core/jackson-core/2.9.8/jackson-core-2.9.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-core/2.9.8/jackson-core-2.9.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/fasterxml/jackson/core/jackson-core/2.9.8/jackson-core-2.9.8.jar"}]},"tags":["xml"]},{"group":"org.jsecurity","name":"jsecurity","version":"0.9.0","description":"JSecurity is a powerful and flexible open-source Java security framework that cleanly handles\n authentication, authorization, enterprise session management, single sign-on and cryptography services.\n ","scope":"required","purl":"pkg:maven/org.jsecurity/jsecurity@0.9.0?type=jar","externalReferences":[{"type":"vcs","url":"http://svn.apache.org/repos/asf/incubator/jsecurity/import/trunk"}],"type":"framework","bom-ref":"pkg:maven/org.jsecurity/jsecurity@0.9.0?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jsecurity/jsecurity/0.9.0/jsecurity-0.9.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/jsecurity/jsecurity/0.9.0/jsecurity-0.9.0.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jsecurity/jsecurity/0.9.0/jsecurity-0.9.0.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/jsecurity/jsecurity/0.9.0/jsecurity-0.9.0.jar"}]},"tags":["framework","security"]},{"publisher":"Spring IO","group":"org.springframework","name":"spring-expression","version":"4.3.16.RELEASE","description":"Spring Expression Language (SpEL)","scope":"required","purl":"pkg:maven/org.springframework/spring-expression@4.3.16.RELEASE?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/spring-projects/spring-framework"}],"type":"framework","bom-ref":"pkg:maven/org.springframework/spring-expression@4.3.16.RELEASE?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-expression/4.3.16.RELEASE/spring-expression-4.3.16.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/springframework/spring-expression/4.3.16.RELEASE/spring-expression-4.3.16.RELEASE.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-expression/4.3.16.RELEASE/spring-expression-4.3.16.RELEASE.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/springframework/spring-expression/4.3.16.RELEASE/spring-expression-4.3.16.RELEASE.jar"}]},"tags":["framework"]},{"group":"com.h2database","name":"h2","version":"1.4.199","description":"H2 Database Engine","scope":"optional","purl":"pkg:maven/com.h2database/h2@1.4.199?type=jar","externalReferences":[{"type":"vcs","url":"https://github.com/h2database/h2database"}],"type":"library","bom-ref":"pkg:maven/com.h2database/h2@1.4.199?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/h2database/h2/1.4.199/h2-1.4.199.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/h2database/h2/1.4.199/h2-1.4.199.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/h2database/h2/1.4.199/h2-1.4.199.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/h2database/h2/1.4.199/h2-1.4.199.jar"}]},"tags":["database"]},{"group":"org.apache.tomcat","name":"tomcat-dbcp","version":"9.0.8","description":"Tomcat Database Connection Pooling package","scope":"required","purl":"pkg:maven/org.apache.tomcat/tomcat-dbcp@9.0.8?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat/tomcat-dbcp@9.0.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-dbcp/9.0.8/tomcat-dbcp-9.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-dbcp/9.0.8/tomcat-dbcp-9.0.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-dbcp/9.0.8/tomcat-dbcp-9.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-dbcp/9.0.8/tomcat-dbcp-9.0.8.jar"}]},"tags":["database","framework"]},{"group":"org.apache.tomcat","name":"tomcat-juli","version":"9.0.8","description":"Tomcat Core Logging Package","scope":"required","purl":"pkg:maven/org.apache.tomcat/tomcat-juli@9.0.8?type=jar","type":"framework","bom-ref":"pkg:maven/org.apache.tomcat/tomcat-juli@9.0.8?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-juli/9.0.8/tomcat-juli-9.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/org/apache/tomcat/tomcat-juli/9.0.8/tomcat-juli-9.0.8.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-juli/9.0.8/tomcat-juli-9.0.8.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/org/apache/tomcat/tomcat-juli/9.0.8/tomcat-juli-9.0.8.jar"}]},"tags":["framework","logging"]},{"publisher":"Alibaba Group","group":"com.alibaba","name":"QLExpress","version":"3.3.1","description":"QLExpress is a powerful, lightweight, dynamic language for the Java platform aimed at improving developers\u2019 productivity in different business scenes.\n ","scope":"required","purl":"pkg:maven/com.alibaba/QLExpress@3.3.1?type=jar","type":"library","bom-ref":"pkg:maven/com.alibaba/QLExpress@3.3.1?type=jar","evidence":{"identity":[{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/alibaba/QLExpress/3.3.1/QLExpress-3.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-2BJRqm/com/alibaba/QLExpress/3.3.1/QLExpress-3.3.1.jar"},{"field":"purl","confidence":0.8,"methods":[{"technique":"binary-analysis","confidence":0.8,"value":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/alibaba/QLExpress/3.3.1/QLExpress-3.3.1.jar"}],"concludedValue":"/var/folders/sj/g0xj1gyn05qcvc6r3j3syg6h0000gn/T/mvn-deps-vdA8YH/com/alibaba/QLExpress/3.3.1/QLExpress-3.3.1.jar"}]},"tags":["productivity"]}],"vulnerabilities":[{"id":"CVE-2022-22965","bom-ref":"CVE-2022-22965/pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0.0.RELEASE|<=2.5.9|!=2.5.12","status":"affected"},{"version":"2.5.12","status":"unaffected"}]}],"recommendation":"Update to version 2.5.12.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965","name":"NVD"},"references":[{"id":"CVE-2022-22965","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965","name":"NVD"}},{"id":"cve-2022-22965","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22965"}},{"id":"ssa-254054","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"}},{"id":"cisco-sa-java-spring-rce-Zx9GUc67","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"}},{"id":"packetstormsecurity-exploit-Spring4Shell-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html"}},{"id":"packetstormsecurity-exploit-Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"SNWLID-2022-0005","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"}},{"id":"970766","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/970766"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"CVE-2022-22965","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965"},{"title":"Vmware Advisory cve-2022-22965","url":"https://tanzu.vmware.com/security/cve-2022-22965"},{"title":"Siemens Advisory ssa-254054","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"},{"title":"Cisco Advisory cisco-sa-java-spring-rce-Zx9GUc67","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Sonicwall Advisory SNWLID-2022-0005","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"},{"title":"Cert Advisory 970766","url":"https://www.kb.cert.org/vuls/id/970766"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[74,94],"description":"Remote Code Execution in Spring Framework","detail":"# Remote Code Execution in Spring Framework Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. These are the prerequisites for the exploit: - JDK 9 or higher - Apache Tomcat as the Servlet container - Packaged as WAR - `spring-webmvc` or `spring-webflux` dependency ## Patches - Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE) - Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12) ## Workarounds For those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting. To apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-03-31T18:30:50","updated":"2025-01-29T19:19:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency\\nKnown Exploits"}]},{"id":"CVE-2022-27772","bom-ref":"CVE-2022-27772/pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0.0.RELEASE|<=2.2.9.RELEASE|!=2.2.11.RELEASE","status":"affected"},{"version":"2.2.11.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 2.2.11.RELEASE.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27772","name":"NVD"},"references":[{"id":"CVE-2022-27772","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27772","name":"NVD"}},{"id":"GHSA-cm59-pr5q-cw85","source":{"name":"GitHub Advisory","url":"https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85"}}],"advisories":[{"title":"CVE-2022-27772","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27772"},{"title":"GitHub Advisory GHSA-cm59-pr5q-cw85","url":"https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85"}],"cwes":[377,379,668],"description":"Temporary Directory Hijacking to Local Privilege Escalation Vulnerability in org.springframework.boot:spring-boot","detail":"# Temporary Directory Hijacking to Local Privilege Escalation Vulnerability in org.springframework.boot:spring-boot spring-boot versions prior to version `v2.2.11.RELEASE` was vulnerable to temporary directory hijacking. This vulnerability impacted the `org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir` method. The vulnerable method is used to create a work directory for embedded web servers such as Tomcat and Jetty. The directory contains configuration files, JSP/class files, etc. If a local attacker got the permission to write in this directory, they could completely take over the application (ie. local privilege escalation). #### Impact Location This vulnerability impacted the following source location: ```java /** * Return the absolute temp dir for given web server. * @param prefix server name * @return the temp dir for given server. */ protected final File createTempDir(String prefix) { try { File tempDir = File.createTempFile(prefix + \".\", \".\" + getPort()); tempDir.delete(); tempDir.mkdir(); tempDir.deleteOnExit(); return tempDir; } ``` \\- https://github.com/spring-projects/spring-boot/blob/ce70e7d768977242a8ea6f93188388f273be5851/spring-boot-project/spring-boot/src/main/java/org/springframework/boot/web/server/AbstractConfigurableWebServerFactory.java#L165-L177 This vulnerability exists because `File.mkdir` returns `false` when it fails to create a directory, it does not throw an exception. As such, the following race condition exists: ```java File tmpDir =File.createTempFile(prefix + \".\", \".\" + getPort()); // Attacker knows the full path of the file that will be generated // delete the file that was created tmpDir.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Jetty. // and make a directory of the same name // SECURITY VULNERABILITY: Race Condition! - Attacker beats java code and now owns this directory tmpDir.mkdirs(); // This method returns 'false' because it was unable to create the directory. No exception is thrown. // Attacker can write any new files to this directory that they wish. // Attacker can read any files created by this process. ``` ### Prerequisites This vulnerability impacts Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. ### Patches This vulnerability was inadvertently fixed as a part of this patch: https://github.com/spring-projects/spring-boot/commit/667ccdae84822072f9ea1a27ed5c77964c71002d This vulnerability is patched in versions `v2.2.11.RELEASE` or later. ### Workarounds Setting the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability for all operating systems.","ratings":[{"method":"CVSSv31","severity":"high","score":7.8,"vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"published":"2022-07-11T20:59:02","updated":"2023-11-08T04:09:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 5 locations"}]},{"id":"CVE-2025-22235","bom-ref":"CVE-2025-22235/pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0.0.RELEASE|<=2.7.9|>=1.0.0.RELEASE|<=2.7.9","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2025-22235. Updating to version 2.2.11.RELEASE is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://spring.io/security/cve-2025-22235"},"references":[{"id":"cve-2025-22235","source":{"url":"https://spring.io/security/cve-2025-22235"}},{"id":"CVE-2025-22235","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22235","name":"NVD"}}],"advisories":[{"title":"cve-2025-22235","url":"https://spring.io/security/cve-2025-22235"},{"title":"CVE-2025-22235","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22235"}],"cwes":[20,862],"description":"Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed","detail":"# Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed EndpointRequest.to()\u00a0creates a matcher for null/**\u00a0if the actuator endpoint, for which the EndpointRequest\u00a0has been created, is disabled or not exposed. Your application may be affected by this if all the following conditions are met: * You use Spring Security * EndpointRequest.to()\u00a0has been used in a Spring Security chain configuration * The endpoint which EndpointRequest\u00a0references is disabled or not exposed via web * Your application handles requests to /null\u00a0and this path needs protection You are not affected if any of the following is true: * You don't use Spring Security * You don't use EndpointRequest.to() * The endpoint which EndpointRequest.to()\u00a0refers to is enabled and is exposed * Your application does not handle requests to /null\u00a0or this path does not need protection","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2025-04-28T09:31:53","updated":"2025-04-28T21:12:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 5 locations"}]},{"id":"CVE-2018-1196","bom-ref":"CVE-2018-1196/pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=1.5.10|<1.5.10","status":"affected"},{"version":"1.5.10","status":"unaffected"}]}],"recommendation":"Update to version 1.5.10 to resolve CVE-2018-1196 or update to version 2.2.11.RELEASE to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-1196"},"references":[{"id":"cve-2018-1196","source":{"url":"https://pivotal.io/security/cve-2018-1196"}},{"id":"CVE-2018-1196","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1196","name":"NVD"}},{"id":"GHSA-xx65-cc7g-9pfp","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-xx65-cc7g-9pfp"}}],"advisories":[{"title":"cve-2018-1196","url":"https://pivotal.io/security/cve-2018-1196"},{"title":"CVE-2018-1196","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1196"},{"title":"GitHub Advisory GHSA-xx65-cc7g-9pfp","url":"https://github.com/advisories/GHSA-xx65-cc7g-9pfp"}],"cwes":[59],"description":"Moderate severity vulnerability that affects org.springframework.boot:spring-boot","detail":"# Moderate severity vulnerability that affects org.springframework.boot:spring-boot Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the \"run_user\" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the \"run_user\" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2018-10-18T18:05:57","updated":"2023-11-08T03:59:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 5 locations"}]},{"id":"CVE-2023-20883","bom-ref":"CVE-2023-20883/pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=3.0.7|<3.0.7","status":"affected"},{"version":"3.0.7","status":"unaffected"}]}],"recommendation":"Update to version 3.0.7.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20883","name":"NVD"},"references":[{"id":"ntap-20230703-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230703-0008"}},{"id":"CVE-2023-20883","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20883","name":"NVD"}},{"id":"cve-2023-20883","source":{"url":"https://spring.io/security/cve-2023-20883"}}],"advisories":[{"title":"NetApp Advisory ntap-20230703-0008","url":"https://security.netapp.com/advisory/ntap-20230703-0008"},{"title":"CVE-2023-20883","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20883"},{"title":"cve-2023-20883","url":"https://spring.io/security/cve-2023-20883"}],"cwes":[400],"description":"Spring Boot Welcome Page Denial of Service","detail":"# Spring Boot Welcome Page Denial of Service In Spring Boot versions 3.0.0 - 3.0.6, 2.7.0 - 2.7.11, 2.6.0 - 2.6.14, 2.5.0 - 2.5.14 and older unsupported versions, there is potential for a denial-of-service (DoS) attack if Spring MVC is used together with a reverse proxy cache. Specifically, an application is vulnerable if all of the conditions are true: * The application has Spring MVC auto-configuration enabled. This is the case by default if Spring MVC is on the classpath. * The application makes use of Spring Boot's welcome page support, either static or templated. * Your application is deployed behind a proxy which caches 404 responses. Your application is NOT vulnerable if any of the following are true: * Spring MVC auto-configuration is disabled. This is true if WebMvcAutoConfiguration is explicitly excluded, if Spring MVC is not on the classpath, or if spring.main.web-application-type is set to a value other than SERVLET. * The application does not use Spring Boot's welcome page support. * You do not have a proxy which caches 404 responses. Affected Spring Products and Versions Spring Boot 3.0.0 to 3.0.6 2.7.0 to 2.7.11 2.6.0 to 2.6.14 2.5.0 to 2.5.14 Older, unsupported versions are also affected Mitigation Users of affected versions should apply the following mitigations: * 3.0.x users should upgrade to 3.0.7+ * 2.7.x users should upgrade to 2.7.12+ * 2.6.x users should upgrade to 2.6.15+ * 2.5.x users should upgrade to 2.5.15+ Users of older, unsupported versions should upgrade to 3.0.7+ or 2.7.12+. Workarounds: configure the reverse proxy not to cache 404 responses and/or not to cache responses to requests to the root (/) of the application.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-05-26T18:30:21","updated":"2024-02-21T05:36:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-autoconfigure@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 1 locations"}]},{"id":"CVE-2023-6378","bom-ref":"CVE-2023-6378/pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar","affects":[{"ref":"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar","versions":[{"range":"vers:maven/!=1.3.12|<1.3.12","status":"affected"},{"version":"1.3.12","status":"unaffected"}]}],"recommendation":"Update to version 1.3.12.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6378","name":"NVD"},"references":[{"id":"ntap-20241129-0012","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241129-0012"}},{"id":"CVE-2023-6378","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6378","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20241129-0012","url":"https://security.netapp.com/advisory/ntap-20241129-0012"},{"title":"CVE-2023-6378","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6378"}],"cwes":[502],"description":"logback serialization vulnerability","detail":"# logback serialization vulnerability A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data. This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html","ratings":[{"method":"CVSSv31","severity":"high","score":7.1,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"published":"2023-11-29T12:30:16","updated":"2024-11-29T12:45:50","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar\", \"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-42550","bom-ref":"CVE-2021-42550/pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","affects":[{"ref":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","versions":[{"range":"vers:maven/>=0.2.5|<=1.2.8|!=1.2.9","status":"affected"},{"version":"1.2.9","status":"unaffected"}]}],"recommendation":"Update to version 1.2.9 to resolve CVE-2021-42550 or update to version 1.5.13 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42550","name":"NVD"},"references":[{"id":"ssa-371761","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf"}},{"id":"seclists-exploit-fulldisclosure/2022/Jul/11","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2022/Jul/11"}},{"id":"ntap-20211229-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20211229-0001"}},{"id":"packetstormsecurity-exploit-Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html"}},{"id":"CVE-2021-42550","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42550","name":"NVD"}}],"advisories":[{"title":"Siemens Advisory ssa-371761","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf"},{"title":"NetApp Advisory ntap-20211229-0001","url":"https://security.netapp.com/advisory/ntap-20211229-0001"},{"title":"CVE-2021-42550","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42550"}],"cwes":[502],"description":"Deserialization of Untrusted Data in logback","detail":"# Deserialization of Untrusted Data in logback In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-12-17T20:00:50","updated":"2024-02-16T08:18:41","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar\", \"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar\", \"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency\\nKnown Exploits"}]},{"id":"CVE-2024-12801","bom-ref":"CVE-2024-12801/pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","affects":[{"ref":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","versions":[{"range":"vers:maven/!=1.5.13|<1.5.13","status":"affected"},{"version":"1.5.13","status":"unaffected"}]}],"recommendation":"Update to version 1.5.13.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12801","name":"NVD"},"references":[{"id":"CVE-2024-12801","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12801","name":"NVD"}}],"advisories":[{"title":"CVE-2024-12801","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12801"}],"cwes":[918],"description":"QOS.CH logback-core Server-Side Request Forgery vulnerability","detail":"# QOS.CH logback-core Server-Side Request Forgery vulnerability Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 1.5.12 on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML. The attacks involves the modification of DOCTYPE declaration in\u00a0 XML configuration files.","ratings":[{"method":"CVSSv4","severity":"low","score":2.4,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/V:D/U:Clear"}],"published":"2024-12-19T18:31:37","updated":"2025-01-03T19:09:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar\", \"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar\", \"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-6481","bom-ref":"CVE-2023-6481/pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","affects":[{"ref":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","versions":[{"range":"vers:maven/!=1.4.14|<1.4.14","status":"affected"},{"version":"1.4.14","status":"unaffected"}]}],"recommendation":"Update to version 1.4.14 to resolve CVE-2023-6481 or update to version 1.5.13 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6481","name":"NVD"},"references":[{"id":"CVE-2023-6481","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6481","name":"NVD"}}],"advisories":[{"title":"CVE-2023-6481","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6481"}],"cwes":[],"description":"Logback is vulnerable to an attacker mounting a Denial-Of-Service attack by sending poisoned data","detail":"# Logback is vulnerable to an attacker mounting a Denial-Of-Service attack by sending poisoned data A serialization vulnerability in logback receiver component part of logback version 1.4.13,\u00a01.3.13 and\u00a01.2.12 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.","ratings":[{"method":"CVSSv31","severity":"high","score":7.1,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"published":"2023-12-04T09:30:23","updated":"2023-12-08T15:26:30","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar\", \"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar\", \"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-12798","bom-ref":"CVE-2024-12798/pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","affects":[{"ref":"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar","versions":[{"range":"vers:maven/!=1.5.13|<1.5.13","status":"affected"},{"version":"1.5.13","status":"unaffected"}]}],"recommendation":"Update to version 1.5.13.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12798","name":"NVD"},"references":[{"id":"CVE-2024-12798","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12798","name":"NVD"}}],"advisories":[{"title":"CVE-2024-12798","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12798"}],"cwes":[917],"description":"QOS.CH logback-core Expression Language Injection vulnerability","detail":"# QOS.CH logback-core Expression Language Injection vulnerability ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core up to and including version 1.5.12 in Java applications allows attackers to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.","ratings":[{"method":"CVSSv4","severity":"medium","score":5.9,"vector":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear"}],"published":"2024-12-19T18:31:37","updated":"2025-01-03T19:09:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-logging@1.5.1.RELEASE?type=jar\", \"pkg:maven/ch.qos.logback/logback-classic@1.1.9?type=jar\", \"pkg:maven/ch.qos.logback/logback-core@1.1.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-44487","bom-ref":"CVE-2023-44487/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.0-M12|<11.0.0-M12","status":"affected"},{"version":"11.0.0-M12","status":"unaffected"}]}],"recommendation":"Update to version 11.0.0-M12 to resolve CVE-2023-44487 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"},"references":[{"id":"ntap-20231016-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231016-0001"}},{"id":"K000137106","source":{"name":"F5 Advisory","url":"https://my.f5.com/manage/s/article/K000137106"}},{"id":"fedoraproject-msg-KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE"}},{"id":"dsa-5521","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5521"}},{"id":"openwall-oss-security-msg-2023-10-10-6","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/10/6"}},{"id":"fedoraproject-msg-3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A"}},{"id":"67764","source":{"name":"Swift Advisory","url":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764"}},{"id":"ntap-20240621-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0007"}},{"id":"fedoraproject-msg-VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU"}},{"id":"fedoraproject-msg-WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX"}},{"id":"fedoraproject-msg-WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH"}},{"id":"fedoraproject-msg-E72T67UPDRXHIDLO3OROR25YAMN4GGW5","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5"}},{"id":"openwall-oss-security-msg-2023-10-10-7","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/10/7"}},{"id":"fedoraproject-msg-KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE"}},{"id":"GHSA-vx74-f528-fxqg","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-vx74-f528-fxqg"}},{"id":"openwall-oss-security-msg-2023-10-13-9","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/13/9"}},{"id":"fedoraproject-msg-VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU"}},{"id":"fedoraproject-msg-BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ"}},{"id":"fedoraproject-msg-WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH"}},{"id":"GHSA-qppj-fm5r-hxr3","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3"}},{"id":"http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response","source":{"name":"Openssf Advisory","url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html"}},{"id":"debian-msg-msg00012","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html"}},{"id":"fedoraproject-msg-HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ"}},{"id":"msg00181","source":{"name":"Eclipse Advisory","url":"https://www.eclipse.org/lists/jetty-announce/msg00181.html"}},{"id":"dsa-5549","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5549"}},{"id":"GHSA-qppj-fm5r-hxr3","source":{"name":"GitHub Advisory","url":"https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3"}},{"id":"dsa-5558","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5558"}},{"id":"debian-msg-msg00023","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html"}},{"id":"fedoraproject-msg-WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX"}},{"id":"fedoraproject-msg-ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3"}},{"id":"how-it-works-the-novel-http2-rapid-reset-ddos-attack","source":{"name":"Google Advisory","url":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"}},{"id":"cve-2023-44487-http-2-rapid-reset-attack","source":{"name":"Qualys Advisory","url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack"}},{"id":"fedoraproject-msg-VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK"}},{"id":"cve-2023-44487","source":{"url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"}},{"id":"fedoraproject-msg-2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI"}},{"id":"google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps","source":{"name":"Google Advisory","url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps"}},{"id":"fedoraproject-msg-JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY"}},{"id":"apache-msg-5py8h42mxfsn8l1wy6o41xwhsjlsd87q","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q"}},{"id":"hyper-http2-rapid-reset-unaffected","source":{"name":"Seanmonstar Advisory","url":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected"}},{"id":"GHSA-2m7v-gc89-fjqf","source":{"name":"GitHub Advisory","url":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf"}},{"id":"CVE-2023-44487","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487","name":"NVD"}},{"id":"fedoraproject-msg-ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4"}},{"id":"debian-msg-msg00020","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}},{"id":"w3-msg-2023OctDec","source":{"name":"W3 Mailing List","url":"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html"}},{"id":"HTTP2-Rapid-Reset-Attack","source":{"name":"Phoronix Advisory","url":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack"}},{"id":"fedoraproject-msg-ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT"}},{"id":"openwall-oss-security-msg-2023-10-10-6","source":{"name":"Openwall Mailing List","url":"https://www.openwall.com/lists/oss-security/2023/10/10/6"}},{"id":"proxmox-bugzilla-4988","source":{"name":"Proxmox Bugzilla","url":"https://bugzilla.proxmox.com/show_bug.cgi?id=4988"}},{"id":"fedoraproject-msg-ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT"}},{"id":"fedoraproject-msg-VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK"}},{"id":"redhat-bugzilla-2242803","source":{"name":"Red Hat Bugzilla","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803"}},{"id":"fedoraproject-msg-X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y"}},{"id":"http2_rapid_reset_zeroday","source":{"name":"Theregister Advisory","url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday"}},{"id":"AWS-2023-011","source":{"name":"Amazon Advisory","url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011"}},{"id":"fedoraproject-msg-JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ"}},{"id":"fedoraproject-msg-BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ"}},{"id":"cve-2023-44487","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/security/cve/cve-2023-44487"}},{"id":"debian-msg-msg00045","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html"}},{"id":"fedoraproject-msg-LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG"}},{"id":"fedoraproject-msg-3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A"}},{"id":"fedoraproject-msg-JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ"}},{"id":"openwall-oss-security-msg-2023-10-20-8","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/20/8"}},{"id":"microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2"}},{"id":"suse-bugzilla-1216123","source":{"name":"Suse Bugzilla","url":"https://bugzilla.suse.com/show_bug.cgi?id=1216123"}},{"id":"haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","source":{"name":"Haproxy Advisory","url":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487"}},{"id":"internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","source":{"name":"Darkreading Advisory","url":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event"}},{"id":"fedoraproject-msg-HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ"}},{"id":"debian-msg-msg00024","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html"}},{"id":"how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size","source":{"name":"Arstechnica Advisory","url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size"}},{"id":"CVE-2023-44487","source":{"name":"Ubuntu Advisory","url":"https://ubuntu.com/security/CVE-2023-44487"}},{"id":"dsa-5522","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5522"}},{"id":"ntap-20240621-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0006"}},{"id":"fedoraproject-msg-XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2"}},{"id":"fedoraproject-msg-2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI"}},{"id":"rapid-reset-http-2-vulnerablilty","source":{"name":"Litespeedtech Advisory","url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty"}},{"id":"cve-2023-44487","source":{"url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487"}},{"id":"google-msg-UDd7VKQuAAAJ","source":{"name":"Google Mailing List","url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ"}},{"id":"openwall-oss-security-msg-2023-10-18-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/18/4"}},{"id":"GHSA-xpw8-rcwv-8f8p","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p"}},{"id":"fedoraproject-msg-ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3"}},{"id":"openwall-oss-security-msg-2023-10-19-6","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/19/6"}},{"id":"fedoraproject-msg-LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG"}},{"id":"openwall-oss-security-msg-2023-10-18-8","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/18/8"}},{"id":"cve-2023-44487","source":{"url":"https://blog.vespa.ai/cve-2023-44487"}},{"id":"CVE-2023-44487","source":{"url":"https://security.paloaltonetworks.com/CVE-2023-44487"}},{"id":"fedoraproject-msg-CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2"}},{"id":"netlify-successfully-mitigates-cve-2023-44487","source":{"name":"Netlify Advisory","url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487"}},{"id":"glsa-202311-09","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202311-09"}},{"id":"CVE-2023-44487","source":{"name":"Microsoft Advisory","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487"}},{"id":"new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records","source":{"name":"Bleepingcomputer Advisory","url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records"}},{"id":"google-msg-iNNxDTCjZvo","source":{"name":"Google Mailing List","url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo"}},{"id":"fedoraproject-msg-FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU"}},{"id":"fedoraproject-msg-ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4"}},{"id":"fedoraproject-msg-E72T67UPDRXHIDLO3OROR25YAMN4GGW5","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5"}},{"id":"debian-msg-msg00047","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html"}},{"id":"http-2-rapid-reset-attack-impacting-f5-nginx-products","source":{"name":"Nginx Advisory","url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products"}},{"id":"fedoraproject-msg-XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2"}},{"id":"fedoraproject-msg-LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL"}},{"id":"dsa-5540","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5540"}},{"id":"59715","source":{"name":"Hashicorp Advisory","url":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715"}},{"id":"fedoraproject-msg-X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y"}},{"id":"fedoraproject-msg-CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2"}},{"id":"dsa-5570","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5570"}},{"id":"fedoraproject-msg-FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU"}},{"id":"openwall-oss-security-msg-2023-10-13-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/13/4"}},{"id":"nginx-msg-S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK","source":{"name":"Nginx Mailing List","url":"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html"}},{"id":"ntap-20240426-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240426-0007"}},{"id":"fedoraproject-msg-JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY"}},{"id":"fedoraproject-msg-LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL"}}],"advisories":[{"title":"NetApp Advisory ntap-20231016-0001","url":"https://security.netapp.com/advisory/ntap-20231016-0001"},{"title":"F5 Advisory K000137106","url":"https://my.f5.com/manage/s/article/K000137106"},{"title":"Debian Advisory dsa-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"title":"Swift Advisory 67764","url":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764"},{"title":"NetApp Advisory ntap-20240621-0007","url":"https://security.netapp.com/advisory/ntap-20240621-0007"},{"title":"GitHub Advisory GHSA-vx74-f528-fxqg","url":"https://github.com/advisories/GHSA-vx74-f528-fxqg"},{"title":"GitHub Advisory GHSA-qppj-fm5r-hxr3","url":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3"},{"title":"Openssf Advisory http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response","url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response"},{"title":"Eclipse Advisory msg00181","url":"https://www.eclipse.org/lists/jetty-announce/msg00181.html"},{"title":"Debian Advisory dsa-5549","url":"https://www.debian.org/security/2023/dsa-5549"},{"title":"GitHub Advisory GHSA-qppj-fm5r-hxr3","url":"https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3"},{"title":"Debian Advisory dsa-5558","url":"https://www.debian.org/security/2023/dsa-5558"},{"title":"Google Advisory how-it-works-the-novel-http2-rapid-reset-ddos-attack","url":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"},{"title":"Qualys Advisory cve-2023-44487-http-2-rapid-reset-attack","url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack"},{"title":"cve-2023-44487","url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"},{"title":"Google Advisory google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps","url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps"},{"title":"Seanmonstar Advisory hyper-http2-rapid-reset-unaffected","url":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected"},{"title":"GitHub Advisory GHSA-2m7v-gc89-fjqf","url":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf"},{"title":"CVE-2023-44487","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487"},{"title":"Phoronix Advisory HTTP2-Rapid-Reset-Attack","url":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack"},{"title":"Theregister Advisory http2_rapid_reset_zeroday","url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday"},{"title":"Amazon Advisory AWS-2023-011","url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011"},{"title":"Red Hat Advisory cve-2023-44487","url":"https://access.redhat.com/security/cve/cve-2023-44487"},{"title":"Microsoft Advisory microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http","url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2"},{"title":"Haproxy Advisory haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","url":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487"},{"title":"Darkreading Advisory internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","url":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event"},{"title":"Arstechnica Advisory how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size","url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size"},{"title":"Ubuntu Advisory CVE-2023-44487","url":"https://ubuntu.com/security/CVE-2023-44487"},{"title":"Debian Advisory dsa-5522","url":"https://www.debian.org/security/2023/dsa-5522"},{"title":"NetApp Advisory ntap-20240621-0006","url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"title":"Litespeedtech Advisory rapid-reset-http-2-vulnerablilty","url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty"},{"title":"cve-2023-44487","url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487"},{"title":"GitHub Advisory GHSA-xpw8-rcwv-8f8p","url":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p"},{"title":"cve-2023-44487","url":"https://blog.vespa.ai/cve-2023-44487"},{"title":"CVE-2023-44487","url":"https://security.paloaltonetworks.com/CVE-2023-44487"},{"title":"Netlify Advisory netlify-successfully-mitigates-cve-2023-44487","url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487"},{"title":"Gentoo Advisory glsa-202311-09","url":"https://security.gentoo.org/glsa/202311-09"},{"title":"Microsoft Advisory CVE-2023-44487","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487"},{"title":"Bleepingcomputer Advisory new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records","url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records"},{"title":"Nginx Advisory http-2-rapid-reset-attack-impacting-f5-nginx-products","url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products"},{"title":"Debian Advisory dsa-5540","url":"https://www.debian.org/security/2023/dsa-5540"},{"title":"Hashicorp Advisory 59715","url":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715"},{"title":"Debian Advisory dsa-5570","url":"https://www.debian.org/security/2023/dsa-5570"},{"title":"NetApp Advisory ntap-20240426-0007","url":"https://security.netapp.com/advisory/ntap-20240426-0007"}],"cwes":[400],"description":"HTTP/2 Stream Cancellation Attack","detail":"# HTTP/2 Stream Cancellation Attack ## HTTP/2 Rapid reset attack The HTTP/2 protocol allows clients to indicate to the server that a previous stream should be canceled by sending a RST_STREAM frame. The protocol does not require the client and server to coordinate the cancellation in any way, the client may do it unilaterally. The client may also assume that the cancellation will take effect immediately when the server receives the RST_STREAM frame, before any other data from that TCP connection is processed. Abuse of this feature is called a Rapid Reset attack because it relies on the ability for an endpoint to send a RST_STREAM frame immediately after sending a request frame, which makes the other endpoint start working and then rapidly resets the request. The request is canceled, but leaves the HTTP/2 connection open. The HTTP/2 Rapid Reset attack built on this capability is simple: The client opens a large number of streams at once as in the standard HTTP/2 attack, but rather than waiting for a response to each request stream from the server or proxy, the client cancels each request immediately. The ability to reset streams immediately allows each connection to have an indefinite number of requests in flight. By explicitly canceling the requests, the attacker never exceeds the limit on the number of concurrent open streams. The number of in-flight requests is no longer dependent on the round-trip time (RTT), but only on the available network bandwidth. In a typical HTTP/2 server implementation, the server will still have to do significant amounts of work for canceled requests, such as allocating new stream data structures, parsing the query and doing header decompression, and mapping the URL to a resource. For reverse proxy implementations, the request may be proxied to the backend server before the RST_STREAM frame is processed. The client on the other hand paid almost no costs for sending the requests. This creates an exploitable cost asymmetry between the server and the client. Multiple software artifacts implementing HTTP/2 are affected. This advisory was originally ingested from the `swift-nio-http2` repo advisory and their original conent follows. ## swift-nio-http2 specific advisory swift-nio-http2 is vulnerable to a denial-of-service vulnerability in which a malicious client can create and then reset a large number of HTTP/2 streams in a short period of time. This causes swift-nio-http2 to commit to a large amount of expensive work which it then throws away, including creating entirely new `Channel`s to serve the traffic. This can easily overwhelm an `EventLoop` and prevent it from making forward progress. swift-nio-http2 1.28 contains a remediation for this issue that applies reset counter using a sliding window. This constrains the number of stream resets that may occur in a given window of time. Clients violating this limit will have their connections torn down. This allows clients to continue to cancel streams for legitimate reasons, while constraining malicious actors. ## Related CVE(s) BIT-apisix-2023-44487, BIT-aspnet-core-2023-44487, BIT-contour-2023-44487, BIT-dotnet-2023-44487, BIT-dotnet-sdk-2023-44487, BIT-envoy-2023-44487, BIT-golang-2023-44487, BIT-jenkins-2023-44487, BIT-kong-2023-44487, BIT-nginx-2023-44487, BIT-nginx-ingress-controller-2023-44487, BIT-node-2023-44487, BIT-node-min-2023-44487, BIT-solr-2023-44487, BIT-tomcat-2023-44487, BIT-varnish-2023-44487, CGA-4mmr-qwxr-f88g, CGA-5jp5-95p2-jw83, CGA-5v4r-558c-254r, CGA-9w4r-68hh-64j5, CGA-m49h-wjp5-j434, CGA-mp43-q6p3-96v2, CVE-2023-44487, GHSA-m425-mq94-257g, GO-2023-2153","ratings":[{"method":"CVSSv4","severity":"medium","score":6.9,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}],"published":"2023-10-10T21:28:24","updated":"2025-03-07T21:47:01","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2024-56337","bom-ref":"CVE-2024-56337/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.2|<11.0.2","status":"affected"},{"version":"11.0.2","status":"unaffected"}]}],"recommendation":"Update to version 11.0.2 to resolve CVE-2024-56337 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56337","name":"NVD"},"references":[{"id":"CVE-2024-50379","source":{"url":"https://www.cve.org/CVERecord?id=CVE-2024-50379"}},{"id":"apache-msg-b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp"}},{"id":"ntap-20250103-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250103-0002"}},{"id":"CVE-2024-56337","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56337","name":"NVD"}}],"advisories":[{"title":"CVE-2024-50379","url":"https://www.cve.org/CVERecord?id=CVE-2024-50379"},{"title":"NetApp Advisory ntap-20250103-0002","url":"https://security.netapp.com/advisory/ntap-20250103-0002"},{"title":"CVE-2024-56337","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56337"}],"cwes":[367],"description":"Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability","detail":"# Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The mitigation for CVE-2024-50379 was incomplete. Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property\u00a0sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the\u00a0system property sun.io.useCanonCaches, if set, must be set to false\u00a0(it defaults to false) - running on Java 21 onwards: no further configuration is required\u00a0(the system property and the problematic cache have been removed) Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\u00a0sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\u00a0sun.io.useCanonCaches to false by default where it can. ## Related CVE(s) BIT-tomcat-2024-56337, CVE-2024-56337","ratings":[{"method":"CVSSv4","severity":"high","score":7.2,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U"}],"published":"2024-12-20T18:31:32","updated":"2025-01-08T16:25:33","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2021-24122","bom-ref":"CVE-2021-24122/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=9.0.40|<9.0.40","status":"affected"},{"version":"9.0.40","status":"unaffected"}]}],"recommendation":"Update to version 9.0.40 to resolve CVE-2021-24122 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24122","name":"NVD"},"references":[{"id":"apache-msg-r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"CVE-2021-24122","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24122","name":"NVD"}},{"id":"apache-msg-rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E"}},{"id":"openwall-oss-security-msg-2021-01-14-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/01/14/1"}},{"id":"apache-msg-r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"ntap-20210212-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210212-0008"}},{"id":"apache-msg-r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html"}}],"advisories":[{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"CVE-2021-24122","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24122"},{"title":"NetApp Advisory ntap-20210212-0008","url":"https://security.netapp.com/advisory/ntap-20210212-0008"}],"cwes":[200,706],"description":"Information Disclosure in Apache Tomcat","detail":"# Information Disclosure in Apache Tomcat When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances. ## Related CVE(s) BIT-tomcat-2021-24122, CVE-2021-24122","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2021-05-13T22:30:02","updated":"2024-03-11T16:46:40","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-8034","bom-ref":"CVE-2018-8034/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.32|<8.5.32","status":"affected"},{"version":"8.5.32","status":"unaffected"}]}],"recommendation":"Update to version 8.5.32 to resolve CVE-2018-8034 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8034","name":"NVD"},"references":[{"id":"archive-msg-1041374","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200517032514/http://www.securitytracker.com/id/1041374"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1529","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1529"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2018-8034","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8034","name":"NVD"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E"}},{"id":"RHSA-2019:1160","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1160"}},{"id":"apache-msg-ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:2205","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2205"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20180817-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180817-0001"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:3892","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3892"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"RHSA-2019:1159","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1159"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1161","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1161"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"securitytracker-msg-1041374","source":{"name":"Securitytracker Mailing List","url":"http://www.securitytracker.com/id/1041374"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0131","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0131"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00047","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html"}},{"id":"RHSA-2019:0450","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0450"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-104895","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104895"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0130","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0130"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0451","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0451"}},{"id":"apache-msg-201807","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E"}},{"id":"securityfocus-msg-104895","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/104895"}},{"id":"RHSA-2019:1162","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1162"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-201807","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283%40minotaur.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2019:1529","url":"https://access.redhat.com/errata/RHSA-2019:1529"},{"title":"CVE-2018-8034","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8034"},{"title":"Red Hat Advisory RHSA-2019:1160","url":"https://access.redhat.com/errata/RHSA-2019:1160"},{"title":"Red Hat Advisory RHSA-2019:2205","url":"https://access.redhat.com/errata/RHSA-2019:2205"},{"title":"NetApp Advisory ntap-20180817-0001","url":"https://security.netapp.com/advisory/ntap-20180817-0001"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Red Hat Advisory RHSA-2019:3892","url":"https://access.redhat.com/errata/RHSA-2019:3892"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Red Hat Advisory RHSA-2019:1159","url":"https://access.redhat.com/errata/RHSA-2019:1159"},{"title":"Red Hat Advisory RHSA-2019:1161","url":"https://access.redhat.com/errata/RHSA-2019:1161"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Red Hat Advisory RHSA-2019:0131","url":"https://access.redhat.com/errata/RHSA-2019:0131"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Red Hat Advisory RHSA-2019:0450","url":"https://access.redhat.com/errata/RHSA-2019:0450"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Red Hat Advisory RHSA-2019:0130","url":"https://access.redhat.com/errata/RHSA-2019:0130"},{"title":"Red Hat Advisory RHSA-2019:0451","url":"https://access.redhat.com/errata/RHSA-2019:0451"},{"title":"Red Hat Advisory RHSA-2019:1162","url":"https://access.redhat.com/errata/RHSA-2019:1162"}],"cwes":[295],"description":"The host name verification missing in Apache Tomcat","detail":"# The host name verification missing in Apache Tomcat The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T16:32:43","updated":"2024-10-21T19:23:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2024-50379","bom-ref":"CVE-2024-50379/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.2|<11.0.2","status":"affected"},{"version":"11.0.2","status":"unaffected"}]}],"recommendation":"Update to version 11.0.2 to resolve CVE-2024-50379 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50379","name":"NVD"},"references":[{"id":"CVE-2024-50379","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50379","name":"NVD"}},{"id":"openwall-oss-security-msg-2024-12-17-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/12/17/4"}},{"id":"openwall-oss-security-msg-2024-12-18-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/12/18/2"}},{"id":"ntap-20250103-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250103-0003"}},{"id":"apache-msg-y6lj6q1xnp822g6ro70tn19sgtjmr80r","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r"}}],"advisories":[{"title":"CVE-2024-50379","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50379"},{"title":"NetApp Advisory ntap-20250103-0003","url":"https://security.netapp.com/advisory/ntap-20250103-0003"}],"cwes":[367],"description":"Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability","detail":"# Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration). This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue. ## Related CVE(s) BIT-tomcat-2024-50379, CVE-2024-50379","ratings":[{"method":"CVSSv4","severity":"high","score":7.2,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U"}],"published":"2024-12-17T15:31:43","updated":"2025-01-03T12:35:42","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-11784","bom-ref":"CVE-2018-11784/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.34|<8.5.34","status":"affected"},{"version":"8.5.34","status":"unaffected"}]}],"recommendation":"Update to version 8.5.34 to resolve CVE-2018-11784 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11784","name":"NVD"},"references":[{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1529","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1529"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:0485","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0485"}},{"id":"GHSA-5q99-f34m-67gc","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-5q99-f34m-67gc"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-105524","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227030058/http://www.securityfocus.com/bid/105524"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"fedoraproject-msg-BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP"}},{"id":"opensuse-msg-msg00056","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"RHSA-2019:0131","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0131"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"ntap-20181014-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20181014-0002"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00006","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00030","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html"}},{"id":"packetstormsecurity-exploit-Apache-Tomcat-9.0.0M1-Open-Redirect.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2018-11784","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11784","name":"NVD"}},{"id":"RHSA-2019:0130","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0130"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00005","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2019:1529","url":"https://access.redhat.com/errata/RHSA-2019:1529"},{"title":"Red Hat Advisory RHSA-2019:0485","url":"https://access.redhat.com/errata/RHSA-2019:0485"},{"title":"GitHub Advisory GHSA-5q99-f34m-67gc","url":"https://github.com/advisories/GHSA-5q99-f34m-67gc"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"Red Hat Advisory RHSA-2019:0131","url":"https://access.redhat.com/errata/RHSA-2019:0131"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"NetApp Advisory ntap-20181014-0002","url":"https://security.netapp.com/advisory/ntap-20181014-0002"},{"title":"CVE-2018-11784","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11784"},{"title":"Red Hat Advisory RHSA-2019:0130","url":"https://access.redhat.com/errata/RHSA-2019:0130"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}],"cwes":[601],"description":"Apache Tomcat Open Redirect vulnerability","detail":"# Apache Tomcat Open Redirect vulnerability When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.","ratings":[{"method":"CVSSv3","severity":"medium","score":4.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"published":"2018-10-17T16:31:02","updated":"2024-03-11T05:31:33","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2018-1304","bom-ref":"CVE-2018-1304/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.28|<8.5.28","status":"affected"},{"version":"8.5.28","status":"unaffected"}]}],"recommendation":"Update to version 8.5.28 to resolve CVE-2018-1304 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1304","name":"NVD"},"references":[{"id":"RHSA-2018:1320","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1320"}},{"id":"archive-msg-1040427","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200516074457/http://www.securitytracker.com/id/1040427"}},{"id":"apache-msg-b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:1447","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1447"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20180706-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180706-0001"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:2205","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2205"}},{"id":"GHSA-6rxj-58jh-436r","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-6rxj-58jh-436r"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E"}},{"id":"RHSA-2018:1451","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1451"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:1449","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1449"}},{"id":"debian-msg-msg00044","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"RHSA-2018:0465","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:0465"}},{"id":"RHSA-2018:2939","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2939"}},{"id":"cpujul2018-4258247","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2018-1304","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1304","name":"NVD"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:0466","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:0466"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00004","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html"}},{"id":"RHSA-2018:1450","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1450"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-103170","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227102806/http://www.securityfocus.com/bid/103170"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:1448","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1448"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:1320","url":"https://access.redhat.com/errata/RHSA-2018:1320"},{"title":"Red Hat Advisory RHSA-2018:1447","url":"https://access.redhat.com/errata/RHSA-2018:1447"},{"title":"NetApp Advisory ntap-20180706-0001","url":"https://security.netapp.com/advisory/ntap-20180706-0001"},{"title":"Red Hat Advisory RHSA-2019:2205","url":"https://access.redhat.com/errata/RHSA-2019:2205"},{"title":"GitHub Advisory GHSA-6rxj-58jh-436r","url":"https://github.com/advisories/GHSA-6rxj-58jh-436r"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Red Hat Advisory RHSA-2018:1451","url":"https://access.redhat.com/errata/RHSA-2018:1451"},{"title":"Red Hat Advisory RHSA-2018:1449","url":"https://access.redhat.com/errata/RHSA-2018:1449"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Red Hat Advisory RHSA-2018:0465","url":"https://access.redhat.com/errata/RHSA-2018:0465"},{"title":"Red Hat Advisory RHSA-2018:2939","url":"https://access.redhat.com/errata/RHSA-2018:2939"},{"title":"Oracle Advisory cpujul2018-4258247","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"CVE-2018-1304","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1304"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Red Hat Advisory RHSA-2018:0466","url":"https://access.redhat.com/errata/RHSA-2018:0466"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Red Hat Advisory RHSA-2018:1450","url":"https://access.redhat.com/errata/RHSA-2018:1450"},{"title":"Red Hat Advisory RHSA-2018:1448","url":"https://access.redhat.com/errata/RHSA-2018:1448"}],"cwes":[],"description":"Apache Tomcat unauthorized access vulnerability","detail":"# Apache Tomcat unauthorized access vulnerability The URL pattern of \"\" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T16:31:17","updated":"2024-11-29T05:39:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-8037","bom-ref":"CVE-2018-8037/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=9.0.10|<9.0.10","status":"affected"},{"version":"9.0.10","status":"unaffected"}]}],"recommendation":"Update to version 9.0.10 to resolve CVE-2018-8037 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8037","name":"NVD"},"references":[{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1529","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1529"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-201808","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201808.mbox/%3C0c616b4d-4e81-e7f8-b81d-1bb4c575aa33%40apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2867","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2867"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20180817-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180817-0001"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"apache-msg-2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39%40%3Cusers.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2018-8037","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8037","name":"NVD"}},{"id":"apache-msg-5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c@%3Cusers.tomcat.apache.org%3E"}},{"id":"archive-msg-1041376","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200515223903/http://www.securitytracker.com/id/1041376"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-201807","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090623.GA92700%40minotaur.apache.org%3E"}},{"id":"archive-msg-104894","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227102808/http://www.securityfocus.com/bid/104894"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2868","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2868"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2019:1529","url":"https://access.redhat.com/errata/RHSA-2019:1529"},{"title":"Red Hat Advisory RHSA-2018:2867","url":"https://access.redhat.com/errata/RHSA-2018:2867"},{"title":"NetApp Advisory ntap-20180817-0001","url":"https://security.netapp.com/advisory/ntap-20180817-0001"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"CVE-2018-8037","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8037"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Red Hat Advisory RHSA-2018:2868","url":"https://access.redhat.com/errata/RHSA-2018:2868"}],"cwes":[362],"description":"Apache Tomcat Race Condition vulnerability","detail":"# Apache Tomcat Race Condition vulnerability If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T16:33:02","updated":"2024-03-11T05:32:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-17569","bom-ref":"CVE-2019-17569/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.51|<8.5.51","status":"affected"},{"version":"8.5.51","status":"unaffected"}]}],"recommendation":"Update to version 8.5.51 to resolve CVE-2019-17569 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17569","name":"NVD"},"references":[{"id":"CVE-2019-17569","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17569","name":"NVD"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-r88def002c5c78534674ca67472e035099fbe088813d50062094a1390","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"ntap-20200327-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200327-0005"}},{"id":"dsa-4673","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4673"}},{"id":"apache-msg-rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E"}},{"id":"debian-msg-msg00006","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"opensuse-msg-msg00025","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html"}}],"advisories":[{"title":"CVE-2019-17569","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17569"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"NetApp Advisory ntap-20200327-0005","url":"https://security.netapp.com/advisory/ntap-20200327-0005"},{"title":"Debian Advisory dsa-4673","url":"https://www.debian.org/security/2020/dsa-4673"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"cwes":[444],"description":"Potential HTTP request smuggling in Apache Tomcat","detail":"# Potential HTTP request smuggling in Apache Tomcat The refactoring present in Apache Tomcat versions 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"published":"2020-02-28T01:10:58","updated":"2024-02-21T05:31:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2024-24549","bom-ref":"CVE-2024-24549/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<=8.5.98|!=8.5.99","status":"affected"},{"version":"8.5.99","status":"unaffected"}]}],"recommendation":"Update to version 8.5.99 to resolve CVE-2024-24549 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24549","name":"NVD"},"references":[{"id":"fedoraproject-msg-3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B"}},{"id":"fedoraproject-msg-736G4GPZWS2DSQO5WKXO3G6OMZKFEK55","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55"}},{"id":"CVE-2024-24549","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24549","name":"NVD"}},{"id":"apache-msg-4c50rmomhbbsdgfjsgwlb51xdwfjdcvg","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg"}},{"id":"openwall-oss-security-msg-2024-03-13-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/03/13/3"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html"}},{"id":"ntap-20240402-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240402-0002"}}],"advisories":[{"title":"CVE-2024-24549","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24549"},{"title":"NetApp Advisory ntap-20240402-0002","url":"https://security.netapp.com/advisory/ntap-20240402-0002"}],"cwes":[20],"description":"Apache Tomcat Denial of Service due to improper input validation vulnerability for HTTP/2 requests","detail":"# Apache Tomcat Denial of Service due to improper input validation vulnerability for HTTP/2 requests Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. ## Related CVE(s) BIT-tomcat-2024-24549, CVE-2024-24549","ratings":[{"method":"CVSSv4","severity":"medium","score":6.6,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U"}],"published":"2024-03-13T18:31:34","updated":"2025-02-13T19:13:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2025-24813","bom-ref":"CVE-2025-24813/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.3|<11.0.3","status":"affected"},{"version":"11.0.3","status":"unaffected"}]}],"recommendation":"Update to version 11.0.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-24813","name":"NVD"},"references":[{"id":"openwall-oss-security-msg-2025-03-10-5","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/03/10/5"}},{"id":"CVE-2025-24813","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-24813","name":"NVD"}},{"id":"apache-msg-j5fkjv2k477os90nczf2v9l61fb0kkgq","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq"}},{"id":"ntap-20250321-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250321-0001"}},{"id":"debian-msg-msg00003","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2025/04/msg00003.html"}}],"advisories":[{"title":"CVE-2025-24813","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-24813"},{"title":"NetApp Advisory ntap-20250321-0001","url":"https://security.netapp.com/advisory/ntap-20250321-0001"}],"cwes":[44,502],"description":"Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT","detail":"# Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT Path Equivalence: 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: -\u00a0writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of\u00a0a target URL for public uploads -\u00a0attacker knowledge of the names of security sensitive files being\u00a0uploaded -\u00a0the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) -\u00a0support for partial PUT (enabled by default) -\u00a0application was using Tomcat's file based session persistence with the\u00a0default storage location -\u00a0application included a library that may be leveraged in a\u00a0deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue. ## Related CVE(s) BIT-tomcat-2025-24813, CVE-2025-24813","ratings":[{"method":"CVSSv4","severity":"critical","score":9.2,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}],"published":"2025-03-10T18:31:56","updated":"2025-04-03T13:59:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-0232","bom-ref":"CVE-2019-0232/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=9.0.17|<9.0.17","status":"affected"},{"version":"9.0.17","status":"unaffected"}]}],"recommendation":"Update to version 9.0.17 to resolve CVE-2019-0232 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0232","name":"NVD"},"references":[{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"ntap-20190419-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190419-0001"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat","source":{"name":"Trendmicro Advisory","url":"https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/4","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/4"}},{"id":"java-and-command-line-injections-in-windows","source":{"name":"Blogspot Advisory","url":"https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html"}},{"id":"Synology_SA_19_17","source":{"name":"Synology Advisory","url":"https://www.synology.com/security/advisory/Synology_SA_19_17"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"everyone-quotes-command-line-arguments-the-wrong-way","source":{"name":"Archive Advisory","url":"https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way"}},{"id":"apache-msg-673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a%40%3Ccommits.ofbiz.apache.org%3E"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"apache-msg-f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a@%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35@%3Ccommits.ofbiz.apache.org%3E"}},{"id":"brocade-security-advisory-2019-784","source":{"name":"Broadcom Advisory","url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784"}},{"id":"CVE-2019-0232","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0232","name":"NVD"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"packetstormsecurity-exploit-Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html"}},{"id":"apache-msg-dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"RHSA-2019:1712","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1712"}},{"id":"apache-msg-5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac%40%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35%40%3Ccommits.ofbiz.apache.org%3E"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"apache-msg-r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E"}},{"id":"archive-msg-107906","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227030103/http://www.securityfocus.com/bid/107906"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232","source":{"name":"Nightwatchcybersecurity Advisory","url":"https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232"}},{"id":"apache-msg-5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac@%3Ccommits.ofbiz.apache.org%3E"}}],"advisories":[{"title":"NetApp Advisory ntap-20190419-0001","url":"https://security.netapp.com/advisory/ntap-20190419-0001"},{"title":"Trendmicro Advisory uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat","url":"https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat"},{"title":"Blogspot Advisory java-and-command-line-injections-in-windows","url":"https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html"},{"title":"Synology Advisory Synology_SA_19_17","url":"https://www.synology.com/security/advisory/Synology_SA_19_17"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Archive Advisory everyone-quotes-command-line-arguments-the-wrong-way","url":"https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Broadcom Advisory brocade-security-advisory-2019-784","url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784"},{"title":"CVE-2019-0232","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0232"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2019:1712","url":"https://access.redhat.com/errata/RHSA-2019:1712"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Nightwatchcybersecurity Advisory remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232","url":"https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[78],"description":"Apache Tomcat OS Command Injection vulnerability","detail":"# Apache Tomcat OS Command Injection vulnerability When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).","ratings":[{"method":"CVSSv3","severity":"high","score":8.1,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2019-04-18T14:27:35","updated":"2024-03-16T05:19:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2019-17563","bom-ref":"CVE-2019-17563/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.50|<8.5.50","status":"affected"},{"version":"8.5.50","status":"unaffected"}]}],"recommendation":"Update to version 8.5.50 to resolve CVE-2019-17563 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17563","name":"NVD"},"references":[{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20200107-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200107-0001"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00024","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html"}},{"id":"CVE-2019-17563","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17563","name":"NVD"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"apache-msg-8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00026","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"}},{"id":"apache-msg-reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"glsa-202003-43","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202003-43"}},{"id":"opensuse-msg-msg00013","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}}],"advisories":[{"title":"NetApp Advisory ntap-20200107-0001","url":"https://security.netapp.com/advisory/ntap-20200107-0001"},{"title":"CVE-2019-17563","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17563"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Gentoo Advisory glsa-202003-43","url":"https://security.gentoo.org/glsa/202003-43"}],"cwes":[384],"description":"In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack","detail":"# In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2019-12-26T18:22:26","updated":"2024-03-10T05:19:10","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2020-1938","bom-ref":"CVE-2020-1938/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=9.0.31|<9.0.31","status":"affected"},{"version":"9.0.31","status":"unaffected"}]}],"recommendation":"Update to version 9.0.31 to resolve CVE-2020-1938 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1938","name":"NVD"},"references":[{"id":"apache-msg-r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E"}},{"id":"apache-msg-r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E"}},{"id":"apache-msg-r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"fedoraproject-msg-K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG"}},{"id":"apache-msg-r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-L46WJIV6UV3FWA5O5YEY6XLA73RYD53B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E"}},{"id":"apache-msg-r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E"}},{"id":"dsa-4673","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4673"}},{"id":"opensuse-msg-msg00002","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html"}},{"id":"apache-msg-re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E"}},{"id":"apache-msg-r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00025","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html"}},{"id":"apache-msg-r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E"}},{"id":"apache-msg-r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E"}},{"id":"apache-msg-r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E"}},{"id":"fedoraproject-msg-L46WJIV6UV3FWA5O5YEY6XLA73RYD53B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B"}},{"id":"apache-msg-r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E"}},{"id":"apache-msg-rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"debian-msg-msg00006","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html"}},{"id":"apache-msg-rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E"}},{"id":"CVE-2020-1938","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1938","name":"NVD"}},{"id":"apache-msg-r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E"}},{"id":"ntap-20200226-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200226-0002"}},{"id":"apache-msg-rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"debian-msg-msg00026","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"}},{"id":"apache-msg-r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"apache-msg-rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E"}},{"id":"apache-msg-rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"}},{"id":"fedoraproject-msg-K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG"}},{"id":"apache-msg-rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E"}},{"id":"glsa-202003-43","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202003-43"}},{"id":"apache-msg-r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E"}},{"id":"fedoraproject-msg-2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS"}},{"id":"apache-msg-r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS"}}],"advisories":[{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Debian Advisory dsa-4673","url":"https://www.debian.org/security/2020/dsa-4673"},{"title":"CVE-2020-1938","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1938"},{"title":"NetApp Advisory ntap-20200226-0002","url":"https://security.netapp.com/advisory/ntap-20200226-0002"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Gentoo Advisory glsa-202003-43","url":"https://security.gentoo.org/glsa/202003-43"}],"cwes":[269],"description":"Improper Privilege Management in Tomcat","detail":"# Improper Privilege Management in Tomcat When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: returning arbitrary files from anywhere in the web application, processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. ## Related CVE(s) BIT-tomcat-2020-1938, CVE-2020-1938","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2020-06-15T18:51:21","updated":"2024-07-25T13:49:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2023-28709","bom-ref":"CVE-2023-28709/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.0-M5|<11.0.0-M5","status":"affected"},{"version":"11.0.0-M5","status":"unaffected"}]}],"recommendation":"Update to version 11.0.0-M5 to resolve CVE-2023-28709 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28709","name":"NVD"},"references":[{"id":"apache-msg-7wvxonzwb7k9hx9jt3q33cmy7j97jo3j","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j"}},{"id":"CVE-2023-28709","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28709","name":"NVD"}},{"id":"ntap-20230616-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230616-0004"}},{"id":"openwall-oss-security-msg-2023-05-22-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/05/22/1"}},{"id":"dsa-5521","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5521"}},{"id":"glsa-202305-37","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202305-37"}}],"advisories":[{"title":"CVE-2023-28709","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28709"},{"title":"NetApp Advisory ntap-20230616-0004","url":"https://security.netapp.com/advisory/ntap-20230616-0004"},{"title":"Debian Advisory dsa-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"title":"Gentoo Advisory glsa-202305-37","url":"https://security.gentoo.org/glsa/202305-37"}],"cwes":[193],"description":"Apache Tomcat - Fix for CVE-2023-24998 was incomplete","detail":"# Apache Tomcat - Fix for CVE-2023-24998 was incomplete The fix for CVE-2023-24998 was incomplete. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. ## Related CVE(s) BIT-tomcat-2023-28709, CVE-2023-28709","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-07-06T21:14:59","updated":"2024-04-24T19:31:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2024-21733","bom-ref":"CVE-2024-21733/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.64|<8.5.64","status":"affected"},{"version":"8.5.64","status":"unaffected"}]}],"recommendation":"Update to version 8.5.64 to resolve CVE-2024-21733 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21733","name":"NVD"},"references":[{"id":"CVE-2024-21733","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21733","name":"NVD"}},{"id":"openwall-oss-security-msg-2024-01-19-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/01/19/2"}},{"id":"apache-msg-h9bjqdd0odj6lhs2o96qgowcc6hb0cfz","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/h9bjqdd0odj6lhs2o96qgowcc6hb0cfz"}},{"id":"packetstormsecurity-exploit-Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html"}},{"id":"ntap-20240216-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240216-0005"}}],"advisories":[{"title":"CVE-2024-21733","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21733"},{"title":"NetApp Advisory ntap-20240216-0005","url":"https://security.netapp.com/advisory/ntap-20240216-0005"}],"cwes":[209],"description":"Apache Tomcat vulnerable to Generation of Error Message Containing Sensitive Information","detail":"# Apache Tomcat vulnerable to Generation of Error Message Containing Sensitive Information Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue. ## Related CVE(s) BIT-tomcat-2024-21733, CVE-2024-21733","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2024-01-19T12:30:18","updated":"2025-02-13T19:44:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2023-46589","bom-ref":"CVE-2023-46589/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.0-M11|<11.0.0-M11","status":"affected"},{"version":"11.0.0-M11","status":"unaffected"}]}],"recommendation":"Update to version 11.0.0-M11 to resolve CVE-2023-46589 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46589","name":"NVD"},"references":[{"id":"CVE-2023-46589","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46589","name":"NVD"}},{"id":"openwall-oss-security-msg-2023-11-28-2","source":{"name":"Openwall Mailing List","url":"https://www.openwall.com/lists/oss-security/2023/11/28/2"}},{"id":"ntap-20231214-0009","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231214-0009"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00001.html"}},{"id":"apache-msg-0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr"}},{"id":"openwall-oss-security-msg-2023-11-28-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/11/28/2"}}],"advisories":[{"title":"CVE-2023-46589","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46589"},{"title":"NetApp Advisory ntap-20231214-0009","url":"https://security.netapp.com/advisory/ntap-20231214-0009"}],"cwes":[20,444],"description":"Apache Tomcat Improper Input Validation vulnerability","detail":"# Apache Tomcat Improper Input Validation vulnerability Improper Input Validation vulnerability in Apache Tomcat. Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82, and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11\u00a0onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue. ## Related CVE(s) BIT-tomcat-2023-46589, CVE-2023-46589","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2023-11-28T18:30:23","updated":"2025-02-13T19:34:02","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2023-42795","bom-ref":"CVE-2023-42795/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.0-M12|<11.0.0-M12","status":"affected"},{"version":"11.0.0-M12","status":"unaffected"}]}],"recommendation":"Update to version 11.0.0-M12 to resolve CVE-2023-42795 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42795","name":"NVD"},"references":[{"id":"CVE-2023-42795","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42795","name":"NVD"}},{"id":"ntap-20231103-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231103-0007"}},{"id":"openwall-oss-security-msg-2023-10-10-9","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/10/9"}},{"id":"dsa-5521","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5521"}},{"id":"apache-msg-065jfyo583490r9j2v73nhpyxdob56lw","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/065jfyo583490r9j2v73nhpyxdob56lw"}},{"id":"dsa-5522","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5522"}},{"id":"debian-msg-msg00020","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}}],"advisories":[{"title":"CVE-2023-42795","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42795"},{"title":"NetApp Advisory ntap-20231103-0007","url":"https://security.netapp.com/advisory/ntap-20231103-0007"},{"title":"Debian Advisory dsa-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"title":"Debian Advisory dsa-5522","url":"https://www.debian.org/security/2023/dsa-5522"}],"cwes":[459],"description":"Apache Tomcat Incomplete Cleanup vulnerability","detail":"# Apache Tomcat Incomplete Cleanup vulnerability Incomplete Cleanup vulnerability in Apache Tomcat. When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. ## Related CVE(s) BIT-tomcat-2023-42795, CVE-2023-42795","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2023-10-10T18:31:35","updated":"2025-02-13T19:34:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2023-24998","bom-ref":"CVE-2023-24998/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=10.1.5|<10.1.5","status":"affected"},{"version":"10.1.5","status":"unaffected"}]}],"recommendation":"Update to version 10.1.5 to resolve CVE-2023-24998 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24998","name":"NVD"},"references":[{"id":"debian-msg-msg00020","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}},{"id":"openwall-oss-security-msg-2023-05-22-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/05/22/1"}},{"id":"CVE-2023-24998","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24998","name":"NVD"}},{"id":"ntap-20230302-0013","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230302-0013"}},{"id":"dsa-5522","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5522"}},{"id":"glsa-202305-37","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202305-37"}},{"id":"apache-msg-4xl4l09mhwg4vgsk7dxqogcjrobrrdoy","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy"}}],"advisories":[{"title":"CVE-2023-24998","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24998"},{"title":"NetApp Advisory ntap-20230302-0013","url":"https://security.netapp.com/advisory/ntap-20230302-0013"},{"title":"Debian Advisory dsa-5522","url":"https://www.debian.org/security/2023/dsa-5522"},{"title":"Gentoo Advisory glsa-202305-37","url":"https://security.gentoo.org/glsa/202305-37"}],"cwes":[770],"description":"Apache Commons FileUpload denial of service vulnerability","detail":"# Apache Commons FileUpload denial of service vulnerability Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-02-20T18:30:17","updated":"2025-02-13T18:50:47","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-12418","bom-ref":"CVE-2019-12418/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.48|<8.5.48","status":"affected"},{"version":"8.5.48","status":"unaffected"}]}],"recommendation":"Update to version 8.5.48 to resolve CVE-2019-12418 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12418","name":"NVD"},"references":[{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"glsa-202003-43","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202003-43"}},{"id":"apache-msg-43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00013","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"K10107360","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K10107360?utm_source=f5support&utm_medium=RSS"}},{"id":"ntap-20200107-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200107-0001"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00029","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html"}},{"id":"CVE-2019-12418","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12418","name":"NVD"}},{"id":"debian-msg-msg00024","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}}],"advisories":[{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"Gentoo Advisory glsa-202003-43","url":"https://security.gentoo.org/glsa/202003-43"},{"title":"F5 Advisory K10107360","url":"https://support.f5.com/csp/article/K10107360?utm_source=f5support&utm_medium=RSS"},{"title":"NetApp Advisory ntap-20200107-0001","url":"https://security.netapp.com/advisory/ntap-20200107-0001"},{"title":"CVE-2019-12418","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12418"}],"cwes":[522],"description":"Insufficiently Protected Credentials in Apache Tomcat","detail":"# Insufficiently Protected Credentials in Apache Tomcat When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.","ratings":[{"method":"CVSSv31","severity":"high","score":7.0,"vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2019-12-26T18:22:36","updated":"2024-03-14T05:19:45","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2021-25122","bom-ref":"CVE-2021-25122/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=10.0.2|<10.0.2","status":"affected"},{"version":"10.0.2","status":"unaffected"}]}],"recommendation":"Update to version 10.0.2 to resolve CVE-2021-25122 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25122","name":"NVD"},"references":[{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E"}},{"id":"CVE-2021-25122","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25122","name":"NVD"}},{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html"}},{"id":"openwall-oss-security-msg-2021-03-01-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/03/01/1"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"dsa-4891","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4891"}},{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E"}},{"id":"glsa-202208-34","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202208-34"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20210409-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210409-0002"}},{"id":"apache-msg-rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E"}}],"advisories":[{"title":"CVE-2021-25122","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25122"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Debian Advisory dsa-4891","url":"https://www.debian.org/security/2021/dsa-4891"},{"title":"Gentoo Advisory glsa-202208-34","url":"https://security.gentoo.org/glsa/202208-34"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"NetApp Advisory ntap-20210409-0002","url":"https://security.netapp.com/advisory/ntap-20210409-0002"}],"cwes":[200],"description":"Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat","detail":"# Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request. ## Related CVE(s) BIT-tomcat-2021-25122, CVE-2021-25122","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2021-06-16T17:45:29","updated":"2024-02-19T05:31:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2021-25329","bom-ref":"CVE-2021-25329/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=10.0.2|<10.0.2","status":"affected"},{"version":"10.0.2","status":"unaffected"}]}],"recommendation":"Update to version 10.0.2 to resolve CVE-2021-25329 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25329","name":"NVD"},"references":[{"id":"apache-msg-r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"openwall-oss-security-msg-2021-03-01-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/03/01/2"}},{"id":"ntap-20210409-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210409-0002"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"dsa-4891","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4891"}},{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E"}},{"id":"glsa-202208-34","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202208-34"}},{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html"}},{"id":"apache-msg-rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E"}},{"id":"CVE-2021-25329","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25329","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"NetApp Advisory ntap-20210409-0002","url":"https://security.netapp.com/advisory/ntap-20210409-0002"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Debian Advisory dsa-4891","url":"https://www.debian.org/security/2021/dsa-4891"},{"title":"Gentoo Advisory glsa-202208-34","url":"https://security.gentoo.org/glsa/202208-34"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"CVE-2021-25329","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25329"}],"cwes":[502],"description":"Potential remote code execution in Apache Tomcat","detail":"# Potential remote code execution in Apache Tomcat The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue. ## Related CVE(s) BIT-tomcat-2021-25329, CVE-2021-25329","ratings":[{"method":"CVSSv31","severity":"high","score":7.0,"vector":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-03-19T20:11:13","updated":"2024-03-08T05:18:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-0221","bom-ref":"CVE-2019-0221/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=9.0.17|<9.0.17","status":"affected"},{"version":"9.0.17","status":"unaffected"}]}],"recommendation":"Update to version 9.0.17 to resolve CVE-2019-0221 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0221","name":"NVD"},"references":[{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-fulldisclosure/2019/May/50","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2019/May/50"}},{"id":"debian-msg-msg00015","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html"}},{"id":"fedoraproject-msg-ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46"}},{"id":"apache-msg-6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00090","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E"}},{"id":"fedoraproject-msg-NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3"}},{"id":"debian-msg-msg00044","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-108545","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227055048/http://www.securityfocus.com/bid/108545"}},{"id":"xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221","source":{"name":"Nightwatchcybersecurity Advisory","url":"https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221"}},{"id":"CVE-2019-0221","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0221","name":"NVD"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46"}},{"id":"RHSA-2019:3931","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3931"}},{"id":"K13184144","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20190606-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190606-0001"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"apache-msg-r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E"}},{"id":"opensuse-msg-msg00054","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html"}},{"id":"apache-msg-6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E"}},{"id":"glsa-202003-43","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202003-43"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"K13184144","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS"}},{"id":"fedoraproject-msg-NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"RHSA-2019:3929","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3929"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"packetstormsecurity-exploit-Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}}],"advisories":[{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Nightwatchcybersecurity Advisory xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221","url":"https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221"},{"title":"CVE-2019-0221","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0221"},{"title":"Red Hat Advisory RHSA-2019:3931","url":"https://access.redhat.com/errata/RHSA-2019:3931"},{"title":"F5 Advisory K13184144","url":"https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS"},{"title":"NetApp Advisory ntap-20190606-0001","url":"https://security.netapp.com/advisory/ntap-20190606-0001"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Gentoo Advisory glsa-202003-43","url":"https://security.gentoo.org/glsa/202003-43"},{"title":"F5 Advisory K13184144","url":"https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Red Hat Advisory RHSA-2019:3929","url":"https://access.redhat.com/errata/RHSA-2019:3929"}],"cwes":[79],"description":"Cross-site scripting in Apache Tomcat","detail":"# Cross-site scripting in Apache Tomcat The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.1,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2019-05-30T03:30:42","updated":"2024-03-11T14:57:09","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2018-1305","bom-ref":"CVE-2018-1305/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<=8.5.27|!=8.5.28","status":"affected"},{"version":"8.5.28","status":"unaffected"}]}],"recommendation":"Update to version 8.5.28 to resolve CVE-2018-1305 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1305","name":"NVD"},"references":[{"id":"RHSA-2018:1320","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1320"}},{"id":"archive-msg-1040428","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200516094320/http://www.securitytracker.com/id/1040428"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20180706-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180706-0001"}},{"id":"apache-msg-d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:2205","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2205"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00044","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"RHSA-2018:0465","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:0465"}},{"id":"archive-msg-103144","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227030042/http://www.securityfocus.com/bid/103144"}},{"id":"RHSA-2018:2939","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2939"}},{"id":"cpujul2018-4258247","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:0466","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:0466"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00004","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html"}},{"id":"CVE-2018-1305","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1305","name":"NVD"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:1320","url":"https://access.redhat.com/errata/RHSA-2018:1320"},{"title":"NetApp Advisory ntap-20180706-0001","url":"https://security.netapp.com/advisory/ntap-20180706-0001"},{"title":"Red Hat Advisory RHSA-2019:2205","url":"https://access.redhat.com/errata/RHSA-2019:2205"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Red Hat Advisory RHSA-2018:0465","url":"https://access.redhat.com/errata/RHSA-2018:0465"},{"title":"Red Hat Advisory RHSA-2018:2939","url":"https://access.redhat.com/errata/RHSA-2018:2939"},{"title":"Oracle Advisory cpujul2018-4258247","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Red Hat Advisory RHSA-2018:0466","url":"https://access.redhat.com/errata/RHSA-2018:0466"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"CVE-2018-1305","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1305"}],"cwes":[],"description":"Apache Tomcat information exposure vulnerability","detail":"# Apache Tomcat information exposure vulnerability Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T16:31:48","updated":"2024-11-29T05:50:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-1336","bom-ref":"CVE-2018-1336/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.31|<8.5.31","status":"affected"},{"version":"8.5.31","status":"unaffected"}]}],"recommendation":"Update to version 8.5.31 to resolve CVE-2018-1336 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1336","name":"NVD"},"references":[{"id":"RHSA-2018:2701","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2701"}},{"id":"RHSA-2018:2742","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2742"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"K73008537","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-1041375","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20190703075545/http://www.securitytracker.com/id/1041375"}},{"id":"RHSA-2018:2921","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2921"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"ntap-20180817-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20180817-0001"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2741","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2741"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4281","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2018/dsa-4281"}},{"id":"RHSA-2018:3768","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:3768"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html"}},{"id":"RHSA-2018:2740","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2740"}},{"id":"RHSA-2018:2939","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2939"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHEA-2018:2188","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHEA-2018:2188"}},{"id":"RHEA-2018:2189","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHEA-2018:2189"}},{"id":"RHSA-2018:2930","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2930"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2700","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2700"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-201807","source":{"name":"Apache Mailing List","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2945","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2945"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"K73008537","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K73008537?utm_source=f5support&%3Butm_medium=RSS"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-104898","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104898"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2743","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2743"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2018-1336","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1336","name":"NVD"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:2701","url":"https://access.redhat.com/errata/RHSA-2018:2701"},{"title":"Red Hat Advisory RHSA-2018:2742","url":"https://access.redhat.com/errata/RHSA-2018:2742"},{"title":"F5 Advisory K73008537","url":"https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS"},{"title":"Red Hat Advisory RHSA-2018:2921","url":"https://access.redhat.com/errata/RHSA-2018:2921"},{"title":"NetApp Advisory ntap-20180817-0001","url":"https://security.netapp.com/advisory/ntap-20180817-0001"},{"title":"Red Hat Advisory RHSA-2018:2741","url":"https://access.redhat.com/errata/RHSA-2018:2741"},{"title":"Debian Advisory dsa-4281","url":"https://www.debian.org/security/2018/dsa-4281"},{"title":"Red Hat Advisory RHSA-2018:3768","url":"https://access.redhat.com/errata/RHSA-2018:3768"},{"title":"Red Hat Advisory RHSA-2018:2740","url":"https://access.redhat.com/errata/RHSA-2018:2740"},{"title":"Red Hat Advisory RHSA-2018:2939","url":"https://access.redhat.com/errata/RHSA-2018:2939"},{"title":"Red Hat Advisory RHEA-2018:2188","url":"https://access.redhat.com/errata/RHEA-2018:2188"},{"title":"Red Hat Advisory RHEA-2018:2189","url":"https://access.redhat.com/errata/RHEA-2018:2189"},{"title":"Red Hat Advisory RHSA-2018:2930","url":"https://access.redhat.com/errata/RHSA-2018:2930"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2018:2700","url":"https://access.redhat.com/errata/RHSA-2018:2700"},{"title":"Red Hat Advisory RHSA-2018:2945","url":"https://access.redhat.com/errata/RHSA-2018:2945"},{"title":"F5 Advisory K73008537","url":"https://support.f5.com/csp/article/K73008537?utm_source=f5support&%3Butm_medium=RSS"},{"title":"Red Hat Advisory RHSA-2018:2743","url":"https://access.redhat.com/errata/RHSA-2018:2743"},{"title":"CVE-2018-1336","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1336"}],"cwes":[835],"description":"In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder ","detail":"# In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2018-10-17T16:32:18","updated":"2024-03-12T05:33:41","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2023-34981","bom-ref":"CVE-2023-34981/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.0-M6|<11.0.0-M6","status":"affected"},{"version":"11.0.0-M6","status":"unaffected"}]}],"recommendation":"Update to version 11.0.0-M6 to resolve CVE-2023-34981 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34981","name":"NVD"},"references":[{"id":"apache-msg-j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz"}},{"id":"ntap-20230714-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230714-0003"}},{"id":"show_bug","source":{"name":"Apache Advisory","url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=66591"}},{"id":"show_bug","source":{"name":"Apache Advisory","url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=66512"}},{"id":"CVE-2023-34981","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34981","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20230714-0003","url":"https://security.netapp.com/advisory/ntap-20230714-0003"},{"title":"Apache Advisory show_bug","url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=66591"},{"title":"Apache Advisory show_bug","url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=66512"},{"title":"CVE-2023-34981","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34981"}],"cwes":[732],"description":"Apache Tomcat vulnerable to information leak","detail":"# Apache Tomcat vulnerable to information leak A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS message would be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. ## Related CVE(s) BIT-tomcat-2023-34981, CVE-2023-34981","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2023-06-21T12:30:19","updated":"2024-04-24T19:44:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2022-42252","bom-ref":"CVE-2022-42252/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.83|<8.5.83","status":"affected"},{"version":"8.5.83","status":"unaffected"}]}],"recommendation":"Update to version 8.5.83 to resolve CVE-2022-42252 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42252","name":"NVD"},"references":[{"id":"CVE-2022-42252","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42252","name":"NVD"}},{"id":"apache-msg-zzcxzvqfdqn515zfs3dxb7n8gty589sq","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq"}},{"id":"glsa-202305-37","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202305-37"}}],"advisories":[{"title":"CVE-2022-42252","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42252"},{"title":"Gentoo Advisory glsa-202305-37","url":"https://security.gentoo.org/glsa/202305-37"}],"cwes":[20,444],"description":"Apache Tomcat may reject request containing invalid Content-Length header","detail":"# Apache Tomcat may reject request containing invalid Content-Length header If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. ## Related CVE(s) BIT-tomcat-2022-42252, CVE-2022-42252","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2022-11-01T12:00:30","updated":"2024-04-23T20:46:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2023-41080","bom-ref":"CVE-2023-41080/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.93|<8.5.93","status":"affected"},{"version":"8.5.93","status":"unaffected"}]}],"recommendation":"Update to version 8.5.93 to resolve CVE-2023-41080 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41080","name":"NVD"},"references":[{"id":"apache-msg-71wvwprtx2j2m54fovq9zr7gbm2wow2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f"}},{"id":"CVE-2023-41080","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41080","name":"NVD"}},{"id":"dsa-5521","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5521"}},{"id":"dsa-5522","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5522"}},{"id":"ntap-20230921-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230921-0006"}},{"id":"debian-msg-msg00020","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}}],"advisories":[{"title":"CVE-2023-41080","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41080"},{"title":"Debian Advisory dsa-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"title":"Debian Advisory dsa-5522","url":"https://www.debian.org/security/2023/dsa-5522"},{"title":"NetApp Advisory ntap-20230921-0006","url":"https://security.netapp.com/advisory/ntap-20230921-0006"}],"cwes":[601],"description":"Apache Tomcat Open Redirect vulnerability","detail":"# Apache Tomcat Open Redirect vulnerability URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application. ## Related CVE(s) BIT-tomcat-2023-41080, CVE-2023-41080","ratings":[{"method":"CVSSv31","severity":"medium","score":6.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"published":"2023-08-25T21:30:48","updated":"2024-02-17T05:31:37","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-10072","bom-ref":"CVE-2019-10072/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=9.0.20|<9.0.20","status":"affected"},{"version":"9.0.20","status":"unaffected"}]}],"recommendation":"Update to version 9.0.20 to resolve CVE-2019-10072 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10072","name":"NVD"},"references":[{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2019-10072","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10072","name":"NVD"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"K17321505","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K17321505"}},{"id":"ntap-20190625-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190625-0002"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"apache-msg-df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"Synology_SA_19_29","source":{"name":"Synology Advisory","url":"https://www.synology.com/security/advisory/Synology_SA_19_29"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:3929","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3929"}},{"id":"RHSA-2019:3931","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3931"}},{"id":"archive-msg-108874","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227033743/http://www.securityfocus.com/bid/108874"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"opensuse-msg-msg00013","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}}],"advisories":[{"title":"CVE-2019-10072","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10072"},{"title":"F5 Advisory K17321505","url":"https://support.f5.com/csp/article/K17321505"},{"title":"NetApp Advisory ntap-20190625-0002","url":"https://security.netapp.com/advisory/ntap-20190625-0002"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"Synology Advisory Synology_SA_19_29","url":"https://www.synology.com/security/advisory/Synology_SA_19_29"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Red Hat Advisory RHSA-2019:3929","url":"https://access.redhat.com/errata/RHSA-2019:3929"},{"title":"Red Hat Advisory RHSA-2019:3931","url":"https://access.redhat.com/errata/RHSA-2019:3931"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[667],"description":"Improper Locking in Apache Tomcat","detail":"# Improper Locking in Apache Tomcat The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2019-06-26T01:09:40","updated":"2024-03-11T15:55:43","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2019-0199","bom-ref":"CVE-2019-0199/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=9.0.16|<9.0.16","status":"affected"},{"version":"9.0.16","status":"unaffected"}]}],"recommendation":"Update to version 9.0.16 to resolve CVE-2019-0199 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0199","name":"NVD"},"references":[{"id":"apache-msg-cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef%40%3Cannounce.apache.org%3E"}},{"id":"apache-msg-7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46"}},{"id":"ntap-20190419-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190419-0001"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"K17321505","source":{"name":"F5 Advisory","url":"https://support.f5.com/csp/article/K17321505"}},{"id":"apache-msg-158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067%40%3Cusers.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00090","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html"}},{"id":"apache-msg-9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3"}},{"id":"apache-msg-e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e%40%3Ccommits.tomee.apache.org%3E"}},{"id":"opensuse-msg-msg00013","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00013.html"}},{"id":"apache-msg-ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9%40%3Cannounce.apache.org%3E"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"apache-msg-4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46"}},{"id":"apache-msg-4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:3931","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3931"}},{"id":"archive-msg-107674","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227030041/http://www.securityfocus.com/bid/107674"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2019-0199","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0199","name":"NVD"}},{"id":"apache-msg-7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6%40%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"apache-msg-e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c%40%3Cusers.tomcat.apache.org%3E"}},{"id":"opensuse-msg-msg00054","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html"}},{"id":"apache-msg-ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50@%3Cdev.tomcat.apache.org%3E"}},{"id":"fedoraproject-msg-NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3"}},{"id":"apache-msg-e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:3929","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3929"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}}],"advisories":[{"title":"NetApp Advisory ntap-20190419-0001","url":"https://security.netapp.com/advisory/ntap-20190419-0001"},{"title":"F5 Advisory K17321505","url":"https://support.f5.com/csp/article/K17321505"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2019:3931","url":"https://access.redhat.com/errata/RHSA-2019:3931"},{"title":"CVE-2019-0199","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0199"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Red Hat Advisory RHSA-2019:3929","url":"https://access.redhat.com/errata/RHSA-2019:3929"}],"cwes":[400],"description":"Apache Tomcat Denial of Service vulnerability","detail":"# Apache Tomcat Denial of Service vulnerability The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2020-06-15T18:51:09","updated":"2024-03-16T05:16:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2024-52317","bom-ref":"CVE-2024-52317/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=9.0.96|<9.0.96","status":"affected"},{"version":"9.0.96","status":"unaffected"}]}],"recommendation":"Update to version 9.0.96 to resolve CVE-2024-52317 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-52317","name":"NVD"},"references":[{"id":"apache-msg-ty376mrxy1mmxtw3ogo53nc9l3co3dfs","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/ty376mrxy1mmxtw3ogo53nc9l3co3dfs"}},{"id":"ntap-20250124-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250124-0004"}},{"id":"CVE-2024-52317","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-52317","name":"NVD"}},{"id":"openwall-oss-security-msg-2024-11-18-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/11/18/3"}}],"advisories":[{"title":"NetApp Advisory ntap-20250124-0004","url":"https://security.netapp.com/advisory/ntap-20250124-0004"},{"title":"CVE-2024-52317","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-52317"}],"cwes":[326],"description":"Apache Tomcat Request and/or response mix-up","detail":"# Apache Tomcat Request and/or response mix-up Incorrect object re-cycling and re-use vulnerability in Apache Tomcat.\u00a0Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue. ## Related CVE(s) BIT-tomcat-2024-52317, CVE-2024-52317","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"published":"2024-11-18T12:30:43","updated":"2025-01-24T22:02:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2020-1935","bom-ref":"CVE-2020-1935/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.51|<8.5.51","status":"affected"},{"version":"8.5.51","status":"unaffected"}]}],"recommendation":"Update to version 8.5.51 to resolve CVE-2020-1935 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1935","name":"NVD"},"references":[{"id":"apache-msg-r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E"}},{"id":"CVE-2020-1935","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1935","name":"NVD"}},{"id":"ntap-20200327-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200327-0005"}},{"id":"apache-msg-r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"dsa-4673","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4673"}},{"id":"apache-msg-rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E"}},{"id":"apache-msg-r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4680","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2020/dsa-4680"}},{"id":"debian-msg-msg00026","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html"}},{"id":"apache-msg-r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00006","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html"}},{"id":"apache-msg-r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"opensuse-msg-msg00025","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E"}},{"id":"apache-msg-r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E"}}],"advisories":[{"title":"CVE-2020-1935","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1935"},{"title":"NetApp Advisory ntap-20200327-0005","url":"https://security.netapp.com/advisory/ntap-20200327-0005"},{"title":"Debian Advisory dsa-4673","url":"https://www.debian.org/security/2020/dsa-4673"},{"title":"Debian Advisory dsa-4680","url":"https://www.debian.org/security/2020/dsa-4680"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}],"cwes":[444],"description":"Potential HTTP request smuggling in Apache Tomcat","detail":"# Potential HTTP request smuggling in Apache Tomcat In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. ## Related CVE(s) BIT-tomcat-2020-1935, CVE-2020-1935","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"published":"2020-02-28T01:10:48","updated":"2024-03-14T05:17:09","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2018-8014","bom-ref":"CVE-2018-8014/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.32|<8.5.32","status":"affected"},{"version":"8.5.32","status":"unaffected"}]}],"recommendation":"Update to version 8.5.32 to resolve CVE-2018-8014 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8014","name":"NVD"},"references":[{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:1529","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1529"}},{"id":"debian-msg-msg00015","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E"}},{"id":"archive-msg-104203","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20181017143233/http://www.securityfocus.com/bid/104203"}},{"id":"archive-msg-1041888","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20201207080723/http://www.securitytracker.com/id/1041888"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2018:2469","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2469"}},{"id":"apache-msg-ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E"}},{"id":"RHSA-2019:2205","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2205"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1%40%3Cannounce.tomcat.apache.org%3E"}},{"id":"RHSA-2018:3768","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:3768"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"}},{"id":"dsa-4596","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2019/dsa-4596"}},{"id":"ntap-20181018-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20181018-0002"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E"}},{"id":"apache-msg-r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"}},{"id":"archive-msg-1040998","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20201207101131/http://www.securitytracker.com/id/1040998"}},{"id":"RHSA-2019:0450","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0450"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"}},{"id":"CVE-2018-8014","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8014","name":"NVD"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"}},{"id":"GHSA-r4x2-3cq5-hqvp","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-r4x2-3cq5-hqvp"}},{"id":"RHSA-2019:0451","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0451"}},{"id":"RHSA-2018:2470","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2470"}},{"id":"apache-msg-388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E"}},{"id":"apache-msg-6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"}},{"id":"seclists-exploit-bugtraq/2019/Dec/43","source":{"name":"Seclists Exploit","url":"https://seclists.org/bugtraq/2019/Dec/43"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2019:1529","url":"https://access.redhat.com/errata/RHSA-2019:1529"},{"title":"Red Hat Advisory RHSA-2018:2469","url":"https://access.redhat.com/errata/RHSA-2018:2469"},{"title":"Red Hat Advisory RHSA-2019:2205","url":"https://access.redhat.com/errata/RHSA-2019:2205"},{"title":"Red Hat Advisory RHSA-2018:3768","url":"https://access.redhat.com/errata/RHSA-2018:3768"},{"title":"Debian Advisory dsa-4596","url":"https://www.debian.org/security/2019/dsa-4596"},{"title":"NetApp Advisory ntap-20181018-0002","url":"https://security.netapp.com/advisory/ntap-20181018-0002"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2019:0450","url":"https://access.redhat.com/errata/RHSA-2019:0450"},{"title":"CVE-2018-8014","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8014"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"GitHub Advisory GHSA-r4x2-3cq5-hqvp","url":"https://github.com/advisories/GHSA-r4x2-3cq5-hqvp"},{"title":"Red Hat Advisory RHSA-2019:0451","url":"https://access.redhat.com/errata/RHSA-2019:0451"},{"title":"Red Hat Advisory RHSA-2018:2470","url":"https://access.redhat.com/errata/RHSA-2018:2470"}],"cwes":[1188],"description":"The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins","detail":"# The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2018-10-17T16:32:32","updated":"2024-03-12T05:32:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 85 locations"}]},{"id":"CVE-2023-45648","bom-ref":"CVE-2023-45648/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.0-M12|<11.0.0-M12","status":"affected"},{"version":"11.0.0-M12","status":"unaffected"}]}],"recommendation":"Update to version 11.0.0-M12 to resolve CVE-2023-45648 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45648","name":"NVD"},"references":[{"id":"ntap-20231103-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231103-0007"}},{"id":"apache-msg-2pv8yz1pyp088tsxfb7ogltk9msk0jdp","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp"}},{"id":"openwall-oss-security-msg-2023-10-10-10","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2023/10/10/10"}},{"id":"dsa-5521","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5521"}},{"id":"CVE-2023-45648","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45648","name":"NVD"}},{"id":"dsa-5522","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5522"}},{"id":"debian-msg-msg00020","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}}],"advisories":[{"title":"NetApp Advisory ntap-20231103-0007","url":"https://security.netapp.com/advisory/ntap-20231103-0007"},{"title":"Debian Advisory dsa-5521","url":"https://www.debian.org/security/2023/dsa-5521"},{"title":"CVE-2023-45648","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45648"},{"title":"Debian Advisory dsa-5522","url":"https://www.debian.org/security/2023/dsa-5522"}],"cwes":[20],"description":"Apache Tomcat Improper Input Validation vulnerability","detail":"# Apache Tomcat Improper Input Validation vulnerability Improper Input Validation vulnerability in Apache Tomcat. Tomcat\u00a0from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue. ## Related CVE(s) BIT-tomcat-2023-45648, CVE-2023-45648","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"published":"2023-10-10T21:31:12","updated":"2025-02-13T19:37:54","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2022-45143","bom-ref":"CVE-2022-45143/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=8.5.84|<8.5.84","status":"affected"},{"version":"8.5.84","status":"unaffected"}]}],"recommendation":"Update to version 8.5.84 to resolve CVE-2022-45143 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45143","name":"NVD"},"references":[{"id":"apache-msg-yqkd183xrw3wqvnpcg3osbcryq85fkzj","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj"}},{"id":"CVE-2022-45143","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45143","name":"NVD"}},{"id":"glsa-202305-37","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202305-37"}}],"advisories":[{"title":"CVE-2022-45143","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45143"},{"title":"Gentoo Advisory glsa-202305-37","url":"https://security.gentoo.org/glsa/202305-37"}],"cwes":[116,74],"description":"Apache Tomcat improperly escapes input from JsonErrorReportValve","detail":"# Apache Tomcat improperly escapes input from JsonErrorReportValve The `JsonErrorReportValve` in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 does not escape the `type`, `message` or `description` values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output. ## Related CVE(s) BIT-tomcat-2022-45143, CVE-2022-45143","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2023-01-03T21:30:21","updated":"2024-04-23T22:00:59","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 85 locations"}]},{"id":"CVE-2024-34750","bom-ref":"CVE-2024-34750/pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar","versions":[{"range":"vers:maven/!=11.0.0-M21|<11.0.0-M21","status":"affected"},{"version":"11.0.0-M21","status":"unaffected"}]}],"recommendation":"Update to version 11.0.0-M21 to resolve CVE-2024-34750 or update to version 11.0.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34750","name":"NVD"},"references":[{"id":"CVE-2024-34750","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34750","name":"NVD"}},{"id":"apache-msg-4kqf0bc9gxymjc2x7v3p7dvplnl77y8l","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l"}}],"advisories":[{"title":"CVE-2024-34750","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34750"}],"cwes":[400,755],"description":"Apache Tomcat - Denial of Service","detail":"# Apache Tomcat - Denial of Service Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-07-03T21:39:44","updated":"2024-07-05T20:57:34","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 85 locations"}]},{"id":"CVE-2024-23672","bom-ref":"CVE-2024-23672/pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar","affects":[{"ref":"pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar","versions":[{"range":"vers:maven/>=8.5.0|<=8.5.98|!=8.5.99","status":"affected"},{"version":"8.5.99","status":"unaffected"}]}],"recommendation":"Update to version 8.5.99.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23672","name":"NVD"},"references":[{"id":"fedoraproject-msg-3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UWIS5MMGYDZBLJYT674ZI5AWFHDZ46B"}},{"id":"fedoraproject-msg-736G4GPZWS2DSQO5WKXO3G6OMZKFEK55","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/736G4GPZWS2DSQO5WKXO3G6OMZKFEK55"}},{"id":"openwall-oss-security-msg-2024-03-13-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/03/13/4"}},{"id":"apache-msg-cmpswfx6tj4s7x0nxxosvfqs11lvdx2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f"}},{"id":"CVE-2024-23672","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23672","name":"NVD"}},{"id":"debian-msg-msg00001","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html"}},{"id":"ntap-20240402-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240402-0002"}}],"advisories":[{"title":"CVE-2024-23672","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23672"},{"title":"NetApp Advisory ntap-20240402-0002","url":"https://security.netapp.com/advisory/ntap-20240402-0002"}],"cwes":[459],"description":"Denial of Service via incomplete cleanup vulnerability in Apache Tomcat","detail":"# Denial of Service via incomplete cleanup vulnerability in Apache Tomcat Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. ## Related CVE(s) BIT-tomcat-2024-23672, CVE-2024-23672","ratings":[{"method":"CVSSv31","severity":"medium","score":6.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"published":"2024-03-13T18:31:34","updated":"2025-02-13T19:13:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-tomcat@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.apache.tomcat.embed/tomcat-embed-websocket@8.5.11?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 13 locations"}]},{"id":"CVE-2024-38809","bom-ref":"CVE-2024-38809/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.3.9|!=5.3.38","status":"affected"},{"version":"5.3.38","status":"unaffected"}]}],"recommendation":"Update to version 5.3.38 to resolve CVE-2024-38809 or update to version 6.1.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://spring.io/security/cve-2024-38809"},"references":[{"id":"cve-2024-38809","source":{"url":"https://spring.io/security/cve-2024-38809"}},{"id":"CVE-2024-38809","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38809","name":"NVD"}}],"advisories":[{"title":"cve-2024-38809","url":"https://spring.io/security/cve-2024-38809"},{"title":"CVE-2024-38809","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38809"}],"cwes":[1333,400],"description":"Spring Framework DoS via conditional HTTP request","detail":"# Spring Framework DoS via conditional HTTP request ### Description Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack. ### Affected Spring Products and Versions org.springframework:spring-web in versions 6.1.0 through 6.1.11 6.0.0 through 6.0.22 5.3.0 through 5.3.37 Older, unsupported versions are also affected ### Mitigation Users of affected versions should upgrade to the corresponding fixed version. 6.1.x -> 6.1.12 6.0.x -> 6.0.23 5.3.x -> 5.3.38 No other mitigation steps are necessary. Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2024-09-24T18:34:43","updated":"2025-02-21T15:43:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 171 locations"}]},{"id":"CVE-2024-22262","bom-ref":"CVE-2024-22262/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.3.9|!=5.3.34","status":"affected"},{"version":"5.3.34","status":"unaffected"}]}],"recommendation":"Update to version 5.3.34 to resolve CVE-2024-22262 or update to version 6.1.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://spring.io/security/cve-2024-22262"},"references":[{"id":"ntap-20240524-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240524-0003"}},{"id":"cve-2024-22262","source":{"url":"https://spring.io/security/cve-2024-22262"}},{"id":"CVE-2024-22262","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22262","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20240524-0003","url":"https://security.netapp.com/advisory/ntap-20240524-0003"},{"title":"cve-2024-22262","url":"https://spring.io/security/cve-2024-22262"},{"title":"CVE-2024-22262","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22262"}],"cwes":[601],"description":"Spring Framework URL Parsing with Host Validation","detail":"# Spring Framework URL Parsing with Host Validation Applications that use UriComponentsBuilder\u00a0to parse an externally provided URL (e.g. through a query parameter) AND\u00a0perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html \u00a0attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 \u00a0and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"published":"2024-04-16T06:30:28","updated":"2025-02-13T19:11:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 171 locations"}]},{"id":"CVE-2018-11039","bom-ref":"CVE-2018-11039/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.0.7|<5.0.7","status":"affected"},{"version":"5.0.7","status":"unaffected"}]}],"recommendation":"Update to version 5.0.7 to resolve CVE-2018-11039 or update to version 6.1.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-11039"},"references":[{"id":"cve-2018-11039","source":{"url":"https://pivotal.io/security/cve-2018-11039"}},{"id":"GHSA-9gcm-f4x3-8jpw","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-9gcm-f4x3-8jpw"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"debian-msg-msg00022","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html"}},{"id":"CVE-2018-11039","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11039","name":"NVD"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"cve-2018-11039","source":{"url":"https://spring.io/security/cve-2018-11039"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"securityfocus-msg-107984","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/107984"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}}],"advisories":[{"title":"cve-2018-11039","url":"https://pivotal.io/security/cve-2018-11039"},{"title":"GitHub Advisory GHSA-9gcm-f4x3-8jpw","url":"https://github.com/advisories/GHSA-9gcm-f4x3-8jpw"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"CVE-2018-11039","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11039"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"cve-2018-11039","url":"https://spring.io/security/cve-2018-11039"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}],"cwes":[],"description":"Spring Framework Cross Site Tracing (XST)","detail":"# Spring Framework Cross Site Tracing (XST) Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-16T17:35:54","updated":"2024-12-02T05:43:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 171 locations"}]},{"id":"CVE-2024-22243","bom-ref":"CVE-2024-22243/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=6.1.4|<6.1.4","status":"affected"},{"version":"6.1.4","status":"unaffected"}]}],"recommendation":"Update to version 6.1.4 to resolve CVE-2024-22243 or update to version 6.1.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22243","name":"NVD"},"references":[{"id":"CVE-2024-22243","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22243","name":"NVD"}},{"id":"seclists-exploit-fulldisclosure/2024/Sep/24","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2024/Sep/24"}},{"id":"ntap-20240524-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240524-0001"}},{"id":"cve-2024-22243","source":{"url":"https://spring.io/security/cve-2024-22243"}}],"advisories":[{"title":"CVE-2024-22243","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22243"},{"title":"NetApp Advisory ntap-20240524-0001","url":"https://security.netapp.com/advisory/ntap-20240524-0001"},{"title":"cve-2024-22243","url":"https://spring.io/security/cve-2024-22243"}],"cwes":[601],"description":"Spring Web vulnerable to Open Redirect or Server Side Request Forgery","detail":"# Spring Web vulnerable to Open Redirect or Server Side Request Forgery Applications that use UriComponentsBuilder\u00a0to parse an externally provided URL (e.g. through a query parameter) AND\u00a0perform validation checks on the host of the parsed URL may be vulnerable to a open redirect attack or to a SSRF attack if the URL is used after passing validation checks.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"published":"2024-02-23T06:30:31","updated":"2025-02-13T19:37:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 171 locations"}]},{"id":"CVE-2024-22259","bom-ref":"CVE-2024-22259/pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=6.1.5|<6.1.5","status":"affected"},{"version":"6.1.5","status":"unaffected"}]}],"recommendation":"Update to version 6.1.5.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22259","name":"NVD"},"references":[{"id":"ntap-20240524-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240524-0002"}},{"id":"CVE-2024-22259","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22259","name":"NVD"}},{"id":"cve-2024-22259","source":{"url":"https://spring.io/security/cve-2024-22259"}}],"advisories":[{"title":"NetApp Advisory ntap-20240524-0002","url":"https://security.netapp.com/advisory/ntap-20240524-0002"},{"title":"CVE-2024-22259","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22259"},{"title":"cve-2024-22259","url":"https://spring.io/security/cve-2024-22259"}],"cwes":[601],"description":"Spring Framework URL Parsing with Host Validation Vulnerability","detail":"# Spring Framework URL Parsing with Host Validation Vulnerability Applications that use UriComponentsBuilder in Spring Framework\u00a0to parse an externally provided URL (e.g. through a query parameter) AND\u00a0perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html \u00a0attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22243 https://spring.io/security/cve-2024-22243, but with different input.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"published":"2024-03-16T06:30:27","updated":"2025-02-13T19:11:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-web@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 171 locations"}]},{"id":"CVE-2022-22965","bom-ref":"CVE-2022-22965/pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.2.9.RELEASE|!=5.2.20.RELEASE","status":"affected"},{"version":"5.2.20.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 5.2.20.RELEASE to resolve CVE-2022-22965 or update to version 6.1.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965","name":"NVD"},"references":[{"id":"CVE-2022-22965","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965","name":"NVD"}},{"id":"cve-2022-22965","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22965"}},{"id":"ssa-254054","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"}},{"id":"cisco-sa-java-spring-rce-Zx9GUc67","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"}},{"id":"packetstormsecurity-exploit-Spring4Shell-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html"}},{"id":"packetstormsecurity-exploit-Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"SNWLID-2022-0005","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"}},{"id":"970766","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/970766"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"CVE-2022-22965","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22965"},{"title":"Vmware Advisory cve-2022-22965","url":"https://tanzu.vmware.com/security/cve-2022-22965"},{"title":"Siemens Advisory ssa-254054","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"},{"title":"Cisco Advisory cisco-sa-java-spring-rce-Zx9GUc67","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Sonicwall Advisory SNWLID-2022-0005","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"},{"title":"Cert Advisory 970766","url":"https://www.kb.cert.org/vuls/id/970766"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[74,94],"description":"Remote Code Execution in Spring Framework","detail":"# Remote Code Execution in Spring Framework Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. These are the prerequisites for the exploit: - JDK 9 or higher - Apache Tomcat as the Servlet container - Packaged as WAR - `spring-webmvc` or `spring-webflux` dependency ## Patches - Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE) - Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12) ## Workarounds For those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting. To apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-03-31T18:30:50","updated":"2025-01-29T19:19:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable and Exploitable\\nReachable and Exploitable\\nUsed in 7 locations"}]},{"id":"CVE-2020-5397","bom-ref":"CVE-2020-5397/pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.2.3|<5.2.3","status":"affected"},{"version":"5.2.3","status":"unaffected"}]}],"recommendation":"Update to version 5.2.3 to resolve CVE-2020-5397 or update to version 6.1.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2020-5397"},"references":[{"id":"cve-2020-5397","source":{"url":"https://pivotal.io/security/cve-2020-5397"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"CVE-2020-5397","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5397","name":"NVD"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}}],"advisories":[{"title":"cve-2020-5397","url":"https://pivotal.io/security/cve-2020-5397"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"CVE-2020-5397","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5397"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"cwes":[352],"description":"CSRF attack via CORS preflight requests with Spring MVC or Spring WebFlux","detail":"# CSRF attack via CORS preflight requests with Spring MVC or Spring WebFlux Spring Framework, versions 5.2.x prior to 5.2.3 are vulnerable to CSRF attacks through CORS preflight requests that target Spring MVC (spring-webmvc module) or Spring WebFlux (spring-webflux module) endpoints. Only non-authenticated endpoints are vulnerable because preflight requests should not include credentials and therefore requests should fail authentication. However a notable exception to this are Chrome based browsers when using client certificates for authentication since Chrome sends TLS client certificates in CORS preflight requests in violation of spec requirements. No HTTP body can be sent or received as a result of this attack.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"published":"2020-01-21T20:59:33","updated":"2024-03-15T16:12:40","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2020-5398","bom-ref":"CVE-2020-5398/pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.2.3.RELEASE|<5.2.3.RELEASE","status":"affected"},{"version":"5.2.3.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 5.2.3.RELEASE to resolve CVE-2020-5398 or update to version 6.1.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2020-5398"},"references":[{"id":"apache-msg-rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E"}},{"id":"apache-msg-r4b1886e82cc98ef38f582fef7d4ea722e3fcf46637cd4674926ba682","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4b1886e82cc98ef38f582fef7d4ea722e3fcf46637cd4674926ba682@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r028977b9b9d44a89823639aa3296fb0f0cfdd76b4450df89d3c4fbbf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r028977b9b9d44a89823639aa3296fb0f0cfdd76b4450df89d3c4fbbf@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-rc05acaacad089613e9642f939b3a44f7199b5537493945c3e045287f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc05acaacad089613e9642f939b3a44f7199b5537493945c3e045287f@%3Cdev.geode.apache.org%3E"}},{"id":"cve-2020-5398","source":{"url":"https://pivotal.io/security/cve-2020-5398"}},{"id":"apache-msg-r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"ntap-20210917-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210917-0006"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"apache-msg-rb4d1fc078f086ec2e98b2693e8b358e58a6a4ef903ceed93a1ee2b18","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb4d1fc078f086ec2e98b2693e8b358e58a6a4ef903ceed93a1ee2b18@%3Ccommits.karaf.apache.org%3E"}},{"id":"apache-msg-r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3E"}},{"id":"apache-msg-rab0de39839b4c208dcd73f01e12899dc453361935a816a784548e048","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rab0de39839b4c208dcd73f01e12899dc453361935a816a784548e048@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46@%3Ccommits.servicecomb.apache.org%3E"}},{"id":"apache-msg-reaa8a6674baf2724b1b88a621b0d72d9f7a6f5577c88759842c16eb6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/reaa8a6674baf2724b1b88a621b0d72d9f7a6f5577c88759842c16eb6@%3Ccommits.karaf.apache.org%3E"}},{"id":"apache-msg-rf8dc72b974ee74f17bce661ea7d124e733a1f4c4f236354ac0cf48e8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf8dc72b974ee74f17bce661ea7d124e733a1f4c4f236354ac0cf48e8@%3Ccommits.camel.apache.org%3E"}},{"id":"apache-msg-rdcaadaa9a68b31b7d093d76eacfaacf6c7a819f976b595c75ad2d4dc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdcaadaa9a68b31b7d093d76eacfaacf6c7a819f976b595c75ad2d4dc@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-r3765353ff434fd00d8fa5a44734b3625a06eeb2a3fb468da7dfae134","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3765353ff434fd00d8fa5a44734b3625a06eeb2a3fb468da7dfae134@%3Ccommits.karaf.apache.org%3E"}},{"id":"apache-msg-r7d5e518088e2e778928b02bcd3be3b948b59acefe2f0ebb57ec2ebb0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7d5e518088e2e778928b02bcd3be3b948b59acefe2f0ebb57ec2ebb0@%3Ccommits.karaf.apache.org%3E"}},{"id":"apache-msg-r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E"}},{"id":"apache-msg-r8736185eb921022225a83e56d7285a217fd83f5524bd64a6ca3bf5cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8736185eb921022225a83e56d7285a217fd83f5524bd64a6ca3bf5cc@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3E"}},{"id":"apache-msg-r9fb1ee08cf337d16c3364feb0f35a072438c1a956afd7b77859aa090","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9fb1ee08cf337d16c3364feb0f35a072438c1a956afd7b77859aa090@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r1accbd4f31ad2f40e1661d70a4510a584eb3efd1e32e8660ccf46676","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1accbd4f31ad2f40e1661d70a4510a584eb3efd1e32e8660ccf46676@%3Ccommits.karaf.apache.org%3E"}},{"id":"apache-msg-r8cc37a60a5056351377ee5f1258f2a4fdd39822a257838ba6bcc1e88","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8cc37a60a5056351377ee5f1258f2a4fdd39822a257838ba6bcc1e88@%3Ccommits.karaf.apache.org%3E"}},{"id":"CVE-2020-5398","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5398","name":"NVD"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-r6dac0e365d1b2df9a7ffca12b4195181ec14ff0abdf59e1fdb088ce5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6dac0e365d1b2df9a7ffca12b4195181ec14ff0abdf59e1fdb088ce5@%3Ccommits.karaf.apache.org%3E"}},{"id":"apache-msg-rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-r4639e821ef9ca6ca10887988f410a60261400a7766560e7a97a22efc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4639e821ef9ca6ca10887988f410a60261400a7766560e7a97a22efc@%3Ccommits.karaf.apache.org%3E"}},{"id":"apache-msg-r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E"}},{"id":"apache-msg-r74f81f93a9b69140fe41e236afa7cbe8dfa75692e7ab31a468fddaa0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r74f81f93a9b69140fe41e236afa7cbe8dfa75692e7ab31a468fddaa0@%3Ccommits.karaf.apache.org%3E"}},{"id":"apache-msg-r1bc5d673c01cfbb8e4a91914e9748ead3e5f56b61bca54d314c0419b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1bc5d673c01cfbb8e4a91914e9748ead3e5f56b61bca54d314c0419b@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r0f2d0ae1bad2edb3d4a863d77f3097b5e88cfbdae7b809f4f42d6aad","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0f2d0ae1bad2edb3d4a863d77f3097b5e88cfbdae7b809f4f42d6aad@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r2dfd5b331b46d3f90c4dd63a060e9f04300468293874bd7e41af7163","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2dfd5b331b46d3f90c4dd63a060e9f04300468293874bd7e41af7163@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E"}},{"id":"apache-msg-ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d@%3Ccommits.servicecomb.apache.org%3E"}},{"id":"apache-msg-r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E"}},{"id":"apache-msg-r7361bfe84bde9d233f9800c3a96673e7bd81207549ced0236f07a29d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7361bfe84bde9d233f9800c3a96673e7bd81207549ced0236f07a29d@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r0f3530f7cb510036e497532ffc4e0bd0b882940448cf4e233994b08b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0f3530f7cb510036e497532ffc4e0bd0b882940448cf4e233994b08b@%3Ccommits.karaf.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}}],"advisories":[{"title":"cve-2020-5398","url":"https://pivotal.io/security/cve-2020-5398"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"NetApp Advisory ntap-20210917-0006","url":"https://security.netapp.com/advisory/ntap-20210917-0006"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"CVE-2020-5398","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5398"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[494,79],"description":"RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application","detail":"# RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a \"Content-Disposition\" header in the response where the filename attribute is derived from user supplied input.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"published":"2020-01-21T20:59:09","updated":"2024-07-15T22:12:26","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2024-38816","bom-ref":"CVE-2024-38816/pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=6.1.13|<6.1.13","status":"affected"},{"version":"6.1.13","status":"unaffected"}]}],"recommendation":"Update to version 6.1.13 to resolve CVE-2024-38816 or update to version 6.1.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38816","name":"NVD"},"references":[{"id":"CVE-2024-38816","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38816","name":"NVD"}},{"id":"cve-2024-38816","source":{"url":"https://spring.io/security/cve-2024-38816"}},{"id":"ntap-20241227-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241227-0001"}}],"advisories":[{"title":"CVE-2024-38816","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38816"},{"title":"cve-2024-38816","url":"https://spring.io/security/cve-2024-38816"},{"title":"NetApp Advisory ntap-20241227-0001","url":"https://security.netapp.com/advisory/ntap-20241227-0001"}],"cwes":[22],"description":"Path traversal vulnerability in functional web frameworks","detail":"# Path traversal vulnerability in functional web frameworks Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. Specifically, an application is vulnerable when both of the following are true: * the web application uses RouterFunctions\u00a0to serve static resources * resource handling is explicitly configured with a FileSystemResource\u00a0location However, malicious requests are blocked and rejected when any of the following is true: * the Spring Security HTTP Firewall https://docs.spring.io/spring-security/reference/servlet/exploits/firewall.html \u00a0is in use * the application runs on Tomcat or Jetty","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-09-13T06:30:42","updated":"2024-12-27T18:34:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2024-38819","bom-ref":"CVE-2024-38819/pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=6.1.9|!=6.1.14","status":"affected"},{"version":"6.1.14","status":"unaffected"}]}],"recommendation":"Update to version 6.1.14.","source":{"url":"https://spring.io/security/cve-2024-38819"},"references":[{"id":"ntap-20250110-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250110-0010"}},{"id":"cve-2024-38819","source":{"url":"https://spring.io/security/cve-2024-38819"}},{"id":"CVE-2024-38819","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38819","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20250110-0010","url":"https://security.netapp.com/advisory/ntap-20250110-0010"},{"title":"cve-2024-38819","url":"https://spring.io/security/cve-2024-38819"},{"title":"CVE-2024-38819","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38819"}],"cwes":[22],"description":"Spring Framework Path Traversal vulnerability","detail":"# Spring Framework Path Traversal vulnerability Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-12-19T18:31:38","updated":"2025-01-10T15:59:29","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2023-34053","bom-ref":"CVE-2023-34053/pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=6.0.14|<6.0.14","status":"affected"},{"version":"6.0.14","status":"unaffected"}]}],"recommendation":"Update to version 6.0.14 to resolve CVE-2023-34053 or update to version 6.1.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34053","name":"NVD"},"references":[{"id":"CVE-2023-34053","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34053","name":"NVD"}},{"id":"cve-2023-34053","source":{"url":"https://spring.io/security/cve-2023-34053"}},{"id":"ntap-20231214-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231214-0007"}}],"advisories":[{"title":"CVE-2023-34053","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34053"},{"title":"cve-2023-34053","url":"https://spring.io/security/cve-2023-34053"},{"title":"NetApp Advisory ntap-20231214-0007","url":"https://security.netapp.com/advisory/ntap-20231214-0007"}],"cwes":[],"description":"Spring Framework vulnerable to denial of service","detail":"# Spring Framework vulnerable to denial of service In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * io.micrometer:micrometer-core\u00a0is on the classpath * an ObservationRegistry is configured in the application to record observations Typically, Spring Boot applications need the org.springframework.boot:spring-boot-actuator\u00a0dependency to meet all conditions.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-11-28T09:30:27","updated":"2025-02-13T19:37:10","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2024-38828","bom-ref":"CVE-2024-38828/pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.3.42|<5.3.42","status":"affected"},{"version":"5.3.42","status":"unaffected"}]}],"recommendation":"Update to version 5.3.42 to resolve CVE-2024-38828 or update to version 6.1.14 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38828","name":"NVD"},"references":[{"id":"CVE-2024-38828","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38828","name":"NVD"}},{"id":"cve-2024-38828","source":{"url":"https://spring.io/security/cve-2024-38828"}}],"advisories":[{"title":"CVE-2024-38828","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38828"},{"title":"cve-2024-38828","url":"https://spring.io/security/cve-2024-38828"}],"cwes":[400],"description":"Spring MVC controller vulnerable to a DoS attack","detail":"# Spring MVC controller vulnerable to a DoS attack Spring MVC controller methods with an @RequestBody byte[]\u00a0method parameter are vulnerable to a DoS attack.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2024-11-18T06:30:35","updated":"2025-03-14T20:15:27","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-web@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-webmvc@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 7 locations"}]},{"id":"CVE-2020-17521","bom-ref":"CVE-2020-17521/pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar","versions":[{"range":"vers:maven/!=2.4.21|<2.4.21","status":"affected"},{"version":"2.4.21","status":"unaffected"}]}],"recommendation":"Update to version 2.4.21.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-17521","name":"NVD"},"references":[{"id":"apache-msg-ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E"}},{"id":"apache-msg-r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"ntap-20201218-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20201218-0006"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"CVE-2020-17521","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-17521","name":"NVD"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3@%3Cdev.atlas.apache.org%3E"}},{"id":"CVE-2020-17521","source":{"url":"https://groovy-lang.org/security.html#CVE-2020-17521"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"NetApp Advisory ntap-20201218-0006","url":"https://security.netapp.com/advisory/ntap-20201218-0006"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"CVE-2020-17521","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-17521"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"CVE-2020-17521","url":"https://groovy-lang.org/security.html#CVE-2020-17521"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[379],"description":"Information Disclosure in Apache Groovy","detail":"# Information Disclosure in Apache Groovy Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2020-12-09T19:03:03","updated":"2024-10-17T16:22:52","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.boot/spring-boot-starter-thymeleaf@1.5.1.RELEASE?type=jar\", \"pkg:maven/nz.net.ultraq.thymeleaf/thymeleaf-layout-dialect@1.4.0?type=jar\", \"pkg:maven/org.codehaus.groovy/groovy@2.4.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2018-3258","bom-ref":"CVE-2018-3258/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=2.0.14|<=8.0.12|!=8.0.13","status":"affected"},{"version":"8.0.13","status":"unaffected"}]}],"recommendation":"Update to version 8.0.13 to resolve CVE-2018-3258 or update to version 8.0.28 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3258","name":"NVD"},"references":[{"id":"RHSA-2019:1545","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1545"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"ntap-20181018-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20181018-0002"}},{"id":"CVE-2018-3258","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3258","name":"NVD"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2019:1545","url":"https://access.redhat.com/errata/RHSA-2019:1545"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"NetApp Advisory ntap-20181018-0002","url":"https://security.netapp.com/advisory/ntap-20181018-0002"},{"title":"CVE-2018-3258","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3258"}],"cwes":[269],"description":"Improper Privilege Management in MySQL Connectors Java","detail":"# Improper Privilege Management in MySQL Connectors Java Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).","ratings":[{"method":"CVSSv3","severity":"high","score":8.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-05-13T01:52:26","updated":"2024-02-20T05:34:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-21363","bom-ref":"CVE-2022-21363/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=2.0.14|<=8.0.27|!=8.0.28","status":"affected"},{"version":"8.0.28","status":"unaffected"}]}],"recommendation":"Update to version 8.0.28.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21363","name":"NVD"},"references":[{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"CVE-2022-21363","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21363","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"CVE-2022-21363","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21363"}],"cwes":[280],"description":"Improper Handling of Insufficient Permissions or Privileges in MySQL Connectors Java","detail":"# Improper Handling of Insufficient Permissions or Privileges in MySQL Connectors Java Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).","ratings":[{"method":"CVSSv31","severity":"medium","score":6.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-01-20T00:00:48","updated":"2023-11-08T04:08:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2019-2692","bom-ref":"CVE-2019-2692/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=2.0.14|<=8.0.15|!=8.0.16","status":"affected"},{"version":"8.0.16","status":"unaffected"}]}],"recommendation":"Update to version 8.0.16 to resolve CVE-2019-2692 or update to version 8.0.28 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2692","name":"NVD"},"references":[{"id":"ntap-20190423-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190423-0002"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"SNYK-JAVA-MYSQL-174574","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574"}},{"id":"securityfocus-msg-107925","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/107925"}},{"id":"CVE-2019-2692","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2692","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20190423-0002","url":"https://security.netapp.com/advisory/ntap-20190423-0002"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Snyk Advisory SNYK-JAVA-MYSQL-174574","url":"https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574"},{"title":"CVE-2019-2692","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2692"}],"cwes":[843],"description":"Privilege escalation in mysql-connector-jav","detail":"# Privilege escalation in mysql-connector-jav Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","ratings":[{"method":"CVSSv3","severity":"medium","score":6.3,"vector":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"published":"2020-07-01T17:12:20","updated":"2024-02-17T05:24:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-22102","bom-ref":"CVE-2023-22102/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=2.0.14|<=8.0.33|>=2.0.14|<=8.0.33","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-22102. Updating to version 8.0.28 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22102","name":"NVD"},"references":[{"id":"ntap-20231027-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231027-0007"}},{"id":"CVE-2023-22102","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22102","name":"NVD"}},{"id":"cpuoct2023","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2023.html"}}],"advisories":[{"title":"NetApp Advisory ntap-20231027-0007","url":"https://security.netapp.com/advisory/ntap-20231027-0007"},{"title":"CVE-2023-22102","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22102"},{"title":"Oracle Advisory cpuoct2023","url":"https://www.oracle.com/security-alerts/cpuoct2023.html"}],"cwes":[],"description":"MySQL Connectors takeover vulnerability","detail":"# MySQL Connectors takeover vulnerability Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors.","ratings":[{"method":"CVSSv4","severity":"high","score":8.9,"vector":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"}],"published":"2023-10-18T00:31:42","updated":"2024-12-05T17:02:29","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-2471","bom-ref":"CVE-2021-2471/pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","affects":[{"ref":"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar","versions":[{"range":"vers:maven/>=8.0.0|<=8.0.26|!=8.0.27","status":"affected"},{"version":"8.0.27","status":"unaffected"}]}],"recommendation":"Update to version 8.0.27 to resolve CVE-2021-2471 or update to version 8.0.28 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2471","name":"NVD"},"references":[{"id":"CVE-2021-2471","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2471","name":"NVD"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}}],"advisories":[{"title":"CVE-2021-2471","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2471"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[863],"description":"Incorrect Authorization in MySQL Connector Java","detail":"# Incorrect Authorization in MySQL Connector Java Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H).","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H"}],"published":"2022-05-24T19:18:20","updated":"2023-11-08T04:05:14","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-22570","bom-ref":"CVE-2021-22570/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.15.0","status":"affected"},{"version":"3.15.0","status":"unaffected"}]}],"recommendation":"Update to version 3.15.0 to resolve CVE-2021-22570 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22570","name":"NVD"},"references":[{"id":"PYSEC-2022-48","source":{"name":"GitHub Advisory","url":"https://github.com/pypa/advisory-database/tree/main/vulns/protobuf/PYSEC-2022-48.yaml"}},{"id":"fedoraproject-msg-NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP"}},{"id":"CVE-2021-22570","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22570","name":"NVD"}},{"id":"debian-msg-msg00019","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html"}},{"id":"fedoraproject-msg-5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X"}},{"id":"fedoraproject-msg-IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ"}},{"id":"fedoraproject-msg-BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY"}},{"id":"fedoraproject-msg-3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA"}},{"id":"fedoraproject-msg-KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B"}},{"id":"GHSA-77rm-9x9h-xj3g","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-77rm-9x9h-xj3g"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"fedoraproject-msg-MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE"}},{"id":"ntap-20220429-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220429-0005"}}],"advisories":[{"title":"GitHub Advisory PYSEC-2022-48","url":"https://github.com/pypa/advisory-database/tree/main/vulns/protobuf/PYSEC-2022-48.yaml"},{"title":"CVE-2021-22570","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22570"},{"title":"GitHub Advisory GHSA-77rm-9x9h-xj3g","url":"https://github.com/advisories/GHSA-77rm-9x9h-xj3g"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"NetApp Advisory ntap-20220429-0005","url":"https://security.netapp.com/advisory/ntap-20220429-0005"}],"cwes":[476],"description":"NULL Pointer Dereference in Protocol Buffers","detail":"# NULL Pointer Dereference in Protocol Buffers Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater. ## Related CVE(s) CGA-j63r-xcw7-ppw8, CVE-2021-22570, PYSEC-2022-48","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2022-01-27T00:01:15","updated":"2024-10-22T05:28:58","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-3510","bom-ref":"CVE-2022-3510/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.16.3","status":"affected"},{"version":"3.16.3","status":"unaffected"}]}],"recommendation":"Update to version 3.16.3 to resolve CVE-2022-3510 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3510","name":"NVD"},"references":[{"id":"CVE-2022-3510","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3510","name":"NVD"}}],"advisories":[{"title":"CVE-2022-3510","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3510"}],"cwes":[400],"description":"Protobuf Java vulnerable to Uncontrolled Resource Consumption","detail":"# Protobuf Java vulnerable to Uncontrolled Resource Consumption A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above. ## Related CVE(s) CGA-24m5-8f5h-34wq, CVE-2022-3510","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-12-12T15:30:33","updated":"2024-10-22T05:29:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-7254","bom-ref":"CVE-2024-7254/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.25.5","status":"affected"},{"version":"3.25.5","status":"unaffected"}]}],"recommendation":"Update to version 3.25.5.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7254","name":"NVD"},"references":[{"id":"CVE-2024-7254","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7254","name":"NVD"}},{"id":"CVE-2024-7254","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/google-protobuf/CVE-2024-7254.yml"}},{"id":"ntap-20241213-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241213-0010"}},{"id":"ntap-20250418-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250418-0006"}},{"id":"GHSA-735f-pc8j-v9w8","source":{"name":"GitHub Advisory","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-735f-pc8j-v9w8"}}],"advisories":[{"title":"CVE-2024-7254","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7254"},{"title":"GitHub Advisory CVE-2024-7254","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/google-protobuf/CVE-2024-7254.yml"},{"title":"NetApp Advisory ntap-20241213-0010","url":"https://security.netapp.com/advisory/ntap-20241213-0010"},{"title":"NetApp Advisory ntap-20250418-0006","url":"https://security.netapp.com/advisory/ntap-20250418-0006"},{"title":"GitHub Advisory GHSA-735f-pc8j-v9w8","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-735f-pc8j-v9w8"}],"cwes":[20],"description":"protobuf-java has potential Denial of Service issue","detail":"# protobuf-java has potential Denial of Service issue ### Summary When parsing unknown fields in the Protobuf Java Lite and Full library, a maliciously crafted message can cause a StackOverflow error and lead to a program crash. Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team Affected versions: This issue affects all versions of both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime. ### Severity [CVE-2024-7254](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254) **High** CVSS4.0 Score 8.7 (NOTE: there may be a delay in publication) This is a potential Denial of Service. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker. ### Proof of Concept For reproduction details, please refer to the unit tests (Protobuf Java [LiteTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/lite/src/test/java/com/google/protobuf/LiteTest.java) and [CodedInputStreamTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/core/src/test/java/com/google/protobuf/CodedInputStreamTest.java)) that identify the specific inputs that exercise this parsing weakness. ### Remediation and Mitigation We have been working diligently to address this issue and have released a mitigation that is available now. Please update to the latest available versions of the following packages: * protobuf-java (3.25.5, 4.27.5, 4.28.2) * protobuf-javalite (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin-lite (3.25.5, 4.27.5, 4.28.2) * com-protobuf [JRuby gem only] (3.25.5, 4.27.5, 4.28.2)","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-09-19T16:06:03","updated":"2025-04-23T15:03:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-3509","bom-ref":"CVE-2022-3509/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.16.3","status":"affected"},{"version":"3.16.3","status":"unaffected"}]}],"recommendation":"Update to version 3.16.3 to resolve CVE-2022-3509 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3509","name":"NVD"},"references":[{"id":"CVE-2022-3509","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3509","name":"NVD"}}],"advisories":[{"title":"CVE-2022-3509","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3509"}],"cwes":[400],"description":"Protobuf Java vulnerable to Uncontrolled Resource Consumption","detail":"# Protobuf Java vulnerable to Uncontrolled Resource Consumption A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above. ## Related CVE(s) CGA-m9x3-8pwv-rjh3, CVE-2022-3509","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-12-12T15:30:33","updated":"2024-10-22T05:29:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-3171","bom-ref":"CVE-2022-3171/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/!=3.21.7|<3.21.7","status":"affected"},{"version":"3.21.7","status":"unaffected"}]}],"recommendation":"Update to version 3.21.7 to resolve CVE-2022-3171 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3171","name":"NVD"},"references":[{"id":"fedoraproject-msg-CBAUKJQL6O4TIWYBENORSY5P43TVB4M3","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3"}},{"id":"CVE-2022-3171","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3171","name":"NVD"}},{"id":"fedoraproject-msg-MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP"}},{"id":"CVE-2022-3171","source":{"name":"GitHub Advisory","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/google-protobuf/CVE-2022-3171.yml"}},{"id":"GHSA-h4h5-3hr4-j3g2","source":{"name":"GitHub Advisory","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2"}},{"id":"glsa-202301-09","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202301-09"}}],"advisories":[{"title":"CVE-2022-3171","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3171"},{"title":"GitHub Advisory CVE-2022-3171","url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/google-protobuf/CVE-2022-3171.yml"},{"title":"GitHub Advisory GHSA-h4h5-3hr4-j3g2","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2"},{"title":"Gentoo Advisory glsa-202301-09","url":"https://security.gentoo.org/glsa/202301-09"}],"cwes":[20],"description":"protobuf-java has a potential Denial of Service issue","detail":"# protobuf-java has a potential Denial of Service issue ## Summary A potential Denial of Service issue in `protobuf-java` core and lite was discovered in the parsing procedure for binary and text format data. Input streams containing multiple instances of non-repeated [embedded messages](http://developers.google.com/protocol-buffers/docs/encoding#embedded) with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. Reporter: [OSS Fuzz](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48771) Affected versions: This issue affects both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime. ## Severity [CVE-2022-3171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3171) Medium - CVSS Score: 5.7 (NOTE: there may be a delay in publication) ## Remediation and Mitigation Please update to the latest available versions of the following packages: protobuf-java (3.21.7, 3.20.3, 3.19.6, 3.16.3) protobuf-javalite (3.21.7, 3.20.3, 3.19.6, 3.16.3) protobuf-kotlin (3.21.7, 3.20.3, 3.19.6, 3.16.3) protobuf-kotlin-lite (3.21.7, 3.20.3, 3.19.6, 3.16.3) google-protobuf [JRuby gem only] (3.21.7, 3.20.3, 3.19.6) ## Related CVE(s) CGA-xp6q-2w42-9mfm, CVE-2022-3171","ratings":[{"method":"CVSSv31","severity":"medium","score":5.7,"vector":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-10-04T22:17:15","updated":"2024-10-22T05:28:55","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-22569","bom-ref":"CVE-2021-22569/pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","affects":[{"ref":"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=3.9.2|!=3.16.1","status":"affected"},{"version":"3.16.1","status":"unaffected"}]}],"recommendation":"Update to version 3.16.1 to resolve CVE-2021-22569 or update to version 3.25.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22569","name":"NVD"},"references":[{"id":"GHSA-wrvw-hg22-4m67","source":{"name":"GitHub Advisory","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67"}},{"id":"openwall-oss-security-msg-2022-01-12-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2022/01/12/4"}},{"id":"CVE-2021-22569","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22569","name":"NVD"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"openwall-oss-security-msg-2022-01-12-7","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2022/01/12/7"}}],"advisories":[{"title":"GitHub Advisory GHSA-wrvw-hg22-4m67","url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67"},{"title":"CVE-2021-22569","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22569"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}],"cwes":[696],"description":"A potential Denial of Service issue in protobuf-java","detail":"# A potential Denial of Service issue in protobuf-java ## Summary A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data. Reporter: [OSS-Fuzz](https://github.com/google/oss-fuzz) Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf \"javalite\" users (typically Android) are not affected. ## Severity [CVE-2021-22569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22569) **High** - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses. ## Proof of Concept For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness. ## Remediation and Mitigation Please update to the latest available versions of the following packages: - protobuf-java (3.16.1, 3.18.2, 3.19.2) - protobuf-kotlin (3.18.2, 3.19.2) - google-protobuf [JRuby gem only] (3.19.2) ## Related CVE(s) CGA-h8j8-9v3w-chjj, CVE-2021-22569","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-01-07T22:31:44","updated":"2024-10-22T05:28:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/mysql/mysql-connector-java@8.0.12?type=jar\", \"pkg:maven/com.google.protobuf/protobuf-java@2.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-25845","bom-ref":"CVE-2022-25845/pkg:maven/com.alibaba/fastjson@1.2.24?type=jar","affects":[{"ref":"pkg:maven/com.alibaba/fastjson@1.2.24?type=jar","versions":[{"range":"vers:maven/!=1.2.83|<1.2.83","status":"affected"},{"version":"1.2.83","status":"unaffected"}]}],"recommendation":"Update to version 1.2.83.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25845","name":"NVD"},"references":[{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"SNYK-JAVA-COMALIBABA-2859222","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222"}},{"id":"CVE-2022-25845","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25845","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Snyk Advisory SNYK-JAVA-COMALIBABA-2859222","url":"https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222"},{"title":"CVE-2022-25845","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25845"}],"cwes":[502],"description":"Unsafe deserialization in com.alibaba:fastjson","detail":"# Unsafe deserialization in com.alibaba:fastjson The package com.alibaba:fastjson before 1.2.83 is vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-06-11T00:00:17","updated":"2024-09-03T04:42:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/com.alibaba/fastjson@1.2.24?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable Bounty target\\nUsed in 7 locations\\nVendor Confirmed"}]},{"id":"CVE-2018-1000632","bom-ref":"CVE-2018-1000632/pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","affects":[{"ref":"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","versions":[{"range":"vers:maven/!=2.1.1|<2.1.1","status":"affected"},{"version":"2.1.1","status":"unaffected"}]}],"recommendation":"Update to version 2.1.1 to resolve CVE-2018-1000632 or update to version 2.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000632","name":"NVD"},"references":[{"id":"apache-msg-7f6e120e6ed473f4e00dde4c398fc6698eb383bd7857d20513e989ce","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7f6e120e6ed473f4e00dde4c398fc6698eb383bd7857d20513e989ce@%3Cdev.maven.apache.org%3E"}},{"id":"fedoraproject-msg-IOOVVCRQE6ATFD2JM2EMDXOQXTRIVZGP","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOOVVCRQE6ATFD2JM2EMDXOQXTRIVZGP"}},{"id":"GHSA-6pcc-3rfx-4gpm","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-6pcc-3rfx-4gpm"}},{"id":"CVE-2018-1000632","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000632","name":"NVD"}},{"id":"RHSA-2019:0380","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0380"}},{"id":"RHSA-2019:1160","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1160"}},{"id":"RHSA-2019:3172","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3172"}},{"id":"apache-msg-d7d960b2778e35ec9b4d40c8efd468c7ce7163bcf6489b633491c89f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d7d960b2778e35ec9b4d40c8efd468c7ce7163bcf6489b633491c89f@%3Cdev.maven.apache.org%3E"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"ntap-20190530-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190530-0001"}},{"id":"RHSA-2019:1159","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1159"}},{"id":"RHSA-2019:1161","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1161"}},{"id":"apache-msg-rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E"}},{"id":"RHSA-2019:0364","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0364"}},{"id":"fedoraproject-msg-KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA"}},{"id":"dom4j-xml-injection","source":{"name":"Ihacktoprotect Advisory","url":"https://ihacktoprotect.com/post/dom4j-xml-injection"}},{"id":"apache-msg-7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458@%3Cdev.maven.apache.org%3E"}},{"id":"apache-msg-9d4c1af6f702c3d6d6f229de57112ddccac8ce44446a01b7937ab9e0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/9d4c1af6f702c3d6d6f229de57112ddccac8ce44446a01b7937ab9e0@%3Ccommits.maven.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-5a020ecaa3c701f408f612f7ba2ee37a021644c4a39da2079ed3ddbc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/5a020ecaa3c701f408f612f7ba2ee37a021644c4a39da2079ed3ddbc@%3Ccommits.maven.apache.org%3E"}},{"id":"RHSA-2019:0365","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0365"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-4a77652531d62299a30815cf5f233af183425db8e3c9a824a814e768","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4a77652531d62299a30815cf5f233af183425db8e3c9a824a814e768@%3Cdev.maven.apache.org%3E"}},{"id":"apache-msg-708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"}},{"id":"debian-msg-msg00028","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00028.html"}},{"id":"apache-msg-00571f362a7a2470fba50a31282c65637c40d2e21ebe6ee535a4ed74","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/00571f362a7a2470fba50a31282c65637c40d2e21ebe6ee535a4ed74@%3Ccommits.maven.apache.org%3E"}},{"id":"RHSA-2019:1162","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:1162"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"RHSA-2019:0362","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:0362"}}],"advisories":[{"title":"GitHub Advisory GHSA-6pcc-3rfx-4gpm","url":"https://github.com/advisories/GHSA-6pcc-3rfx-4gpm"},{"title":"CVE-2018-1000632","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000632"},{"title":"Red Hat Advisory RHSA-2019:0380","url":"https://access.redhat.com/errata/RHSA-2019:0380"},{"title":"Red Hat Advisory RHSA-2019:1160","url":"https://access.redhat.com/errata/RHSA-2019:1160"},{"title":"Red Hat Advisory RHSA-2019:3172","url":"https://access.redhat.com/errata/RHSA-2019:3172"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"NetApp Advisory ntap-20190530-0001","url":"https://security.netapp.com/advisory/ntap-20190530-0001"},{"title":"Red Hat Advisory RHSA-2019:1159","url":"https://access.redhat.com/errata/RHSA-2019:1159"},{"title":"Red Hat Advisory RHSA-2019:1161","url":"https://access.redhat.com/errata/RHSA-2019:1161"},{"title":"Red Hat Advisory RHSA-2019:0364","url":"https://access.redhat.com/errata/RHSA-2019:0364"},{"title":"Ihacktoprotect Advisory dom4j-xml-injection","url":"https://ihacktoprotect.com/post/dom4j-xml-injection"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Red Hat Advisory RHSA-2019:0365","url":"https://access.redhat.com/errata/RHSA-2019:0365"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Red Hat Advisory RHSA-2019:1162","url":"https://access.redhat.com/errata/RHSA-2019:1162"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Red Hat Advisory RHSA-2019:0362","url":"https://access.redhat.com/errata/RHSA-2019:0362"}],"cwes":[91],"description":"Dom4j contains a XML Injection vulnerability","detail":"# Dom4j contains a XML Injection vulnerability dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2018-10-16T17:01:25","updated":"2024-03-14T05:33:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 4 locations"}]},{"id":"CVE-2020-10683","bom-ref":"CVE-2020-10683/pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","affects":[{"ref":"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar","versions":[{"range":"vers:maven/!=2.1.3|<2.1.3","status":"affected"},{"version":"2.1.3","status":"unaffected"}]}],"recommendation":"Update to version 2.1.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10683","name":"NVD"},"references":[{"id":"redhat-bugzilla-1694235","source":{"name":"Red Hat Bugzilla","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1694235"}},{"id":"ntap-20200518-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200518-0002"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"XML_External_Entity_Prevention_Cheat_Sheet","source":{"name":"Owasp Advisory","url":"https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html"}},{"id":"CVE-2020-10683","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10683","name":"NVD"}},{"id":"apache-msg-rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E"}},{"id":"apache-msg-r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"opensuse-msg-msg00061","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}}],"advisories":[{"title":"NetApp Advisory ntap-20200518-0002","url":"https://security.netapp.com/advisory/ntap-20200518-0002"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Owasp Advisory XML_External_Entity_Prevention_Cheat_Sheet","url":"https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html"},{"title":"CVE-2020-10683","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10683"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[611],"description":"dom4j allows External Entities by default which might enable XXE attacks","detail":"# dom4j allows External Entities by default which might enable XXE attacks dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2020-06-05T16:13:36","updated":"2024-03-08T05:17:29","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.dom4j/dom4j@2.1.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 4 locations"}]},{"id":"CVE-2023-2976","bom-ref":"CVE-2023-2976/pkg:maven/com.google.guava/guava@23.0?type=jar","affects":[{"ref":"pkg:maven/com.google.guava/guava@23.0?type=jar","versions":[{"range":"vers:maven/!=32.0.0-android|<32.0.0-android","status":"affected"},{"version":"32.0.0-android","status":"unaffected"}]}],"recommendation":"Update to version 32.0.0-android.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2976","name":"NVD"},"references":[{"id":"ntap-20230818-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230818-0008"}},{"id":"CVE-2023-2976","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2976","name":"NVD"}},{"id":"intel-sa-01006","source":{"name":"Intel Advisory","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html"}}],"advisories":[{"title":"NetApp Advisory ntap-20230818-0008","url":"https://security.netapp.com/advisory/ntap-20230818-0008"},{"title":"CVE-2023-2976","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2976"},{"title":"Intel Advisory intel-sa-01006","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html"}],"cwes":[379,552],"description":"Guava vulnerable to insecure use of temporary directory","detail":"# Guava vulnerable to insecure use of temporary directory Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, maintainers recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows. ## Related CVE(s) CGA-g8pm-vcpp-9jxq, CVE-2023-2976","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2023-06-14T18:30:38","updated":"2025-02-13T19:12:26","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/com.google.guava/guava@23.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 3 locations"}]},{"id":"CVE-2018-10237","bom-ref":"CVE-2018-10237/pkg:maven/com.google.guava/guava@23.0?type=jar","affects":[{"ref":"pkg:maven/com.google.guava/guava@23.0?type=jar","versions":[{"range":"vers:maven/!=24.1.1-android|<24.1.1-android","status":"affected"},{"version":"24.1.1-android","status":"unaffected"}]}],"recommendation":"Update to version 24.1.1-android to resolve CVE-2018-10237 or update to version 32.0.0-android to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10237","name":"NVD"},"references":[{"id":"apache-msg-r95799427b335807a4c54776908125c3e66597b65845ae50096d9278a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r95799427b335807a4c54776908125c3e66597b65845ae50096d9278a@%3Cdev.cxf.apache.org%3E"}},{"id":"apache-msg-r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E"}},{"id":"RHSA-2018:2742","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2742"}},{"id":"apache-msg-r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-ra8906723927aef2a599398c238eacfc845b74d812e0093ec2fc70a7d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra8906723927aef2a599398c238eacfc845b74d812e0093ec2fc70a7d@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"}},{"id":"RHSA-2018:2643","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2643"}},{"id":"securitytracker-msg-1041707","source":{"name":"Securitytracker Mailing List","url":"http://www.securitytracker.com/id/1041707"}},{"id":"apache-msg-rdc56c15693c236e31e1e95f847b8e5e74fc0a05741d47488e7fc8c45","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdc56c15693c236e31e1e95f847b8e5e74fc0a05741d47488e7fc8c45@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-r27eb79a87a760335226dbfa6a7b7bffea539a535f8e80c41e482106d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r27eb79a87a760335226dbfa6a7b7bffea539a535f8e80c41e482106d@%3Cdev.cxf.apache.org%3E"}},{"id":"apache-msg-rb3da574c34bc6bd37972d2266af3093b90d7e437460423c24f477919","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb3da574c34bc6bd37972d2266af3093b90d7e437460423c24f477919@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E"}},{"id":"apache-msg-rc78f6e84f82cc662860e96526d8ab969f34dbe12dc560e22d9d147a3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc78f6e84f82cc662860e96526d8ab969f34dbe12dc560e22d9d147a3@%3Cdev.cxf.apache.org%3E"}},{"id":"RHSA-2019:2858","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2858"}},{"id":"RHSA-2019:3149","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:3149"}},{"id":"apache-msg-19fa48533bc7ea1accf6b12746a74ed888ae6e49a5cf81ae4f807495","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/19fa48533bc7ea1accf6b12746a74ed888ae6e49a5cf81ae4f807495@%3Ccommon-dev.hadoop.apache.org%3E"}},{"id":"apache-msg-ra4f44016926dcb034b3b230280a18102062f94ae55b8a31bb92fed84","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra4f44016926dcb034b3b230280a18102062f94ae55b8a31bb92fed84@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r43491b25b2e5c368c34b106a82eff910a5cea3e90de82ad75cc16540","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r43491b25b2e5c368c34b106a82eff910a5cea3e90de82ad75cc16540@%3Cdev.syncope.apache.org%3E"}},{"id":"apache-msg-rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1@%3Ccommon-dev.hadoop.apache.org%3E"}},{"id":"apache-msg-33c6bccfeb7adf644d4d79894ca8f09370be6ed4b20632c2e228d085","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/33c6bccfeb7adf644d4d79894ca8f09370be6ed4b20632c2e228d085@%3Ccommits.cassandra.apache.org%3E"}},{"id":"RHSA-2018:2741","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2741"}},{"id":"RHSA-2018:2423","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2423"}},{"id":"RHSA-2018:2425","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2425"}},{"id":"google-msg-discussion","source":{"name":"Google Mailing List","url":"https://groups.google.com/d/topic/guava-announce/xqWALw4W1vs/discussion"}},{"id":"RHSA-2018:2740","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2740"}},{"id":"RHSA-2018:2428","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2428"}},{"id":"apache-msg-053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-r50fc0bcc734dd82e691d36d209258683141bfc0083739a77e56ad92d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r50fc0bcc734dd82e691d36d209258683141bfc0083739a77e56ad92d@%3Cdev.flink.apache.org%3E"}},{"id":"apache-msg-r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94@%3Cissues.storm.apache.org%3E"}},{"id":"apache-msg-r223bc776a077d0795786c38cbc6e7dd808fce1a9161b00ba9c0a5d55","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r223bc776a077d0795786c38cbc6e7dd808fce1a9161b00ba9c0a5d55@%3Cissues.lucene.apache.org%3E"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"apache-msg-r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E"}},{"id":"apache-msg-r38e2ab87528d3c904e7fac496e8fd766b9277656ff95b97d6b6b6dcd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r38e2ab87528d3c904e7fac496e8fd766b9277656ff95b97d6b6b6dcd@%3Cdev.cxf.apache.org%3E"}},{"id":"apache-msg-rd0c8ec6e044aa2958dd0549ebf8ecead7f5968c9474ba73a504161b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0c8ec6e044aa2958dd0549ebf8ecead7f5968c9474ba73a504161b2@%3Cdev.cxf.apache.org%3E"}},{"id":"apache-msg-f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"}},{"id":"ntap-20220629-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220629-0008"}},{"id":"apache-msg-cc48fe770c45a74dc3b37ed0817393e0c96701fc49bc431ed922f3cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/cc48fe770c45a74dc3b37ed0817393e0c96701fc49bc431ed922f3cc@%3Chdfs-dev.hadoop.apache.org%3E"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E"}},{"id":"RHSA-2018:2927","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2927"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E"}},{"id":"RHSA-2018:2743","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2743"}},{"id":"apache-msg-r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E"}},{"id":"apache-msg-3d5dbdd92ac9ceaef90e40f78599f9109f2f345252e0ac9d98e7e084","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/3d5dbdd92ac9ceaef90e40f78599f9109f2f345252e0ac9d98e7e084@%3Cgitbox.activemq.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E"}},{"id":"apache-msg-r2ea4e5e5aa8ad73b001a466c582899620961f47d77a40af712c1fdf9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2ea4e5e5aa8ad73b001a466c582899620961f47d77a40af712c1fdf9@%3Cdev.cxf.apache.org%3E"}},{"id":"RHSA-2018:2424","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2424"}},{"id":"RHSA-2018:2598","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2598"}},{"id":"CVE-2018-10237","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10237","name":"NVD"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:2742","url":"https://access.redhat.com/errata/RHSA-2018:2742"},{"title":"Red Hat Advisory RHSA-2018:2643","url":"https://access.redhat.com/errata/RHSA-2018:2643"},{"title":"Red Hat Advisory RHSA-2019:2858","url":"https://access.redhat.com/errata/RHSA-2019:2858"},{"title":"Red Hat Advisory RHSA-2019:3149","url":"https://access.redhat.com/errata/RHSA-2019:3149"},{"title":"Red Hat Advisory RHSA-2018:2741","url":"https://access.redhat.com/errata/RHSA-2018:2741"},{"title":"Red Hat Advisory RHSA-2018:2423","url":"https://access.redhat.com/errata/RHSA-2018:2423"},{"title":"Red Hat Advisory RHSA-2018:2425","url":"https://access.redhat.com/errata/RHSA-2018:2425"},{"title":"Red Hat Advisory RHSA-2018:2740","url":"https://access.redhat.com/errata/RHSA-2018:2740"},{"title":"Red Hat Advisory RHSA-2018:2428","url":"https://access.redhat.com/errata/RHSA-2018:2428"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"NetApp Advisory ntap-20220629-0008","url":"https://security.netapp.com/advisory/ntap-20220629-0008"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Red Hat Advisory RHSA-2018:2927","url":"https://access.redhat.com/errata/RHSA-2018:2927"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Red Hat Advisory RHSA-2018:2743","url":"https://access.redhat.com/errata/RHSA-2018:2743"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Red Hat Advisory RHSA-2018:2424","url":"https://access.redhat.com/errata/RHSA-2018:2424"},{"title":"Red Hat Advisory RHSA-2018:2598","url":"https://access.redhat.com/errata/RHSA-2018:2598"},{"title":"CVE-2018-10237","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10237"}],"cwes":[502,770],"description":"Denial of Service in Google Guava","detail":"# Denial of Service in Google Guava Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable. ## Related CVE(s) CGA-8223-gxg7-8cjf, CVE-2018-10237","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2020-06-15T20:35:11","updated":"2024-10-22T05:29:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/com.google.guava/guava@23.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 3 locations"}]},{"id":"CVE-2020-13956","bom-ref":"CVE-2020-13956/pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar","affects":[{"ref":"pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar","versions":[{"range":"vers:maven/>=4.0-alpha1|<=4.5.12|!=4.5.13","status":"affected"},{"version":"4.5.13","status":"unaffected"}]}],"recommendation":"Update to version 4.5.13.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13956","name":"NVD"},"references":[{"id":"CVE-2020-13956","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13956","name":"NVD"}},{"id":"apache-msg-ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E"}},{"id":"apache-msg-rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E"}},{"id":"apache-msg-r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E"}},{"id":"apache-msg-r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E"}},{"id":"apache-msg-rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E"}},{"id":"apache-msg-rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E"}},{"id":"apache-msg-r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E"}},{"id":"apache-msg-r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E"}},{"id":"ntap-20220210-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0002"}},{"id":"apache-msg-r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E"}},{"id":"apache-msg-rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E"}},{"id":"apache-msg-r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E"}},{"id":"apache-msg-r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E"}},{"id":"apache-msg-r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E"}},{"id":"apache-msg-rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E"}},{"id":"apache-msg-r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E"}},{"id":"apache-msg-rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E"}},{"id":"apache-msg-rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"apache-msg-re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E"}},{"id":"apache-msg-r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E"}},{"id":"apache-msg-r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E"}},{"id":"apache-msg-ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E"}},{"id":"apache-msg-r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"apache-msg-r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E"}}],"advisories":[{"title":"CVE-2020-13956","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13956"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"NetApp Advisory ntap-20220210-0002","url":"https://security.netapp.com/advisory/ntap-20220210-0002"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[79],"description":"Cross-site scripting in Apache HttpClient","detail":"# Cross-site scripting in Apache HttpClient Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"published":"2021-06-03T23:40:23","updated":"2024-03-15T05:19:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.httpcomponents/httpclient@4.5.12?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 3 locations"}]},{"id":"CVE-2021-45046","bom-ref":"CVE-2021-45046/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/!=2.16.0|<2.16.0","status":"affected"},{"version":"2.16.0","status":"unaffected"}]}],"recommendation":"Update to version 2.16.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45046","name":"NVD"},"references":[{"id":"CVE-2021-45046","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45046","name":"NVD"}},{"id":"SNWLID-2021-0032","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"}},{"id":"ssa-714170","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"}},{"id":"openwall-oss-security-msg-2021-12-15-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/15/3"}},{"id":"openwall-oss-security-msg-2021-12-14-4","source":{"name":"Openwall Mailing List","url":"https://www.openwall.com/lists/oss-security/2021/12/14/4"}},{"id":"dsa-5022","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5022"}},{"id":"fedoraproject-msg-EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"fedoraproject-msg-SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"}},{"id":"openwall-oss-security-msg-2021-12-14-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/14/4"}},{"id":"fedoraproject-msg-SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"}},{"id":"930724","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/930724"}},{"id":"ssa-661247","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"}},{"id":"cisco-sa-apache-log4j-qRuKNEbd","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"}},{"id":"glsa-202310-16","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202310-16"}},{"id":"ssa-479842","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"ssa-397453","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"}},{"id":"openwall-oss-security-msg-2021-12-18-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/18/1"}},{"id":"intel-sa-00646","source":{"name":"Intel Advisory","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"}},{"id":"GHSA-jfh8-c2jp-5v3q","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-jfh8-c2jp-5v3q"}},{"id":"CVE-2021-44228","source":{"url":"https://www.cve.org/CVERecord?id=CVE-2021-44228"}},{"id":"fedoraproject-msg-EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"}},{"id":"alert-cve-2021-44228","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"}}],"advisories":[{"title":"CVE-2021-45046","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45046"},{"title":"Sonicwall Advisory SNWLID-2021-0032","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"},{"title":"Siemens Advisory ssa-714170","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"},{"title":"Debian Advisory dsa-5022","url":"https://www.debian.org/security/2021/dsa-5022"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Cert Advisory 930724","url":"https://www.kb.cert.org/vuls/id/930724"},{"title":"Siemens Advisory ssa-661247","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"},{"title":"Cisco Advisory cisco-sa-apache-log4j-qRuKNEbd","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"},{"title":"Gentoo Advisory glsa-202310-16","url":"https://security.gentoo.org/glsa/202310-16"},{"title":"Siemens Advisory ssa-479842","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Siemens Advisory ssa-397453","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"},{"title":"Intel Advisory intel-sa-00646","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"},{"title":"GitHub Advisory GHSA-jfh8-c2jp-5v3q","url":"https://github.com/advisories/GHSA-jfh8-c2jp-5v3q"},{"title":"CVE-2021-44228","url":"https://www.cve.org/CVERecord?id=CVE-2021-44228"},{"title":"Oracle Advisory alert-cve-2021-44228","url":"https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"}],"cwes":[502,917],"description":"Incomplete fix for Apache Log4j vulnerability","detail":"# Incomplete fix for Apache Log4j vulnerability # Impact The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack. ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Mitigation Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.formatMsgNoLookups` to `true` do NOT mitigate this specific vulnerability.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"published":"2021-12-14T18:01:28","updated":"2024-06-27T21:46:12","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-44832","bom-ref":"CVE-2021-44832/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/!=2.12.4|<2.12.4","status":"affected"},{"version":"2.12.4","status":"unaffected"}]}],"recommendation":"Update to version 2.12.4 to resolve CVE-2021-44832 or update to version 2.16.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44832","name":"NVD"},"references":[{"id":"openwall-oss-security-msg-2021-12-28-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/28/1"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"ssa-784507","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"}},{"id":"fedoraproject-msg-T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC"}},{"id":"apache-msg-s1o5vlo78ypqxnzn6p8zf6t9shtq5143","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143"}},{"id":"debian-msg-msg00036","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html"}},{"id":"fedoraproject-msg-EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA"}},{"id":"ntap-20220104-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220104-0001"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cisco-sa-apache-log4j-qRuKNEbd","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"}},{"id":"CVE-2021-44832","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44832","name":"NVD"}},{"id":"LOG4J2-3293","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3293"}}],"advisories":[{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Siemens Advisory ssa-784507","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf"},{"title":"NetApp Advisory ntap-20220104-0001","url":"https://security.netapp.com/advisory/ntap-20220104-0001"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Cisco Advisory cisco-sa-apache-log4j-qRuKNEbd","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"},{"title":"CVE-2021-44832","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44832"},{"title":"Apache Advisory LOG4J2-3293","url":"https://issues.apache.org/jira/browse/LOG4J2-3293"}],"cwes":[20,74],"description":"Improper Input Validation and Injection in Apache Log4j2","detail":"# Improper Input Validation and Injection in Apache Log4j2 Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to an attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. # Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. This issue does not impact default configurations of Log4j2 and requires an attacker to have control over the Log4j2 configuration, which reduces the likelihood of being exploited.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.6,"vector":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-01-04T16:14:20","updated":"2024-02-20T05:37:46","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-44228","bom-ref":"CVE-2021-44228/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/!=2.15.0|<2.15.0","status":"affected"},{"version":"2.15.0","status":"unaffected"}]}],"recommendation":"Update to version 2.15.0 to resolve CVE-2021-44228 or update to version 2.16.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44228","name":"NVD"},"references":[{"id":"packetstormsecurity-exploit-Log4j2-Log4Shell-Regexes.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html"}},{"id":"SNWLID-2021-0032","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"}},{"id":"ssa-714170","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"}},{"id":"openwall-oss-security-msg-2021-12-15-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/15/3"}},{"id":"seclists-exploit-fulldisclosure/2022/Mar/23","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2022/Mar/23"}},{"id":"microsofts-response-to-cve-2021-44228-apache-log4j2","source":{"name":"Microsoft Advisory","url":"https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2"}},{"id":"fedoraproject-msg-VU57UJDCFIASIO35GC55JMKSRXJMCDFM","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM"}},{"id":"be-2022-0001","source":{"name":"Bentley Advisory","url":"https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001"}},{"id":"GHSA-7rjr-3q55-vv33","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-7rjr-3q55-vv33"}},{"id":"HT213189","source":{"name":"Apple Advisory","url":"https://support.apple.com/kb/HT213189"}},{"id":"packetstormsecurity-exploit-log4j-scan-Extensive-Scanner.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"seclists-exploit-fulldisclosure/2022/Dec/2","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2022/Dec/2"}},{"id":"packetstormsecurity-exploit-UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html"}},{"id":"openwall-oss-security-msg-2021-12-14-4","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/14/4"}},{"id":"LOG4J2-3221","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3221"}},{"id":"LOG4J2-3198","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3198"}},{"id":"debian-msg-msg00007","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html"}},{"id":"packetstormsecurity-exploit-VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html"}},{"id":"packetstormsecurity-exploit-MobileIron-Log4Shell-Remote-Command-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html"}},{"id":"dsa-5020","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5020"}},{"id":"930724","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/930724"}},{"id":"ssa-661247","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"}},{"id":"openwall-oss-security-msg-2021-12-10-3","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/10/3"}},{"id":"cisco-sa-apache-log4j-qRuKNEbd","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"}},{"id":"packetstormsecurity-exploit-Apache-Log4j2-2.14.1-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"}},{"id":"packetstormsecurity-exploit-VMware-Security-Advisory-2021-0028.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html"}},{"id":"ntap-20211210-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20211210-0007"}},{"id":"fedoraproject-msg-M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB"}},{"id":"packetstormsecurity-exploit-Log4Shell-HTTP-Header-Injection.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html"}},{"id":"packetstormsecurity-exploit-AD-Manager-Plus-7122-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html"}},{"id":"openwall-oss-security-msg-2021-12-13-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/13/2"}},{"id":"ssa-479842","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"}},{"id":"fedoraproject-msg-M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB"}},{"id":"packetstormsecurity-exploit-VMware-Security-Advisory-2021-0028.4.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"seclists-exploit-fulldisclosure/2022/Jul/11","source":{"name":"Seclists Exploit","url":"http://seclists.org/fulldisclosure/2022/Jul/11"}},{"id":"1469345530182455296","source":{"name":"Twitter Advisory","url":"https://twitter.com/kurtseifried/status/1469345530182455296"}},{"id":"packetstormsecurity-exploit-Apache-Log4j2-2.14.1-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"}},{"id":"ssa-397453","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"}},{"id":"packetstormsecurity-exploit-Log4j-Remote-Code-Execution-Word-Bypassing.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html"}},{"id":"nu11secur1ty-exploit-cve-2021-44228.html","source":{"name":"Nu11secur1ty Exploit","url":"https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html"}},{"id":"LOG4J2-3214","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3214"}},{"id":"CVE-2021-44228","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44228","name":"NVD"}},{"id":"LOG4J2-3201","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-3201"}},{"id":"intel-sa-00646","source":{"name":"Intel Advisory","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"}},{"id":"packetstormsecurity-exploit-Log4j-Payload-Generator.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html"}},{"id":"openwall-oss-security-msg-2021-12-10-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/10/1"}},{"id":"packetstormsecurity-exploit-Apache-Log4j2-2.14.1-Information-Disclosure.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html"}},{"id":"openwall-oss-security-msg-2021-12-13-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/13/1"}},{"id":"fedoraproject-msg-VU57UJDCFIASIO35GC55JMKSRXJMCDFM","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM"}},{"id":"packetstormsecurity-exploit-Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html"}},{"id":"openwall-oss-security-msg-2021-12-10-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/10/2"}},{"id":"packetstormsecurity-exploit-L4sh-Log4j-Remote-Code-Execution.html","source":{"name":"Packetstormsecurity Exploit","url":"http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html"}},{"id":"alert-cve-2021-44228","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"}}],"advisories":[{"title":"Sonicwall Advisory SNWLID-2021-0032","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"},{"title":"Siemens Advisory ssa-714170","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"},{"title":"Microsoft Advisory microsofts-response-to-cve-2021-44228-apache-log4j2","url":"https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2"},{"title":"Bentley Advisory be-2022-0001","url":"https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001"},{"title":"GitHub Advisory GHSA-7rjr-3q55-vv33","url":"https://github.com/advisories/GHSA-7rjr-3q55-vv33"},{"title":"Apple Advisory HT213189","url":"https://support.apple.com/kb/HT213189"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Apache Advisory LOG4J2-3221","url":"https://issues.apache.org/jira/browse/LOG4J2-3221"},{"title":"Apache Advisory LOG4J2-3198","url":"https://issues.apache.org/jira/browse/LOG4J2-3198"},{"title":"Debian Advisory dsa-5020","url":"https://www.debian.org/security/2021/dsa-5020"},{"title":"Cert Advisory 930724","url":"https://www.kb.cert.org/vuls/id/930724"},{"title":"Siemens Advisory ssa-661247","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"},{"title":"Cisco Advisory cisco-sa-apache-log4j-qRuKNEbd","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"},{"title":"NetApp Advisory ntap-20211210-0007","url":"https://security.netapp.com/advisory/ntap-20211210-0007"},{"title":"Siemens Advisory ssa-479842","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Twitter Advisory 1469345530182455296","url":"https://twitter.com/kurtseifried/status/1469345530182455296"},{"title":"Siemens Advisory ssa-397453","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"},{"title":"Apache Advisory LOG4J2-3214","url":"https://issues.apache.org/jira/browse/LOG4J2-3214"},{"title":"CVE-2021-44228","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44228"},{"title":"Apache Advisory LOG4J2-3201","url":"https://issues.apache.org/jira/browse/LOG4J2-3201"},{"title":"Intel Advisory intel-sa-00646","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"},{"title":"Oracle Advisory alert-cve-2021-44228","url":"https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"}],"cwes":[20,400,502,917],"description":"Remote code injection in Log4j","detail":"# Remote code injection in Log4j # Summary Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default. Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory. # Impact Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. # Affected versions Any Log4J version prior to v2.15.0 is affected to this specific issue. The v1 branch of Log4J which is considered End Of Life (EOL) is vulnerable to other RCE vectors so the recommendation is to still update to 2.16.0 where possible. ## Security releases Additional backports of this fix have been made available in versions 2.3.1, 2.12.2, and 2.12.3 ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Remediation Advice ## Updated advice for version 2.16.0 The Apache Logging Services team provided updated mitigation advice upon the release of version 2.16.0, which [disables JNDI by default and completely removes support for message lookups](https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0). Even in version 2.15.0, lookups used in layouts to provide specific pieces of context information will still recursively resolve, possibly triggering JNDI lookups. This problem is being tracked as [CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046). More information is available on the [GitHub Security Advisory for CVE-2021-45046](https://github.com/advisories/GHSA-7rjr-3q55-vv33). Users who want to avoid attacker-controlled JNDI lookups but cannot upgrade to 2.16.0 must [ensure that no such lookups resolve to attacker-provided data and ensure that the the JndiLookup class is not loaded](https://issues.apache.org/jira/browse/LOG4J2-3221). Please note that Log4J v1 is End Of Life (EOL) and will not receive patches for this issue. Log4J v1 is also vulnerable to other RCE vectors and we recommend you migrate to Log4J 2.16.0 where possible.","ratings":[{"method":"CVSSv31","severity":"critical","score":10.0,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"published":"2021-12-10T00:40:56","updated":"2024-07-25T20:23:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency\\nKnown Exploits"}]},{"id":"CVE-2021-45105","bom-ref":"CVE-2021-45105/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/!=2.12.3|<2.12.3","status":"affected"},{"version":"2.12.3","status":"unaffected"}]}],"recommendation":"Update to version 2.12.3 to resolve CVE-2021-45105 or update to version 2.16.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45105","name":"NVD"},"references":[{"id":"CVE-2021-45105","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45105","name":"NVD"}},{"id":"fedoraproject-msg-SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ"}},{"id":"SNWLID-2021-0032","source":{"name":"Sonicwall Advisory","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"}},{"id":"openwall-oss-security-msg-2021-12-19-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/12/19/1"}},{"id":"dsa-5024","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5024"}},{"id":"ssa-479842","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"ntap-20211218-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20211218-0001"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"zero-day-initiative-exploit-ZDI-21-1541","source":{"name":"Zero Day Initiative Exploit","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1541"}},{"id":"ssa-501673","source":{"name":"Siemens Advisory","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf"}},{"id":"930724","source":{"name":"Cert Advisory","url":"https://www.kb.cert.org/vuls/id/930724"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cisco-sa-apache-log4j-qRuKNEbd","source":{"name":"Cisco Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"}},{"id":"debian-msg-msg00017","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html"}},{"id":"fedoraproject-msg-EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY"}}],"advisories":[{"title":"CVE-2021-45105","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45105"},{"title":"Sonicwall Advisory SNWLID-2021-0032","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"},{"title":"Debian Advisory dsa-5024","url":"https://www.debian.org/security/2021/dsa-5024"},{"title":"Siemens Advisory ssa-479842","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"NetApp Advisory ntap-20211218-0001","url":"https://security.netapp.com/advisory/ntap-20211218-0001"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Siemens Advisory ssa-501673","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf"},{"title":"Cert Advisory 930724","url":"https://www.kb.cert.org/vuls/id/930724"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Cisco Advisory cisco-sa-apache-log4j-qRuKNEbd","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"}],"cwes":[20,674],"description":"Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion","detail":"# Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3. # Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.","ratings":[{"method":"CVSSv31","severity":"high","score":8.6,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"published":"2021-12-18T18:00:07","updated":"2024-02-16T08:01:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency\\nKnown Exploits"}]},{"id":"CVE-2020-9488","bom-ref":"CVE-2020-9488/pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","affects":[{"ref":"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar","versions":[{"range":"vers:maven/!=2.13.2|<2.13.2","status":"affected"},{"version":"2.13.2","status":"unaffected"}]}],"recommendation":"Update to version 2.13.2 to resolve CVE-2020-9488 or update to version 2.16.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9488","name":"NVD"},"references":[{"id":"apache-msg-r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"}},{"id":"apache-msg-rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E"}},{"id":"apache-msg-r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"}},{"id":"apache-msg-r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E"}},{"id":"apache-msg-r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E"}},{"id":"apache-msg-r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E"}},{"id":"apache-msg-r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E"}},{"id":"ntap-20200504-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20200504-0003"}},{"id":"dsa-5020","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-5020"}},{"id":"LOG4J2-2819","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/LOG4J2-2819"}},{"id":"apache-msg-rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E"}},{"id":"apache-msg-r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E"}},{"id":"apache-msg-r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"CVE-2020-9488","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9488","name":"NVD"}},{"id":"apache-msg-rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E"}},{"id":"apache-msg-r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E"}},{"id":"apache-msg-r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E"}},{"id":"apache-msg-r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"debian-msg-msg00017","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html"}}],"advisories":[{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"NetApp Advisory ntap-20200504-0003","url":"https://security.netapp.com/advisory/ntap-20200504-0003"},{"title":"Debian Advisory dsa-5020","url":"https://www.debian.org/security/2021/dsa-5020"},{"title":"Apache Advisory LOG4J2-2819","url":"https://issues.apache.org/jira/browse/LOG4J2-2819"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"CVE-2020-9488","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9488"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[295],"description":"Improper validation of certificate with host mismatch in Apache Log4j SMTP appender","detail":"# Improper validation of certificate with host mismatch in Apache Log4j SMTP appender Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.","ratings":[{"method":"CVSSv31","severity":"low","score":3.7,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2020-06-05T14:15:51","updated":"2024-03-13T05:32:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.logging.log4j/log4j-core@2.9.1?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-3635","bom-ref":"CVE-2023-3635/pkg:maven/com.squareup.okio/okio@1.6.0?type=jar","affects":[{"ref":"pkg:maven/com.squareup.okio/okio@1.6.0?type=jar","versions":[{"range":"vers:maven/!=3.4.0|<3.4.0","status":"affected"},{"version":"3.4.0","status":"unaffected"}]}],"recommendation":"Update to version 3.4.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3635","name":"NVD"},"references":[{"id":"CVE-2023-3635","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3635","name":"NVD"}},{"id":"okio-gzip-source-unhandled-exception-dos-xray-523195","source":{"name":"JFrog Advisory","url":"https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195"}}],"advisories":[{"title":"CVE-2023-3635","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3635"},{"title":"JFrog Advisory okio-gzip-source-unhandled-exception-dos-xray-523195","url":"https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195"}],"cwes":[195,681],"description":"Okio Signed to Unsigned Conversion Error vulnerability","detail":"# Okio Signed to Unsigned Conversion Error vulnerability GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This may lead to denial of service of the Okio client when handling a crafted GZIP archive, by using the GzipSource class.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-07-12T21:30:50","updated":"2024-02-16T08:13:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/com.squareup.okhttp/okhttp@2.5.0?type=jar\", \"pkg:maven/com.squareup.okio/okio@1.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2018-10899","bom-ref":"CVE-2018-10899/pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar","affects":[{"ref":"pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar","versions":[{"range":"vers:maven/!=1.6.1|<1.6.1","status":"affected"},{"version":"1.6.1","status":"unaffected"}]}],"recommendation":"Update to version 1.6.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10899","name":"NVD"},"references":[{"id":"apache-msg-rc169dac018d07e8ddf2a3bb2fd1efc6cbda4f83f1bbf7a8c798e7f4f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc169dac018d07e8ddf2a3bb2fd1efc6cbda4f83f1bbf7a8c798e7f4f@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-rf33ffbba619a4281ce592a6ed259c07a557aefb4975619d83c4122ea","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf33ffbba619a4281ce592a6ed259c07a557aefb4975619d83c4122ea@%3Cissues.activemq.apache.org%3E"}},{"id":"RHSA-2019:2413","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2413"}},{"id":"apache-msg-r46f6dbc029f49e1f638c6eb82accb94b7f990d818cb3b3bc0007dd0a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r46f6dbc029f49e1f638c6eb82accb94b7f990d818cb3b3bc0007dd0a@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-r64701caec91c43efd7416d6bddef88447371101e00e8562741ede262","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r64701caec91c43efd7416d6bddef88447371101e00e8562741ede262@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-r67cdc50af9caf89c9ebe1bde08393a343dcd89edba1c63677f68f43b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r67cdc50af9caf89c9ebe1bde08393a343dcd89edba1c63677f68f43b@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-rdb0a59d7851e721b75beea13d6488e345a3e2735838e89d9269d7d32","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdb0a59d7851e721b75beea13d6488e345a3e2735838e89d9269d7d32@%3Cissues.activemq.apache.org%3E"}},{"id":"redhat-bugzilla-CVE-2018-10899","source":{"name":"Red Hat Bugzilla","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10899"}},{"id":"CVE-2018-10899","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10899","name":"NVD"}},{"id":"RHSA-2019:2804","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2804"}},{"id":"apache-msg-1392fbebb4fbbec379a40d16e1288fe1e4c0289d257e5206051a3793","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/1392fbebb4fbbec379a40d16e1288fe1e4c0289d257e5206051a3793@%3Cissues.activemq.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2019:2413","url":"https://access.redhat.com/errata/RHSA-2019:2413"},{"title":"CVE-2018-10899","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10899"},{"title":"Red Hat Advisory RHSA-2019:2804","url":"https://access.redhat.com/errata/RHSA-2019:2804"}],"cwes":[352],"description":"Cross-Site Request Forgery in Jolokia","detail":"# Cross-Site Request Forgery in Jolokia A flaw was found in Jolokia versions from 1.2 to before 1.6.1. Affected versions are vulnerable to a system-wide CSRF. This holds true for properly configured instances with strict checking for origin and referrer headers. This could result in a Remote Code Execution attack.","ratings":[{"method":"CVSSv3","severity":"high","score":8.1,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-05-24T16:51:56","updated":"2023-11-08T03:59:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.jolokia/jolokia-core@1.6.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-34055","bom-ref":"CVE-2023-34055/pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0.0.RELEASE|<=2.7.9|!=2.7.18","status":"affected"},{"version":"2.7.18","status":"unaffected"}]}],"recommendation":"Update to version 2.7.18.","source":{"url":"https://spring.io/security/cve-2023-34055"},"references":[{"id":"ntap-20231221-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20231221-0010"}},{"id":"SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862"}},{"id":"cve-2023-34055","source":{"url":"https://spring.io/security/cve-2023-34055"}},{"id":"CVE-2023-34055","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34055","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20231221-0010","url":"https://security.netapp.com/advisory/ntap-20231221-0010"},{"title":"Snyk Advisory SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862"},{"title":"cve-2023-34055","url":"https://spring.io/security/cve-2023-34055"},{"title":"CVE-2023-34055","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34055"}],"cwes":[],"description":"Spring Boot Actuator denial of service vulnerability","detail":"# Spring Boot Actuator denial of service vulnerability In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3.1.5, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * `org.springframework.boot:spring-boot-actuator`\u00a0is on the classpath","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2023-11-28T09:30:27","updated":"2025-02-13T19:36:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-starter-actuator@1.5.1.RELEASE?type=jar\", \"pkg:maven/org.springframework.boot/spring-boot-actuator@1.5.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2025-22228","bom-ref":"CVE-2025-22228/pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=6.3.8|<6.3.8","status":"affected"},{"version":"6.3.8","status":"unaffected"}]}],"recommendation":"Update to version 6.3.8.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22228","name":"NVD"},"references":[{"id":"CVE-2025-22228","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22228","name":"NVD"}},{"id":"cve-2025-22228","source":{"url":"https://spring.io/security/cve-2025-22228"}},{"id":"ntap-20250425-0009","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250425-0009"}}],"advisories":[{"title":"CVE-2025-22228","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22228"},{"title":"cve-2025-22228","url":"https://spring.io/security/cve-2025-22228"},{"title":"NetApp Advisory ntap-20250425-0009","url":"https://security.netapp.com/advisory/ntap-20250425-0009"}],"cwes":[287,521],"description":"Spring Security Does Not Enforce Password Length","detail":"# Spring Security Does Not Enforce Password Length BCryptPasswordEncoder.matches(CharSequence,String)\u00a0will incorrectly return true\u00a0for passwords larger than 72 characters as long as the first 72 characters are the same.","ratings":[{"method":"CVSSv31","severity":"high","score":7.4,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"published":"2025-03-20T06:31:09","updated":"2025-04-26T01:25:16","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter@1.1.3.RELEASE?type=jar\", \"pkg:maven/org.springframework.cloud/spring-cloud-context@1.1.3.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-crypto@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Direct dependency\\nEndpoint-Reachable"}]},{"id":"CVE-2018-1000613","bom-ref":"CVE-2018-1000613/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/!=1.60|<1.60","status":"affected"},{"version":"1.60","status":"unaffected"}]}],"recommendation":"Update to version 1.60 to resolve CVE-2018-1000613 or update to version 1.78 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000613","name":"NVD"},"references":[{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"GHSA-4446-656p-f54g","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-4446-656p-f54g"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"}},{"id":"apache-msg-rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E"}},{"id":"ntap-20190204-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20190204-0003"}},{"id":"opensuse-msg-msg00011","source":{"name":"Open Suse Mailing List","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"CVE-2018-1000613","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000613","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"GitHub Advisory GHSA-4446-656p-f54g","url":"https://github.com/advisories/GHSA-4446-656p-f54g"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"NetApp Advisory ntap-20190204-0003","url":"https://security.netapp.com/advisory/ntap-20190204-0003"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"CVE-2018-1000613","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000613"}],"cwes":[470,502],"description":"Deserialization of Untrusted Data in Bouncy castle","detail":"# Deserialization of Untrusted Data in Bouncy castle Legion of the Bouncy Castle Java Cryptography APIs starting in version 1.57 and prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later.","ratings":[{"method":"CVSSv3","severity":"critical","score":9.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2018-10-17T16:23:12","updated":"2024-02-22T05:44:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2020-15522","bom-ref":"CVE-2020-15522/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.65.01|!=1.66","status":"affected"},{"version":"1.66","status":"unaffected"}]}],"recommendation":"Update to version 1.66 to resolve CVE-2020-15522 or update to version 1.78 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15522","name":"NVD"},"references":[{"id":"CVE-2020-15522","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15522","name":"NVD"}},{"id":"ntap-20210622-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210622-0007"}}],"advisories":[{"title":"CVE-2020-15522","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15522"},{"title":"NetApp Advisory ntap-20210622-0007","url":"https://security.netapp.com/advisory/ntap-20210622-0007"}],"cwes":[203,362],"description":"Timing based private key exposure in Bouncy Castle","detail":"# Timing based private key exposure in Bouncy Castle Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.2.1, BC before 1.66, BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.1,"vector":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2021-08-13T15:22:31","updated":"2024-02-17T05:52:01","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2020-26939","bom-ref":"CVE-2020-26939/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.60|!=1.61","status":"affected"},{"version":"1.61","status":"unaffected"}]}],"recommendation":"Update to version 1.61 to resolve CVE-2020-26939 or update to version 1.78 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26939","name":"NVD"},"references":[{"id":"apache-msg-r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E"}},{"id":"CVE-2020-26939","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26939","name":"NVD"}},{"id":"ntap-20201202-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20201202-0005"}},{"id":"debian-msg-msg00007","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00007.html"}}],"advisories":[{"title":"CVE-2020-26939","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26939"},{"title":"NetApp Advisory ntap-20201202-0005","url":"https://security.netapp.com/advisory/ntap-20201202-0005"}],"cwes":[203],"description":"Observable Differences in Behavior to Error Inputs in Bouncy Castle","detail":"# Observable Differences in Behavior to Error Inputs in Bouncy Castle In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2021-04-22T16:16:49","updated":"2024-03-14T22:16:19","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2020-28052","bom-ref":"CVE-2020-28052/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/!=1.67|<1.67","status":"affected"},{"version":"1.67","status":"unaffected"}]}],"recommendation":"Update to version 1.67 to resolve CVE-2020-28052 or update to version 1.78 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28052","name":"NVD"},"references":[{"id":"apache-msg-rddd2237b8636a48d573869006ee809262525efb2b6ffa6eff50d2a2d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rddd2237b8636a48d573869006ee809262525efb2b6ffa6eff50d2a2d@%3Cjira.kafka.apache.org%3E"}},{"id":"cve-2020-28052-bouncy-castle","source":{"name":"Synopsys Advisory","url":"https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle"}},{"id":"apache-msg-rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r37d332c0bf772f4982d1fdeeb2f88dd71dab6451213e69e43734eadc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r37d332c0bf772f4982d1fdeeb2f88dd71dab6451213e69e43734eadc@%3Ccommits.pulsar.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"apache-msg-r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E"}},{"id":"apache-msg-r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E"}},{"id":"apache-msg-r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-r175f5a25d100dbe2b1bd3459b3ce882a84c3ff91b120ed4ff2d57b53","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r175f5a25d100dbe2b1bd3459b3ce882a84c3ff91b120ed4ff2d57b53@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E"}},{"id":"CVE-2020-28052","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28052","name":"NVD"}},{"id":"apache-msg-rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E"}}],"advisories":[{"title":"Synopsys Advisory cve-2020-28052-bouncy-castle","url":"https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"CVE-2020-28052","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28052"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[670],"description":"Logic error in Legion of the Bouncy Castle BC Java","detail":"# Logic error in Legion of the Bouncy Castle BC Java An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-04-30T16:14:15","updated":"2024-03-08T05:18:41","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-29857","bom-ref":"CVE-2024-29857/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.70|!=1.78","status":"affected"},{"version":"1.78","status":"unaffected"}]}],"recommendation":"Update to version 1.78.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29857","name":"NVD"},"references":[{"id":"ntap-20241206-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241206-0008"}},{"id":"CVE-2024-29857","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29857","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20241206-0008","url":"https://security.netapp.com/advisory/ntap-20241206-0008"},{"title":"CVE-2024-29857","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29857"}],"cwes":[125,400],"description":"Bouncy Castle certificate parsing issues cause high CPU usage during parameter evaluation.","detail":"# Bouncy Castle certificate parsing issues cause high CPU usage during parameter evaluation. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters. ## Related CVE(s) CGA-h49m-7vwx-446f, CGA-pmw5-3929-3rqr, CGA-x9cj-c42r-f4mr, CVE-2024-29857","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2024-05-14T15:32:54","updated":"2024-12-06T15:48:32","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-33201","bom-ref":"CVE-2023-33201/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.49|<=1.70|>=1.49|<=1.70","status":"affected"}]}],"recommendation":"No recommendation found for CVE-2023-33201. Updating to version 1.78 is recommended nonetheless in order to address additional vulnerabilities identified for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33201","name":"NVD"},"references":[{"id":"debian-msg-msg00000","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html"}},{"id":"CVE-2023-33201","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33201","name":"NVD"}},{"id":"ntap-20230824-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230824-0008"}}],"advisories":[{"title":"CVE-2023-33201","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33201"},{"title":"NetApp Advisory ntap-20230824-0008","url":"https://security.netapp.com/advisory/ntap-20230824-0008"}],"cwes":[295],"description":"Bouncy Castle For Java LDAP injection vulnerability","detail":"# Bouncy Castle For Java LDAP injection vulnerability Bouncy Castle provides the `X509LDAPCertStoreSpi.java` class which can be used in conjunction with the CertPath API for validating certificate paths. Pre-1.73 the implementation did not check the X.500 name of any certificate, subject, or issuer being passed in for LDAP wild cards, meaning the presence of a wild car may lead to Information Disclosure. A potential attack would be to generate a self-signed certificate with a subject name that contains special characters, e.g: `CN=Subject*)(objectclass=`. This will be included into the filter and provides the attacker ability to specify additional attributes in the search query. This can be exploited as a blind LDAP injection: an attacker can enumerate valid attribute values using the boolean blind injection technique. The exploitation depends on the structure of the target LDAP directory, as well as what kind of errors are exposed to the user. Changes to the `X509LDAPCertStoreSpi.java` class add the additional checking of any X.500 name used to correctly escape wild card characters. ## Related CVE(s) CGA-9v29-fwrv-3vmr, CVE-2023-33201","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2023-07-05T03:30:23","updated":"2024-10-22T05:28:49","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-30171","bom-ref":"CVE-2024-30171/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.70|!=1.78","status":"affected"},{"version":"1.78","status":"unaffected"}]}],"recommendation":"Update to version 1.78.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-30171","name":"NVD"},"references":[{"id":"ntap-20240614-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240614-0008"}},{"id":"CVE-2024-30171","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-30171","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20240614-0008","url":"https://security.netapp.com/advisory/ntap-20240614-0008"},{"title":"CVE-2024-30171","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-30171"}],"cwes":[203],"description":"Bouncy Castle affected by timing side-channel for RSA key exchange (\"The Marvin Attack\")","detail":"# Bouncy Castle affected by timing side-channel for RSA key exchange (\"The Marvin Attack\") An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing. ## Related CVE(s) CGA-2f4h-fc34-cw83, CGA-5mrq-75x2-g8hj, CGA-9qv8-44xh-vf2p, CVE-2024-30171","ratings":[{"method":"CVSSv31","severity":"medium","score":5.9,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2024-05-14T15:32:54","updated":"2024-10-22T05:28:59","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-33202","bom-ref":"CVE-2023-33202/pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","affects":[{"ref":"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar","versions":[{"range":"vers:maven/>=1.46|<=1.70|>=1.46|<=1.70","status":"affected"},{"version":"1.73","status":"unaffected"}]}],"recommendation":"Update to version 1.73 to resolve CVE-2023-33202 or update to version 1.78 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33202","name":"NVD"},"references":[{"id":"CVE-2023-33202","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33202","name":"NVD"}},{"id":"ntap-20240125-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240125-0001"}}],"advisories":[{"title":"CVE-2023-33202","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33202"},{"title":"NetApp Advisory ntap-20240125-0001","url":"https://security.netapp.com/advisory/ntap-20240125-0001"}],"cwes":[400],"description":"Bouncy Castle Denial of Service (DoS)","detail":"# Bouncy Castle Denial of Service (DoS) Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack. ## Related CVE(s) CGA-q98p-rjg3-8jq7, CVE-2023-33202","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"published":"2023-11-23T18:30:33","updated":"2024-10-22T05:28:59","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.security/spring-security-rsa@1.0.3.RELEASE?type=jar\", \"pkg:maven/org.bouncycastle/bcpkix-jdk15on@1.55?type=jar\", \"pkg:maven/org.bouncycastle/bcprov-jdk15on@1.55?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-40149","bom-ref":"CVE-2022-40149/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.0|!=1.5.1","status":"affected"},{"version":"1.5.1","status":"unaffected"}]}],"recommendation":"Update to version 1.5.1 to resolve CVE-2022-40149 or update to version 1.5.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149","name":"NVD"},"references":[{"id":"dsa-5312","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5312"}},{"id":"debian-msg-msg00011","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html"}},{"id":"CVE-2022-40149","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149","name":"NVD"}}],"advisories":[{"title":"Debian Advisory dsa-5312","url":"https://www.debian.org/security/2023/dsa-5312"},{"title":"CVE-2022-40149","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149"}],"cwes":[121,787],"description":"Jettison parser crash by stackoverflow","detail":"# Jettison parser crash by stackoverflow Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-09-17T00:00:41","updated":"2023-11-08T04:10:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-45685","bom-ref":"CVE-2022-45685/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.1|!=1.5.2","status":"affected"},{"version":"1.5.2","status":"unaffected"}]}],"recommendation":"Update to version 1.5.2 to resolve CVE-2022-45685 or update to version 1.5.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45685","name":"NVD"},"references":[{"id":"debian-msg-msg00045","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"}},{"id":"dsa-5312","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5312"}},{"id":"CVE-2022-45685","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45685","name":"NVD"}}],"advisories":[{"title":"Debian Advisory dsa-5312","url":"https://www.debian.org/security/2023/dsa-5312"},{"title":"CVE-2022-45685","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45685"}],"cwes":[787],"description":"Jettison Out-of-bounds Write vulnerability","detail":"# Jettison Out-of-bounds Write vulnerability A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-12-13T15:30:26","updated":"2023-11-08T04:10:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-45693","bom-ref":"CVE-2022-45693/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.1|!=1.5.2","status":"affected"},{"version":"1.5.2","status":"unaffected"}]}],"recommendation":"Update to version 1.5.2 to resolve CVE-2022-45693 or update to version 1.5.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45693","name":"NVD"},"references":[{"id":"dsa-5312","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5312"}},{"id":"debian-msg-msg00045","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"}},{"id":"CVE-2022-45693","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45693","name":"NVD"}}],"advisories":[{"title":"Debian Advisory dsa-5312","url":"https://www.debian.org/security/2023/dsa-5312"},{"title":"CVE-2022-45693","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45693"}],"cwes":[787],"description":"Jettison Out-of-bounds Write vulnerability","detail":"# Jettison Out-of-bounds Write vulnerability Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-12-13T15:30:27","updated":"2023-11-08T04:10:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-1436","bom-ref":"CVE-2023-1436/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.3|!=1.5.4","status":"affected"},{"version":"1.5.4","status":"unaffected"}]}],"recommendation":"Update to version 1.5.4.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1436","name":"NVD"},"references":[{"id":"jettison-json-array-dos-xray-427911","source":{"name":"JFrog Advisory","url":"https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911"}},{"id":"CVE-2023-1436","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1436","name":"NVD"}}],"advisories":[{"title":"JFrog Advisory jettison-json-array-dos-xray-427911","url":"https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911"},{"title":"CVE-2023-1436","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1436"}],"cwes":[674],"description":"Jettison vulnerable to infinite recursion","detail":"# Jettison vulnerable to infinite recursion An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-03-22T06:30:21","updated":"2024-02-20T05:34:09","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-40150","bom-ref":"CVE-2022-40150/pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","affects":[{"ref":"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar","versions":[{"range":"vers:maven/>=1.0-RC1|<=1.5.1|!=1.5.2","status":"affected"},{"version":"1.5.2","status":"unaffected"}]}],"recommendation":"Update to version 1.5.2 to resolve CVE-2022-40150 or update to version 1.5.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150","name":"NVD"},"references":[{"id":"CVE-2022-40150","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150","name":"NVD"}},{"id":"debian-msg-msg00045","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"}},{"id":"dsa-5312","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5312"}}],"advisories":[{"title":"CVE-2022-40150","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150"},{"title":"Debian Advisory dsa-5312","url":"https://www.debian.org/security/2023/dsa-5312"}],"cwes":[400,674],"description":"Jettison memory exhaustion","detail":"# Jettison memory exhaustion Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-09-17T00:00:41","updated":"2024-02-16T08:08:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.springframework.cloud/spring-cloud-starter-netflix-eureka-client@1.4.0.RELEASE?type=jar\", \"pkg:maven/com.netflix.eureka/eureka-client@1.4.11?type=jar\", \"pkg:maven/org.codehaus.jettison/jettison@1.3.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-25647","bom-ref":"CVE-2022-25647/pkg:maven/com.google.code.gson/gson@2.8.0?type=jar","affects":[{"ref":"pkg:maven/com.google.code.gson/gson@2.8.0?type=jar","versions":[{"range":"vers:maven/>=1.1|<=2.8.8|!=2.8.9","status":"affected"},{"version":"2.8.9","status":"unaffected"}]}],"recommendation":"Update to version 2.8.9.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25647","name":"NVD"},"references":[{"id":"SNYK-JAVA-COMGOOGLECODEGSON-1730327","source":{"name":"Snyk Advisory","url":"https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327"}},{"id":"dsa-5227","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2022/dsa-5227"}},{"id":"CVE-2022-25647","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25647","name":"NVD"}},{"id":"debian-msg-msg00009","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00009.html"}},{"id":"debian-msg-msg00015","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00015.html"}},{"id":"ntap-20220901-0009","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220901-0009"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"Snyk Advisory SNYK-JAVA-COMGOOGLECODEGSON-1730327","url":"https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327"},{"title":"Debian Advisory dsa-5227","url":"https://www.debian.org/security/2022/dsa-5227"},{"title":"CVE-2022-25647","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25647"},{"title":"NetApp Advisory ntap-20220901-0009","url":"https://security.netapp.com/advisory/ntap-20220901-0009"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[502],"description":"Deserialization of Untrusted Data in Gson","detail":"# Deserialization of Untrusted Data in Gson The package `com.google.code.gson:gson` before 2.8.9 is vulnerable to Deserialization of Untrusted Data via the `writeReplace()` method in internal classes, which may lead to denial of service attacks.","ratings":[{"method":"CVSSv31","severity":"high","score":7.7,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H"}],"published":"2022-05-03T00:00:44","updated":"2025-01-14T10:57:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.netflix-commons/netflix-eventbus@0.3.0?type=jar\", \"pkg:maven/com.netflix.netflix-commons/netflix-infix@0.3.0?type=jar\", \"pkg:maven/com.google.code.gson/gson@2.8.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-24823","bom-ref":"CVE-2022-24823/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.9.Final|!=4.1.77.Final","status":"affected"},{"version":"4.1.77.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.77.Final to resolve CVE-2022-24823 or update to version 4.1.108.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24823","name":"NVD"},"references":[{"id":"GHSA-269q-hmxg-m83q","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q"}},{"id":"GHSA-5mcr-gq6c-3hq2","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2"}},{"id":"ntap-20220616-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220616-0004"}},{"id":"CVE-2022-24823","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24823","name":"NVD"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"GitHub Advisory GHSA-269q-hmxg-m83q","url":"https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q"},{"title":"GitHub Advisory GHSA-5mcr-gq6c-3hq2","url":"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2"},{"title":"NetApp Advisory ntap-20220616-0004","url":"https://security.netapp.com/advisory/ntap-20220616-0004"},{"title":"CVE-2022-24823","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24823"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[378,379,668],"description":"Local Information Disclosure Vulnerability in io.netty:netty-codec-http","detail":"# Local Information Disclosure Vulnerability in io.netty:netty-codec-http ### Description ### [GHSA-5mcr-gq6c-3hq2](https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2) (CVE-2021-21290) contains an insufficient fix for the vulnerability identified. ### Impact ### When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. ### Vulnerability Details ### To fix the vulnerability the code was changed to the following: ```java @SuppressJava6Requirement(reason = \"Guarded by version check\") public static File createTempFile(String prefix, String suffix, File directory) throws IOException { if (javaVersion() >= 7) { if (directory == null) { return Files.createTempFile(prefix, suffix).toFile(); } return Files.createTempFile(directory.toPath(), prefix, suffix).toFile(); } if (directory == null) { return File.createTempFile(prefix, suffix); } File file = File.createTempFile(prefix, suffix, directory); // Try to adjust the perms, if this fails there is not much else we can do... file.setReadable(false, false); file.setReadable(true, true); return file; } ``` Unfortunately, this logic path was left vulnerable: ```java if (directory == null) { return File.createTempFile(prefix, suffix); } ``` This file is still readable by all local users. ### Patches ### Update to 4.1.77.Final ### Workarounds ### Specify your own `java.io.tmpdir` when you start the JVM or use `DefaultHttpDataFactory.setBaseDir(...)` to set the directory to something that is only readable by the current user or update to Java 7 or above. ### References ### - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### For more information ### If you have any questions or comments about this advisory: Open an issue in [netty](https://github.com/netty/netty)","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2022-05-10T08:46:50","updated":"2025-01-14T10:57:26","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-29025","bom-ref":"CVE-2024-29025/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.99.Final|!=4.1.108.Final","status":"affected"},{"version":"4.1.108.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.108.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29025","name":"NVD"},"references":[{"id":"CVE-2024-29025","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29025","name":"NVD"}},{"id":"debian-msg-msg00015","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00015.html"}},{"id":"GHSA-5jpm-x58v-624v","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v"}}],"advisories":[{"title":"CVE-2024-29025","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-29025"},{"title":"GitHub Advisory GHSA-5jpm-x58v-624v","url":"https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v"}],"cwes":[770],"description":"Netty's HttpPostRequestDecoder can OOM","detail":"# Netty's HttpPostRequestDecoder can OOM ### Summary The `HttpPostRequestDecoder` can be tricked to accumulate data. I have spotted currently two attack vectors ### Details 1. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpData` list. 2. The decoder cumulates bytes in the `undecodedChunk` buffer until it can decode a field, this field can cumulate data without limits ### PoC Here is a Netty branch that provides a fix + tests : https://github.com/vietj/netty/tree/post-request-decoder Here is a reproducer with Vert.x (which uses this decoder) https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3 ### Impact Any Netty based HTTP server that uses the `HttpPostRequestDecoder` to decode a form. ## Related CVE(s) CGA-4f97-xch2-fqp3, CGA-cvrj-h7rr-r975, CVE-2024-29025","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"published":"2024-03-25T19:40:50","updated":"2024-10-22T05:29:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-21290","bom-ref":"CVE-2021-21290/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/!=4.1.59.Final|<4.1.59.Final","status":"affected"},{"version":"4.1.59.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.59.Final to resolve CVE-2021-21290 or update to version 4.1.108.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21290","name":"NVD"},"references":[{"id":"apache-msg-r5c701840aa2845191721e39821445e1e8c59711e71942b7796a6ec29","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5c701840aa2845191721e39821445e1e8c59711e71942b7796a6ec29@%3Cusers.activemq.apache.org%3E"}},{"id":"apache-msg-r743149dcc8db1de473e6bff0b3ddf10140a7357bc2add75f7d1fbb12","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r743149dcc8db1de473e6bff0b3ddf10140a7357bc2add75f7d1fbb12@%3Cdev.zookeeper.apache.org%3E"}},{"id":"CVE-2021-21290","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21290","name":"NVD"}},{"id":"apache-msg-r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r0857b613604c696bf9743f0af047360baaded48b1c75cf6945a083c5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0857b613604c696bf9743f0af047360baaded48b1c75cf6945a083c5@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-r2748097ea4b774292539cf3de6e3b267fc7a88d6c8ec40f4e2e87bd4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2748097ea4b774292539cf3de6e3b267fc7a88d6c8ec40f4e2e87bd4@%3Cdev.kafka.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E"}},{"id":"apache-msg-r326ec431f06eab7cb7113a7a338e59731b8d556d05258457f12bac1b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r326ec431f06eab7cb7113a7a338e59731b8d556d05258457f12bac1b@%3Cdev.kafka.apache.org%3E"}},{"id":"dsa-4885","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4885"}},{"id":"apache-msg-rc488f80094872ad925f0c73d283d4c00d32def81977438e27a3dc2bb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc488f80094872ad925f0c73d283d4c00d32def81977438e27a3dc2bb@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r5bf303d7c04da78f276765da08559fdc62420f1df539b277ca31f63b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5bf303d7c04da78f276765da08559fdc62420f1df539b277ca31f63b@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra503756ced78fdc2136bd33e87cb7553028645b261b1f5c6186a121e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra503756ced78fdc2136bd33e87cb7553028645b261b1f5c6186a121e@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E"}},{"id":"apache-msg-r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E"}},{"id":"apache-msg-rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r5e4a540089760c8ecc2c411309d74264f1dad634ad93ad583ca16214","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e4a540089760c8ecc2c411309d74264f1dad634ad93ad583ca16214@%3Ccommits.kafka.apache.org%3E"}},{"id":"apache-msg-rdba4f78ac55f803893a1a2265181595e79e3aa027e2e651dfba98c18","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdba4f78ac55f803893a1a2265181595e79e3aa027e2e651dfba98c18@%3Cjira.kafka.apache.org%3E"}},{"id":"ntap-20220210-0011","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0011"}},{"id":"apache-msg-rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"GHSA-5mcr-gq6c-3hq2","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2"}},{"id":"apache-msg-r10308b625e49d4e9491d7e079606ca0df2f0a4d828f1ad1da64ba47b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r10308b625e49d4e9491d7e079606ca0df2f0a4d828f1ad1da64ba47b@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E"}},{"id":"apache-msg-r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-r71dbb66747ff537640bb91eb0b2b24edef21ac07728097016f58b01f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r71dbb66747ff537640bb91eb0b2b24edef21ac07728097016f58b01f@%3Ccommits.kafka.apache.org%3E"}},{"id":"debian-msg-msg00016","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/02/msg00016.html"}}],"advisories":[{"title":"CVE-2021-21290","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21290"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Debian Advisory dsa-4885","url":"https://www.debian.org/security/2021/dsa-4885"},{"title":"NetApp Advisory ntap-20220210-0011","url":"https://security.netapp.com/advisory/ntap-20220210-0011"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"GitHub Advisory GHSA-5mcr-gq6c-3hq2","url":"https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[378,379,668],"description":"","detail":"Refer to the supporting media","ratings":[{"method":"CVSSv31","severity":"medium","score":6.2,"vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2021-02-08T21:17:48","updated":"2025-01-14T10:57:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2019-20444","bom-ref":"CVE-2019-20444/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/!=4.1.44|<4.1.44","status":"affected"},{"version":"4.1.44","status":"unaffected"}]}],"recommendation":"Update to version 4.1.44 to resolve CVE-2019-20444 or update to version 4.1.108.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20444","name":"NVD"},"references":[{"id":"apache-msg-r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0804","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0804"}},{"id":"apache-msg-r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"apache-msg-rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0601","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0601"}},{"id":"apache-msg-rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E"}},{"id":"apache-msg-rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"debian-msg-msg00004","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html"}},{"id":"debian-msg-msg00017","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html"}},{"id":"CVE-2019-20444","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20444","name":"NVD"}},{"id":"debian-msg-msg00003","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html"}},{"id":"apache-msg-r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E"}},{"id":"apache-msg-re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E"}},{"id":"dsa-4885","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4885"}},{"id":"apache-msg-r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E"}},{"id":"apache-msg-r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E"}},{"id":"apache-msg-r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"RHSA-2020:0811","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0811"}},{"id":"RHSA-2020:0567","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0567"}},{"id":"apache-msg-r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E"}},{"id":"apache-msg-rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E"}},{"id":"RHSA-2020:0605","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0605"}},{"id":"apache-msg-rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E"}},{"id":"apache-msg-r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b@%3Cdev.zookeeper.apache.org%3E"}},{"id":"fedoraproject-msg-TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46"}},{"id":"apache-msg-r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0805","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0805"}},{"id":"RHSA-2020:0606","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0606"}},{"id":"apache-msg-r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0497","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0497"}},{"id":"apache-msg-r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html"}},{"id":"apache-msg-rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E"}},{"id":"RHSA-2020:0806","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0806"}},{"id":"apache-msg-r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7@%3Cdev.zookeeper.apache.org%3E"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2020:0804","url":"https://access.redhat.com/errata/RHSA-2020:0804"},{"title":"Red Hat Advisory RHSA-2020:0601","url":"https://access.redhat.com/errata/RHSA-2020:0601"},{"title":"CVE-2019-20444","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20444"},{"title":"Debian Advisory dsa-4885","url":"https://www.debian.org/security/2021/dsa-4885"},{"title":"Red Hat Advisory RHSA-2020:0811","url":"https://access.redhat.com/errata/RHSA-2020:0811"},{"title":"Red Hat Advisory RHSA-2020:0567","url":"https://access.redhat.com/errata/RHSA-2020:0567"},{"title":"Red Hat Advisory RHSA-2020:0605","url":"https://access.redhat.com/errata/RHSA-2020:0605"},{"title":"Red Hat Advisory RHSA-2020:0805","url":"https://access.redhat.com/errata/RHSA-2020:0805"},{"title":"Red Hat Advisory RHSA-2020:0606","url":"https://access.redhat.com/errata/RHSA-2020:0606"},{"title":"Red Hat Advisory RHSA-2020:0497","url":"https://access.redhat.com/errata/RHSA-2020:0497"},{"title":"Red Hat Advisory RHSA-2020:0806","url":"https://access.redhat.com/errata/RHSA-2020:0806"}],"cwes":[444],"description":"HTTP Request Smuggling in Netty","detail":"# HTTP Request Smuggling in Netty HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an \"invalid fold.\"","ratings":[{"method":"CVSSv31","severity":"critical","score":9.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"published":"2020-02-21T18:55:24","updated":"2024-03-11T05:19:31","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-41915","bom-ref":"CVE-2022-41915/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/!=4.1.86.Final|<4.1.86.Final","status":"affected"},{"version":"4.1.86.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.86.Final to resolve CVE-2022-41915 or update to version 4.1.108.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41915","name":"NVD"},"references":[{"id":"ntap-20230113-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230113-0004"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"}},{"id":"CVE-2022-41915","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41915","name":"NVD"}},{"id":"dsa-5316","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5316"}},{"id":"GHSA-hh82-3pmq-7frp","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp"}}],"advisories":[{"title":"NetApp Advisory ntap-20230113-0004","url":"https://security.netapp.com/advisory/ntap-20230113-0004"},{"title":"CVE-2022-41915","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41915"},{"title":"Debian Advisory dsa-5316","url":"https://www.debian.org/security/2023/dsa-5316"},{"title":"GitHub Advisory GHSA-hh82-3pmq-7frp","url":"https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp"}],"cwes":[113,436],"description":"Netty vulnerable to HTTP Response splitting from assigning header value iterator","detail":"# Netty vulnerable to HTTP Response splitting from assigning header value iterator ### Impact When calling `DefaultHttpHeaders.set` with an _iterator_ of values (as opposed to a single given value), header value validation was not performed, allowing malicious header values in the iterator to perform [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting). ### Patches The necessary validation was added in Netty 4.1.86.Final. ### Workarounds Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values. ### References [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting) [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers](https://cwe.mitre.org/data/definitions/113.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [[example link to repo](https://github.com/netty/netty)](https://github.com/netty/netty) * Email us at [netty-security@googlegroups.com](mailto:netty-security@googlegroups.com) ## Related CVE(s) CGA-q8q6-vmh7-23q3, CVE-2022-41915","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"published":"2022-12-12T21:25:44","updated":"2024-10-22T05:28:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-43797","bom-ref":"CVE-2021-43797/pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/!=4.1.71.Final|<4.1.71.Final","status":"affected"},{"version":"4.1.71.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.71.Final to resolve CVE-2021-43797 or update to version 4.1.108.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43797","name":"NVD"},"references":[{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"}},{"id":"GHSA-wx5j-54mm-rqqq","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq"}},{"id":"CVE-2021-43797","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43797","name":"NVD"}},{"id":"dsa-5316","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5316"}},{"id":"ntap-20220107-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220107-0003"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"GitHub Advisory GHSA-wx5j-54mm-rqqq","url":"https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq"},{"title":"CVE-2021-43797","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43797"},{"title":"Debian Advisory dsa-5316","url":"https://www.debian.org/security/2023/dsa-5316"},{"title":"NetApp Advisory ntap-20220107-0003","url":"https://security.netapp.com/advisory/ntap-20220107-0003"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[444],"description":"HTTP request smuggling in netty","detail":"# HTTP request smuggling in netty ### Impact Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"published":"2021-12-09T19:09:17","updated":"2024-02-22T05:37:31","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/com.netflix.ribbon/ribbon@2.2.0?type=jar\", \"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-37137","bom-ref":"CVE-2021-37137/pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/!=4.1.68.Final|<4.1.68.Final","status":"affected"},{"version":"4.1.68.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.68.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37137","name":"NVD"},"references":[{"id":"apache-msg-rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"GHSA-9vjp-v76f-g363","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363"}},{"id":"ntap-20220210-0012","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0012"}},{"id":"CVE-2021-37137","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37137","name":"NVD"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E"}},{"id":"dsa-5316","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5316"}},{"id":"apache-msg-rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E"}},{"id":"apache-msg-r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"GitHub Advisory GHSA-9vjp-v76f-g363","url":"https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363"},{"title":"NetApp Advisory ntap-20220210-0012","url":"https://security.netapp.com/advisory/ntap-20220210-0012"},{"title":"CVE-2021-37137","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37137"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Debian Advisory dsa-5316","url":"https://www.debian.org/security/2023/dsa-5316"}],"cwes":[400],"description":"\\tSnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way","detail":"# SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way ### Impact The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk. ### Impact All users of SnappyFrameDecoder are affected and so the application may be in risk for a DoS attach due excessive memory usage. ### References https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-09-09T17:11:31","updated":"2024-03-11T05:32:25","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2021-37136","bom-ref":"CVE-2021-37136/pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.9.Final|!=4.1.68.Final","status":"affected"},{"version":"4.1.68.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.68.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37136","name":"NVD"},"references":[{"id":"apache-msg-rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"GHSA-grg4-wf29-r9vv","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv"}},{"id":"ntap-20220210-0012","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0012"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"CVE-2021-37136","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37136","name":"NVD"}},{"id":"apache-msg-r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E"}},{"id":"dsa-5316","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5316"}},{"id":"apache-msg-rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E"}},{"id":"apache-msg-r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"GitHub Advisory GHSA-grg4-wf29-r9vv","url":"https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv"},{"title":"NetApp Advisory ntap-20220210-0012","url":"https://security.netapp.com/advisory/ntap-20220210-0012"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"CVE-2021-37136","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37136"},{"title":"Debian Advisory dsa-5316","url":"https://www.debian.org/security/2023/dsa-5316"}],"cwes":[400],"description":"Bzip2Decoder doesn't allow setting size restrictions for decompressed data","detail":"# Bzip2Decoder doesn't allow setting size restrictions for decompressed data ### Impact The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack ### Workarounds No workarounds other than not using the `Bzip2Decoder` ### References Relevant code areas: https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-09-09T17:11:21","updated":"2024-03-11T05:19:43","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-codec@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2023-34462","bom-ref":"CVE-2023-34462/pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.93.Final|!=4.1.94.Final","status":"affected"},{"version":"4.1.94.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.94.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34462","name":"NVD"},"references":[{"id":"GHSA-6mjq-h674-j845","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845"}},{"id":"dsa-5558","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2023/dsa-5558"}},{"id":"ntap-20240621-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240621-0007"}},{"id":"ntap-20230803-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230803-0001"}},{"id":"CVE-2023-34462","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34462","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-6mjq-h674-j845","url":"https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845"},{"title":"Debian Advisory dsa-5558","url":"https://www.debian.org/security/2023/dsa-5558"},{"title":"NetApp Advisory ntap-20240621-0007","url":"https://security.netapp.com/advisory/ntap-20240621-0007"},{"title":"NetApp Advisory ntap-20230803-0001","url":"https://security.netapp.com/advisory/ntap-20230803-0001"},{"title":"CVE-2023-34462","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34462"}],"cwes":[400,770],"description":"netty-handler SniHandler 16MB allocation","detail":"# netty-handler SniHandler 16MB allocation ### Summary The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. ### Details The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler` 1/ allocate a 16MB `ByteBuf` 2/ not fail `decode` method `in` buffer 3/ get out of the loop without an exception The combination of this without the use of a timeout makes easy to connect to a TCP server and allocate 16MB of heap memory per connection. ### Impact If the user has no idle timeout handler configured it might be possible for a remote peer to send a client hello packet which lead the server to buffer up to 16MB of data per connection. This could lead to a OutOfMemoryError and so result in a DDOS. ## Related CVE(s) CGA-4p9j-8g99-x3wm, CVE-2023-34462","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2023-06-20T16:33:22","updated":"2024-10-22T05:29:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2020-11612","bom-ref":"CVE-2020-11612/pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/!=4.1.46|<4.1.46","status":"affected"},{"version":"4.1.46","status":"unaffected"}]}],"recommendation":"Update to version 4.1.46 to resolve CVE-2020-11612 or update to version 4.1.94.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11612","name":"NVD"},"references":[{"id":"apache-msg-r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r5b1ad61552591b747cd31b3a908d5ff2e8f2a8a6847583dd6b7b1ee7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5b1ad61552591b747cd31b3a908d5ff2e8f2a8a6847583dd6b7b1ee7@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r31424427cc6d7db46beac481bdeed9a823fc20bb1b9deede38557f71","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r31424427cc6d7db46beac481bdeed9a823fc20bb1b9deede38557f71@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-rfd173eac20d5e5f581c8984b685c836dafea8eb2f7ff85f617704cf1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfd173eac20d5e5f581c8984b685c836dafea8eb2f7ff85f617704cf1@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r866288c2ada00ce148b7307cdf869f15f24302b3eb2128af33830997","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r866288c2ada00ce148b7307cdf869f15f24302b3eb2128af33830997@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-r9addb580456807cd11d6f0c6b6373b7d7161d06d2278866c30c7febb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9addb580456807cd11d6f0c6b6373b7d7161d06d2278866c30c7febb@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-r14446ed58208cb6d97b6faa6ebf145f1cf2c70c0886c0c133f4d3b6f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r14446ed58208cb6d97b6faa6ebf145f1cf2c70c0886c0c133f4d3b6f@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r88e2b91560c065ed67e62adf8f401c417e4d70256d11ea447215a70c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r88e2b91560c065ed67e62adf8f401c417e4d70256d11ea447215a70c@%3Cissues.zookeeper.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r7836bbdbe95c99d4d725199f0c169927d4e87ba57e4beeeb699c097a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7836bbdbe95c99d4d725199f0c169927d4e87ba57e4beeeb699c097a@%3Ccommits.druid.apache.org%3E"}},{"id":"debian-msg-msg00003","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html"}},{"id":"apache-msg-r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-r9c30b7fca4baedebcb46d6e0f90071b30cc4a0e074164d50122ec5ec","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9c30b7fca4baedebcb46d6e0f90071b30cc4a0e074164d50122ec5ec@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-rff8859c0d06b1688344b39097f9685c43b461cf2bc41f60f001704e9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rff8859c0d06b1688344b39097f9685c43b461cf2bc41f60f001704e9@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-r69b23a94d4ae45394cabae012dd1f4a963996869c44c478eb1c61082","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r69b23a94d4ae45394cabae012dd1f4a963996869c44c478eb1c61082@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"dsa-4885","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4885"}},{"id":"apache-msg-rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E"}},{"id":"apache-msg-ra98e3a8541a09271f96478d5e22c7e3bd1afdf48641c8be25d62d9f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra98e3a8541a09271f96478d5e22c7e3bd1afdf48641c8be25d62d9f9@%3Ccommits.druid.apache.org%3E"}},{"id":"ntap-20201223-0001","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20201223-0001"}},{"id":"CVE-2020-11612","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11612","name":"NVD"}},{"id":"apache-msg-r4f4a14d6a608db447b725ec2e96c26ac9664d83cd879aa21e2cfeb24","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4f4a14d6a608db447b725ec2e96c26ac9664d83cd879aa21e2cfeb24@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-re1ea144e91f03175d661b2d3e97c7d74b912e019613fa90419cf63f4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re1ea144e91f03175d661b2d3e97c7d74b912e019613fa90419cf63f4@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-rd302ddb501fa02c5119120e5fc21df9a1c00e221c490edbe2d7ad365","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd302ddb501fa02c5119120e5fc21df9a1c00e221c490edbe2d7ad365@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r4a7e4e23bd84ac24abf30ab5d5edf989c02b555e1eca6a2f28636692","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4a7e4e23bd84ac24abf30ab5d5edf989c02b555e1eca6a2f28636692@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r5030cd8ea5df1e64cf6a7b633eff145992fbca03e8bfc687cd2427ab","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5030cd8ea5df1e64cf6a7b633eff145992fbca03e8bfc687cd2427ab@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r8a654f11e1172b0effbfd6f8d5b6ca651ae4ac724a976923c268a42f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8a654f11e1172b0effbfd6f8d5b6ca651ae4ac724a976923c268a42f@%3Ccommits.druid.apache.org%3E"}},{"id":"fedoraproject-msg-TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46"}},{"id":"apache-msg-rf9f8bcc4ca8d2788f77455ff594468404732a4497baebe319043f4d5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf9f8bcc4ca8d2788f77455ff594468404732a4497baebe319043f4d5@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-ref2c8a0cbb3b8271e5b9a06457ba78ad2028128627186531730f50ef","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ref2c8a0cbb3b8271e5b9a06457ba78ad2028128627186531730f50ef@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r5a0b1f0b1c3bcd66f5177fbd6f6de2d0f8cae24a13ab2669f274251a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5a0b1f0b1c3bcd66f5177fbd6f6de2d0f8cae24a13ab2669f274251a@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r3195127e46c87a680b5d1d3733470f83b886bfd3b890c50df718bed1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3195127e46c87a680b5d1d3733470f83b886bfd3b890c50df718bed1@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r3ea4918d20d0c1fa26cac74cc7cda001d8990bc43473d062867ef70d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3ea4918d20d0c1fa26cac74cc7cda001d8990bc43473d062867ef70d@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-ref3943adbc3a8813aee0e3a9dd919bacbb27f626be030a3c6d6c7f83","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ref3943adbc3a8813aee0e3a9dd919bacbb27f626be030a3c6d6c7f83@%3Ccommits.pulsar.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r255ed239e65d0596812362adc474bee96caf7ba042c7ad2f3c62cec7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r255ed239e65d0596812362adc474bee96caf7ba042c7ad2f3c62cec7@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r2958e4d49ee046e1e561e44fdc114a0d2285927501880f15852a9b53","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2958e4d49ee046e1e561e44fdc114a0d2285927501880f15852a9b53@%3Ccommits.druid.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"apache-msg-rf803b65b4a57589d79cf2e83d8ece0539018d32864f932f63c972844","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf803b65b4a57589d79cf2e83d8ece0539018d32864f932f63c972844@%3Cnotifications.zookeeper.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Debian Advisory dsa-4885","url":"https://www.debian.org/security/2021/dsa-4885"},{"title":"NetApp Advisory ntap-20201223-0001","url":"https://security.netapp.com/advisory/ntap-20201223-0001"},{"title":"CVE-2020-11612","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11612"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[119,400,770],"description":"Denial of Service in Netty","detail":"# Denial of Service in Netty The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2020-06-15T19:36:16","updated":"2024-03-14T05:18:47","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2019-20445","bom-ref":"CVE-2019-20445/pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/!=4.1.45|<4.1.45","status":"affected"},{"version":"4.1.45","status":"unaffected"}]}],"recommendation":"Update to version 4.1.45 to resolve CVE-2019-20445 or update to version 4.1.94.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20445","name":"NVD"},"references":[{"id":"apache-msg-r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"}},{"id":"apache-msg-rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0601","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0601"}},{"id":"apache-msg-rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663@%3Cissues.flume.apache.org%3E"}},{"id":"debian-msg-msg00004","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html"}},{"id":"debian-msg-msg00017","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html"}},{"id":"debian-msg-msg00003","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html"}},{"id":"apache-msg-raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E"}},{"id":"dsa-4885","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2021/dsa-4885"}},{"id":"apache-msg-re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E"}},{"id":"apache-msg-rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E"}},{"id":"RHSA-2020:0567","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0567"}},{"id":"RHSA-2020:0811","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0811"}},{"id":"apache-msg-r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E"}},{"id":"apache-msg-r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E"}},{"id":"RHSA-2020:0605","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0605"}},{"id":"apache-msg-rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E"}},{"id":"apache-msg-r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E"}},{"id":"fedoraproject-msg-TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46","source":{"name":"Fedora Project Mailing List","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46"}},{"id":"apache-msg-r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74@%3Cissues.flume.apache.org%3E"}},{"id":"RHSA-2020:0805","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0805"}},{"id":"RHSA-2020:0606","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0606"}},{"id":"apache-msg-r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0497","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0497"}},{"id":"apache-msg-rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2@%3Cissues.flume.apache.org%3E"}},{"id":"apache-msg-r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"debian-msg-msg00018","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html"}},{"id":"apache-msg-rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11@%3Cissues.spark.apache.org%3E"}},{"id":"apache-msg-r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E"}},{"id":"CVE-2019-20445","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20445","name":"NVD"}},{"id":"apache-msg-rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"RHSA-2020:0806","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0806"}},{"id":"RHSA-2020:0804","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2020:0804"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2020:0601","url":"https://access.redhat.com/errata/RHSA-2020:0601"},{"title":"Debian Advisory dsa-4885","url":"https://www.debian.org/security/2021/dsa-4885"},{"title":"Red Hat Advisory RHSA-2020:0567","url":"https://access.redhat.com/errata/RHSA-2020:0567"},{"title":"Red Hat Advisory RHSA-2020:0811","url":"https://access.redhat.com/errata/RHSA-2020:0811"},{"title":"Red Hat Advisory RHSA-2020:0605","url":"https://access.redhat.com/errata/RHSA-2020:0605"},{"title":"Red Hat Advisory RHSA-2020:0805","url":"https://access.redhat.com/errata/RHSA-2020:0805"},{"title":"Red Hat Advisory RHSA-2020:0606","url":"https://access.redhat.com/errata/RHSA-2020:0606"},{"title":"Red Hat Advisory RHSA-2020:0497","url":"https://access.redhat.com/errata/RHSA-2020:0497"},{"title":"CVE-2019-20445","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20445"},{"title":"Red Hat Advisory RHSA-2020:0806","url":"https://access.redhat.com/errata/RHSA-2020:0806"},{"title":"Red Hat Advisory RHSA-2020:0804","url":"https://access.redhat.com/errata/RHSA-2020:0804"}],"cwes":[444],"description":"HTTP Request Smuggling in Netty","detail":"# HTTP Request Smuggling in Netty HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.0,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"published":"2020-02-21T18:55:04","updated":"2024-12-08T05:34:35","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-codec-http@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-handler@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2025-25193","bom-ref":"CVE-2025-25193/pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.99.Final|!=4.1.118.Final","status":"affected"},{"version":"4.1.118.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.118.Final.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-25193","name":"NVD"},"references":[{"id":"ntap-20250221-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250221-0006"}},{"id":"CVE-2025-25193","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-25193","name":"NVD"}},{"id":"GHSA-389x-839f-4rhx","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx"}}],"advisories":[{"title":"NetApp Advisory ntap-20250221-0006","url":"https://security.netapp.com/advisory/ntap-20250221-0006"},{"title":"CVE-2025-25193","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-25193"},{"title":"GitHub Advisory GHSA-389x-839f-4rhx","url":"https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx"}],"cwes":[400],"description":"Denial of Service attack on windows app using Netty","detail":"# Denial of Service attack on windows app using Netty ### Summary An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attemps to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. ### Details A similar issue was previously reported in https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. ### PoC The PoC is the same as for https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv with the detail that the file should only contain null-bytes; 0x00. When the null-bytes are encountered by the `InputStreamReader`, it will issue replacement characters in its charset decoding, which will fill up the line-buffer in the `BufferedReader.readLine()`, because the replacement character is not a line-break character. ### Impact Impact is the same as https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2025-02-10T18:14:47","updated":"2025-03-19T15:06:40","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-transport-native-epoll@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-47535","bom-ref":"CVE-2024-47535/pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","affects":[{"ref":"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar","versions":[{"range":"vers:maven/>=4.0.0.Alpha1|<=4.1.99.Final|!=4.1.115.Final","status":"affected"},{"version":"4.1.115.Final","status":"unaffected"}]}],"recommendation":"Update to version 4.1.115.Final to resolve CVE-2024-47535 or update to version 4.1.118.Final to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47535","name":"NVD"},"references":[{"id":"CVE-2024-47535","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47535","name":"NVD"}},{"id":"GHSA-xq3w-v528-46rv","source":{"name":"GitHub Advisory","url":"https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv"}}],"advisories":[{"title":"CVE-2024-47535","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47535"},{"title":"GitHub Advisory GHSA-xq3w-v528-46rv","url":"https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv"}],"cwes":[400],"description":"","detail":"Refer to the supporting media","ratings":[{"method":"CVSSv4","severity":"medium","score":5.4,"vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"}],"published":"2024-11-12T19:53:17","updated":"2025-02-18T16:16:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/io.reactivex/rxnetty@0.4.9?type=jar\", \"pkg:maven/io.netty/netty-transport-native-epoll@4.0.27.Final?type=jar\", \"pkg:maven/io.netty/netty-common@4.0.27.Final?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2024-38821","bom-ref":"CVE-2024-38821/pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","versions":[{"range":"vers:maven/>=3.0.0.RELEASE|<=5.7.9|!=5.7.13","status":"affected"},{"version":"5.7.13","status":"unaffected"}]}],"recommendation":"Update to version 5.7.13.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38821","name":"NVD"},"references":[{"id":"ntap-20250124-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250124-0006"}},{"id":"CVE-2024-38821","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38821","name":"NVD"}},{"id":"cve-2024-38821","source":{"url":"https://spring.io/security/cve-2024-38821"}}],"advisories":[{"title":"NetApp Advisory ntap-20250124-0006","url":"https://security.netapp.com/advisory/ntap-20250124-0006"},{"title":"CVE-2024-38821","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38821"},{"title":"cve-2024-38821","url":"https://spring.io/security/cve-2024-38821"}],"cwes":[285,770],"description":"Spring Security vulnerable to Authorization Bypass of Static Resources in WebFlux Applications","detail":"# Spring Security vulnerable to Authorization Bypass of Static Resources in WebFlux Applications Spring WebFlux applications that have Spring Security authorization rules on static resources can be bypassed under certain circumstances. For this to impact an application, all of the following must be true: * It must be a WebFlux application * It must be using Spring's static resources support * It must have a non-permitAll authorization rule applied to the static resources support","ratings":[{"method":"CVSSv4","severity":"critical","score":9.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"}],"published":"2024-10-28T09:30:53","updated":"2025-01-24T22:05:51","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2021-22112","bom-ref":"CVE-2021-22112/pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.4.4|<5.4.4","status":"affected"},{"version":"5.4.4","status":"unaffected"}]}],"recommendation":"Update to version 5.4.4 to resolve CVE-2021-22112 or update to version 5.7.13 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22112","name":"NVD"},"references":[{"id":"apache-msg-r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"CVE-2021-22112","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22112","name":"NVD"}},{"id":"cve-2021-22112","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2021-22112"}},{"id":"apache-msg-r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E"}},{"id":"apache-msg-ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E"}},{"id":"apache-msg-r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804@%3Cpluto-scm.portals.apache.org%3E"}},{"id":"apache-msg-ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"openwall-oss-security-msg-2021-02-19-7","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/02/19/7"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}}],"advisories":[{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"CVE-2021-22112","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22112"},{"title":"Vmware Advisory cve-2021-22112","url":"https://tanzu.vmware.com/security/cve-2021-22112"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[269],"description":"Privilege escalation in spring security","detail":"# Privilege escalation in spring security Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to run with elevated privileges in a small portion of the application, the bug can be leveraged to extend those privileges to the rest of the application.","ratings":[{"method":"CVSSv31","severity":"high","score":8.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-05-10T15:22:39","updated":"2024-03-15T05:19:47","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2022-22978","bom-ref":"CVE-2022-22978/pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.5.7|<5.5.7","status":"affected"},{"version":"5.5.7","status":"unaffected"}]}],"recommendation":"Update to version 5.5.7 to resolve CVE-2022-22978 or update to version 5.7.13 to resolve additional vulnerabilities for this package.","source":{"url":"https://spring.io/security/cve-2022-22978"},"references":[{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"cve-2022-22978","source":{"url":"https://spring.io/security/cve-2022-22978"}},{"id":"cve-2022-22978","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22978"}},{"id":"ntap-20220707-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220707-0003"}},{"id":"CVE-2022-22978","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22978","name":"NVD"}}],"advisories":[{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"cve-2022-22978","url":"https://spring.io/security/cve-2022-22978"},{"title":"Vmware Advisory cve-2022-22978","url":"https://tanzu.vmware.com/security/cve-2022-22978"},{"title":"NetApp Advisory ntap-20220707-0003","url":"https://security.netapp.com/advisory/ntap-20220707-0003"},{"title":"CVE-2022-22978","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22978"}],"cwes":[285,863],"description":"Authorization bypass in Spring Security","detail":"# Authorization bypass in Spring Security In Spring Security versions 5.5.6 and 5.5.7 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-05-20T00:00:39","updated":"2024-10-04T20:33:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-15801","bom-ref":"CVE-2018-15801/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.1.2|<5.1.2","status":"affected"},{"version":"5.1.2","status":"unaffected"}]}],"recommendation":"Update to version 5.1.2 to resolve CVE-2018-15801 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-15801"},"references":[{"id":"cve-2018-15801","source":{"url":"https://pivotal.io/security/cve-2018-15801"}},{"id":"CVE-2018-15801","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-15801","name":"NVD"}},{"id":"GHSA-27xw-p8v6-9jjr","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-27xw-p8v6-9jjr"}}],"advisories":[{"title":"cve-2018-15801","url":"https://pivotal.io/security/cve-2018-15801"},{"title":"CVE-2018-15801","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-15801"},{"title":"GitHub Advisory GHSA-27xw-p8v6-9jjr","url":"https://github.com/advisories/GHSA-27xw-p8v6-9jjr"}],"cwes":[345],"description":"Spring Security vulnerable to Authorization Bypass","detail":"# Spring Security vulnerable to Authorization Bypass Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.","ratings":[{"method":"CVSSv3","severity":"high","score":7.4,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"published":"2018-12-20T22:01:31","updated":"2024-03-14T21:16:03","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2020-5408","bom-ref":"CVE-2020-5408/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.3.2|<5.3.2","status":"affected"},{"version":"5.3.2","status":"unaffected"}]}],"recommendation":"Update to version 5.3.2 to resolve CVE-2020-5408 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2020-5408"},"references":[{"id":"cve-2020-5408","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2020-5408"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"CVE-2020-5408","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5408","name":"NVD"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}}],"advisories":[{"title":"Vmware Advisory cve-2020-5408","url":"https://tanzu.vmware.com/security/cve-2020-5408"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"CVE-2020-5408","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5408"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[329,330],"description":"Insufficient Entropy in Spring Security","detail":"# Insufficient Entropy in Spring Security Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2020-06-15T19:34:31","updated":"2023-11-08T04:03:55","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2020-5407","bom-ref":"CVE-2020-5407/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.2.4|<5.2.4","status":"affected"},{"version":"5.2.4","status":"unaffected"}]}],"recommendation":"Update to version 5.2.4 to resolve CVE-2020-5407 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5407","name":"NVD"},"references":[{"id":"CVE-2020-5407","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5407","name":"NVD"}},{"id":"cve-2020-5407","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2020-5407"}},{"id":"apache-msg-rd99601fbca514f214f88f9e53fd5be3cfbff05b350c994b4ec2e184c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd99601fbca514f214f88f9e53fd5be3cfbff05b350c994b4ec2e184c@%3Cdev.geode.apache.org%3E"}},{"id":"apache-msg-r73af928cf64bebf78b7fa4bc56a5253273ec7829f5f5827f64c72fc7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r73af928cf64bebf78b7fa4bc56a5253273ec7829f5f5827f64c72fc7@%3Cissues.servicemix.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-ra19a4e7236877fe12bfb52db07b27ad72d9e7a9f5e27bba7e928e18a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra19a4e7236877fe12bfb52db07b27ad72d9e7a9f5e27bba7e928e18a@%3Cdev.geode.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}}],"advisories":[{"title":"CVE-2020-5407","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5407"},{"title":"Vmware Advisory cve-2020-5407","url":"https://tanzu.vmware.com/security/cve-2020-5407"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}],"cwes":[347],"description":"Signature wrapping vulnerability in Spring Security","detail":"# Signature wrapping vulnerability in Spring Security Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.","ratings":[{"method":"CVSSv31","severity":"high","score":8.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2020-06-05T16:13:29","updated":"2023-11-08T04:03:55","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2024-22257","bom-ref":"CVE-2024-22257/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=2.0.0|<=5.7.9|!=5.7.12","status":"affected"},{"version":"5.7.12","status":"unaffected"}]}],"recommendation":"Update to version 5.7.12 to resolve CVE-2024-22257 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://spring.io/security/cve-2024-22257"},"references":[{"id":"ntap-20240419-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240419-0005"}},{"id":"cve-2024-22257","source":{"url":"https://spring.io/security/cve-2024-22257"}},{"id":"CVE-2024-22257","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22257","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20240419-0005","url":"https://security.netapp.com/advisory/ntap-20240419-0005"},{"title":"cve-2024-22257","url":"https://spring.io/security/cve-2024-22257"},{"title":"CVE-2024-22257","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22257"}],"cwes":[287,862],"description":"Erroneous authentication pass in Spring Security","detail":"# Erroneous authentication pass in Spring Security In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to 5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, versions 6.2.x prior to 6.2.3, an application is possible vulnerable to broken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter. Specifically, an application is vulnerable if: The application uses AuthenticatedVoter directly and a null authentication parameter is passed to it resulting in an erroneous true return value. An application is not vulnerable if any of the following is true: * The application does not use AuthenticatedVoter#vote directly. * The application does not pass null to AuthenticatedVoter#vote. Note that AuthenticatedVoter is deprecated since 5.8, use implementations of AuthorizationManager as a replacement.","ratings":[{"method":"CVSSv31","severity":"high","score":8.2,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N"}],"published":"2024-03-18T15:30:51","updated":"2025-02-13T19:11:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2025-22223","bom-ref":"CVE-2025-22223/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=6.4.4|<6.4.4","status":"affected"},{"version":"6.4.4","status":"unaffected"}]}],"recommendation":"Update to version 6.4.4.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22223","name":"NVD"},"references":[{"id":"CVE-2025-22223","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22223","name":"NVD"}},{"id":"cve-2025-22223","source":{"url":"https://spring.io/security/cve-2025-22223"}}],"advisories":[{"title":"CVE-2025-22223","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22223"},{"title":"cve-2025-22223","url":"https://spring.io/security/cve-2025-22223"}],"cwes":[290],"description":"Spring Security Vulnerable to Authorization Bypass via Security Annotations","detail":"# Spring Security Vulnerable to Authorization Bypass via Security Annotations Spring Security 6.4.0 - 6.4.3 may not correctly locate method security annotations on parameterized types or methods. This may cause an authorization bypass.\u00a0 You are not affected if you are not using @EnableMethodSecurity, or you do not have method security annotations on parameterized types or methods, or all method security annotations are attached to target methods","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2025-03-24T18:31:03","updated":"2025-03-24T21:37:04","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 2 locations"}]},{"id":"CVE-2024-38810","bom-ref":"CVE-2024-38810/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=6.3.2|<6.3.2","status":"affected"},{"version":"6.3.2","status":"unaffected"}]}],"recommendation":"Update to version 6.3.2 to resolve CVE-2024-38810 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38810","name":"NVD"},"references":[{"id":"CVE-2024-38810","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38810","name":"NVD"}},{"id":"cve-2024-38810","source":{"url":"https://spring.io/security/cve-2024-38810"}}],"advisories":[{"title":"CVE-2024-38810","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38810"},{"title":"cve-2024-38810","url":"https://spring.io/security/cve-2024-38810"}],"cwes":[287,862],"description":"Spring Security Missing Authorization vulnerability","detail":"# Spring Security Missing Authorization vulnerability Missing Authorization When Using @AuthorizeReturnObject in Spring Security 6.3.0 and 6.3.1 allows attacker to render security annotations inaffective.","ratings":[{"method":"CVSSv4","severity":"medium","score":6.9,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}],"published":"2024-08-20T06:31:36","updated":"2025-03-01T23:27:05","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 2 locations"}]},{"id":"CVE-2022-31692","bom-ref":"CVE-2022-31692/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.7.5|<5.7.5","status":"affected"},{"version":"5.7.5","status":"unaffected"}]}],"recommendation":"Update to version 5.7.5 to resolve CVE-2022-31692 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31692","name":"NVD"},"references":[{"id":"ntap-20221215-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20221215-0010"}},{"id":"CVE-2022-31692","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31692","name":"NVD"}},{"id":"cve-2022-31692","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-31692"}}],"advisories":[{"title":"NetApp Advisory ntap-20221215-0010","url":"https://security.netapp.com/advisory/ntap-20221215-0010"},{"title":"CVE-2022-31692","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31692"},{"title":"Vmware Advisory cve-2022-31692","url":"https://tanzu.vmware.com/security/cve-2022-31692"}],"cwes":[863],"description":"Spring Security authorization rules can be bypassed via forward or include dispatcher types","detail":"# Spring Security authorization rules can be bypassed via forward or include dispatcher types Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies security to forward and include dispatcher types. The application uses the AuthorizationFilter either manually or via the authorizeHttpRequests() method. The application configures the FilterChainProxy to apply to forward and/or include requests (e.g. spring.security.filter.dispatcher-types = request, error, async, forward, include). The application may forward or include the request to a higher privilege-secured endpoint.The application configures Spring Security to apply to every dispatcher type via authorizeHttpRequests().shouldFilterAllDispatcherTypes(true)","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-11-01T12:00:37","updated":"2024-02-17T05:36:24","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2024-38827","bom-ref":"CVE-2024-38827/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=2.0.0|<=5.7.9|!=5.7.14","status":"affected"},{"version":"5.7.14","status":"unaffected"}]}],"recommendation":"Update to version 5.7.14 to resolve CVE-2024-38827 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38827","name":"NVD"},"references":[{"id":"CVE-2024-38827","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38827","name":"NVD"}},{"id":"cve-2024-38827","source":{"url":"https://spring.io/security/cve-2024-38827"}},{"id":"ntap-20250124-0007","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250124-0007"}}],"advisories":[{"title":"CVE-2024-38827","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38827"},{"title":"cve-2024-38827","url":"https://spring.io/security/cve-2024-38827"},{"title":"NetApp Advisory ntap-20250124-0007","url":"https://security.netapp.com/advisory/ntap-20250124-0007"}],"cwes":[639],"description":"Spring Framework has Authorization Bypass for Case Sensitive Comparisons","detail":"# Spring Framework has Authorization Bypass for Case Sensitive Comparisons The usage of String.toLowerCase()\u00a0and String.toUpperCase()\u00a0has some Locale\u00a0dependent exceptions that could potentially result in authorization rules not working properly.","ratings":[{"method":"CVSSv4","severity":"medium","score":6.3,"vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"}],"published":"2024-12-02T15:31:41","updated":"2025-01-24T22:03:01","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2019-3795","bom-ref":"CVE-2019-3795/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=4.2.12|<4.2.12","status":"affected"},{"version":"4.2.12","status":"unaffected"}]}],"recommendation":"Update to version 4.2.12 to resolve CVE-2019-3795 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3795","name":"NVD"},"references":[{"id":"debian-msg-msg00026","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00026.html"}},{"id":"GHSA-v2r2-7qm7-jj6v","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-v2r2-7qm7-jj6v"}},{"id":"CVE-2019-3795","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3795","name":"NVD"}},{"id":"cve-2019-3795","source":{"url":"https://pivotal.io/security/cve-2019-3795"}},{"id":"securityfocus-msg-107802","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/107802"}}],"advisories":[{"title":"GitHub Advisory GHSA-v2r2-7qm7-jj6v","url":"https://github.com/advisories/GHSA-v2r2-7qm7-jj6v"},{"title":"CVE-2019-3795","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3795"},{"title":"cve-2019-3795","url":"https://pivotal.io/security/cve-2019-3795"}],"cwes":[330],"description":"Spring Security uses insufficiently random values","detail":"# Spring Security uses insufficiently random values Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an honest application must provide a seed and make the resulting random material available to an attacker for inspection.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2019-04-16T15:10:59","updated":"2023-11-08T04:01:34","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2019-11272","bom-ref":"CVE-2019-11272/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/>=2.0.0|<=4.2.9.RELEASE|!=4.2.13","status":"affected"},{"version":"4.2.13","status":"unaffected"}]}],"recommendation":"Update to version 4.2.13 to resolve CVE-2019-11272 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11272","name":"NVD"},"references":[{"id":"CVE-2019-11272","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11272","name":"NVD"}},{"id":"debian-msg-msg00008","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html"}},{"id":"cve-2019-11272","source":{"url":"https://pivotal.io/security/cve-2019-11272"}}],"advisories":[{"title":"CVE-2019-11272","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11272"},{"title":"cve-2019-11272","url":"https://pivotal.io/security/cve-2019-11272"}],"cwes":[287,522],"description":"Insufficiently Protected Credentials and Improper Authentication in Spring Security","detail":"# Insufficiently Protected Credentials and Improper Authentication in Spring Security Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of ?null?.","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2019-06-27T17:24:58","updated":"2023-11-08T04:01:00","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2018-1199","bom-ref":"CVE-2018-1199/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=4.2.4|<4.2.4","status":"affected"},{"version":"4.2.4","status":"unaffected"}]}],"recommendation":"Update to version 4.2.4 to resolve CVE-2018-1199 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199","name":"NVD"},"references":[{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E"}},{"id":"CVE-2018-1199","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199","name":"NVD"}},{"id":"GHSA-v596-fwhq-8x48","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-v596-fwhq-8x48"}},{"id":"apache-msg-4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E"}},{"id":"cve-2018-1199","source":{"url":"https://pivotal.io/security/cve-2018-1199"}},{"id":"RHSA-2018:2405","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2405"}},{"id":"apache-msg-ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"CVE-2018-1199","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199"},{"title":"GitHub Advisory GHSA-v596-fwhq-8x48","url":"https://github.com/advisories/GHSA-v596-fwhq-8x48"},{"title":"cve-2018-1199","url":"https://pivotal.io/security/cve-2018-1199"},{"title":"Red Hat Advisory RHSA-2018:2405","url":"https://access.redhat.com/errata/RHSA-2018:2405"}],"cwes":[20],"description":"Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core","detail":"# Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2018-10-17T20:01:54","updated":"2024-03-15T16:11:19","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2024-22234","bom-ref":"CVE-2024-22234/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=6.1.7|<6.1.7","status":"affected"},{"version":"6.1.7","status":"unaffected"}]}],"recommendation":"Update to version 6.1.7 to resolve CVE-2024-22234 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22234","name":"NVD"},"references":[{"id":"ntap-20240315-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240315-0003"}},{"id":"CVE-2024-22234","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22234","name":"NVD"}},{"id":"cve-2024-22234","source":{"url":"https://spring.io/security/cve-2024-22234"}}],"advisories":[{"title":"NetApp Advisory ntap-20240315-0003","url":"https://security.netapp.com/advisory/ntap-20240315-0003"},{"title":"CVE-2024-22234","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22234"},{"title":"cve-2024-22234","url":"https://spring.io/security/cve-2024-22234"}],"cwes":[284],"description":"Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated","detail":"# Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication)\u00a0method. Specifically, an application is vulnerable if: * The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication)\u00a0directly and a null\u00a0authentication parameter is passed to it resulting in an erroneous true\u00a0return value. An application is not vulnerable if any of the following is true: * The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication)\u00a0directly. * The application does not pass null\u00a0to AuthenticationTrustResolver.isFullyAuthenticated * The application only uses isFullyAuthenticated\u00a0via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html \u00a0or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html","ratings":[{"method":"CVSSv31","severity":"high","score":7.4,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"published":"2024-02-20T09:30:30","updated":"2025-02-13T19:36:07","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2021-22119","bom-ref":"CVE-2021-22119/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.5.1|<5.5.1","status":"affected"},{"version":"5.5.1","status":"unaffected"}]}],"recommendation":"Update to version 5.5.1 to resolve CVE-2021-22119 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2021-22119"},"references":[{"id":"apache-msg-r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cve-2021-22119","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2021-22119"}},{"id":"CVE-2021-22119","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22119","name":"NVD"}},{"id":"apache-msg-r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"apache-msg-r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad@%3Cissues.nifi.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Vmware Advisory cve-2021-22119","url":"https://tanzu.vmware.com/security/cve-2021-22119"},{"title":"CVE-2021-22119","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22119"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[400,863],"description":"Resource Exhaustion in Spring Security","detail":"# Resource Exhaustion in Spring Security Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2021-07-02T18:33:34","updated":"2023-11-08T04:04:54","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2022-22976","bom-ref":"CVE-2022-22976/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.5.7|<5.5.7","status":"affected"},{"version":"5.5.7","status":"unaffected"}]}],"recommendation":"Update to version 5.5.7 to resolve CVE-2022-22976 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22976","name":"NVD"},"references":[{"id":"CVE-2022-22976","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22976","name":"NVD"}},{"id":"cve-2022-22976","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22976"}},{"id":"ntap-20220707-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220707-0003"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"CVE-2022-22976","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22976"},{"title":"Vmware Advisory cve-2022-22976","url":"https://tanzu.vmware.com/security/cve-2022-22976"},{"title":"NetApp Advisory ntap-20220707-0003","url":"https://security.netapp.com/advisory/ntap-20220707-0003"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[190],"description":"Integer overflow in BCrypt class in Spring Security","detail":"# Integer overflow in BCrypt class in Spring Security Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2022-05-20T00:00:38","updated":"2024-06-13T22:00:44","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2023-20862","bom-ref":"CVE-2023-20862/pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.7.8|<5.7.8","status":"affected"},{"version":"5.7.8","status":"unaffected"}]}],"recommendation":"Update to version 5.7.8 to resolve CVE-2023-20862 or update to version 6.4.4 to resolve additional vulnerabilities for this package.","source":{"url":"https://spring.io/security/cve-2023-20862"},"references":[{"id":"ntap-20230526-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230526-0002"}},{"id":"cve-2023-20862","source":{"url":"https://spring.io/security/cve-2023-20862"}},{"id":"CVE-2023-20862","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20862","name":"NVD"}}],"advisories":[{"title":"NetApp Advisory ntap-20230526-0002","url":"https://security.netapp.com/advisory/ntap-20230526-0002"},{"title":"cve-2023-20862","url":"https://spring.io/security/cve-2023-20862"},{"title":"CVE-2023-20862","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20862"}],"cwes":[459],"description":"Spring Security logout not clearing security context","detail":"# Spring Security logout not clearing security context In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerability can keep users authenticated even after they performed logout. Users of affected versions should apply the following mitigation. 5.7.x users should upgrade to 5.7.8. 5.8.x users should upgrade to 5.8.3. 6.0.x users should upgrade to 6.0.3.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"published":"2023-04-19T21:30:26","updated":"2024-02-16T08:23:55","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework.security/spring-security-core@4.2.1.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2022-22970","bom-ref":"CVE-2022-22970/pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=5.2.9.RELEASE|!=5.2.22.RELEASE","status":"affected"},{"version":"5.2.22.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 5.2.22.RELEASE.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22970","name":"NVD"},"references":[{"id":"ntap-20220616-0006","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220616-0006"}},{"id":"CVE-2022-22970","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22970","name":"NVD"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"cve-2022-22970","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22970"}}],"advisories":[{"title":"NetApp Advisory ntap-20220616-0006","url":"https://security.netapp.com/advisory/ntap-20220616-0006"},{"title":"CVE-2022-22970","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22970"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"Vmware Advisory cve-2022-22970","url":"https://tanzu.vmware.com/security/cve-2022-22970"}],"cwes":[770],"description":"Denial of service in Spring Framework","detail":"# Denial of service in Spring Framework In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2022-05-13T00:00:28","updated":"2024-03-14T21:14:57","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-beans@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2024-38820","bom-ref":"CVE-2024-38820/pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=6.1.9|!=6.1.14","status":"affected"},{"version":"6.1.14","status":"unaffected"}]}],"recommendation":"Update to version 6.1.14.","source":{"url":"https://spring.io/security/cve-2024-38820"},"references":[{"id":"cve-2024-38820","source":{"url":"https://spring.io/security/cve-2024-38820"}},{"id":"CVE-2024-38820","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38820","name":"NVD"}},{"id":"ntap-20241129-0003","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20241129-0003"}}],"advisories":[{"title":"cve-2024-38820","url":"https://spring.io/security/cve-2024-38820"},{"title":"CVE-2024-38820","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38820"},{"title":"NetApp Advisory ntap-20241129-0003","url":"https://security.netapp.com/advisory/ntap-20241129-0003"}],"cwes":[178],"description":"Spring Framework DataBinder Case Sensitive Match Exception","detail":"# Spring Framework DataBinder Case Sensitive Match Exception The fix for CVE-2022-22968 made disallowedFields\u00a0patterns in DataBinder\u00a0case insensitive. However, String.toLowerCase()\u00a0has some Locale dependent exceptions that could potentially result in fields not protected as expected.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"published":"2024-10-18T06:30:32","updated":"2024-11-29T12:46:08","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 30 locations"}]},{"id":"CVE-2022-22968","bom-ref":"CVE-2022-22968/pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.3.19|<5.3.19","status":"affected"},{"version":"5.3.19","status":"unaffected"}]}],"recommendation":"Update to version 5.3.19 to resolve CVE-2022-22968 or update to version 6.1.14 to resolve additional vulnerabilities for this package.","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22968"},"references":[{"id":"cve-2022-22968","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2022-22968"}},{"id":"CVE-2022-22968","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22968","name":"NVD"}},{"id":"ntap-20220602-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220602-0004"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"Vmware Advisory cve-2022-22968","url":"https://tanzu.vmware.com/security/cve-2022-22968"},{"title":"CVE-2022-22968","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22968"},{"title":"NetApp Advisory ntap-20220602-0004","url":"https://security.netapp.com/advisory/ntap-20220602-0004"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[178],"description":"Improper handling of case sensitivity in Spring Framework","detail":"# Improper handling of case sensitivity in Spring Framework In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. Versions 5.3.19 and 5.2.21 contain a patch for this issue.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"published":"2022-04-15T00:00:32","updated":"2024-05-15T06:31:39","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-context@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 30 locations"}]},{"id":"CVE-2018-1272","bom-ref":"CVE-2018-1272/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/>=1.0|<=4.3.9.RELEASE|!=4.3.15","status":"affected"},{"version":"4.3.15","status":"unaffected"}]}],"recommendation":"Update to version 4.3.15 to resolve CVE-2018-1272 or update to version 6.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1272","name":"NVD"},"references":[{"id":"RHSA-2018:1320","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1320"}},{"id":"CVE-2018-1272","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1272","name":"NVD"}},{"id":"RHSA-2018:2669","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2669"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"GHSA-4487-x383-qpph","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-4487-x383-qpph"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"securityfocus-msg-103697","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/103697"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cve-2018-1272","source":{"url":"https://pivotal.io/security/cve-2018-1272"}},{"id":"cpujul2018-4258247","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:1320","url":"https://access.redhat.com/errata/RHSA-2018:1320"},{"title":"CVE-2018-1272","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1272"},{"title":"Red Hat Advisory RHSA-2018:2669","url":"https://access.redhat.com/errata/RHSA-2018:2669"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"GitHub Advisory GHSA-4487-x383-qpph","url":"https://github.com/advisories/GHSA-4487-x383-qpph"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"cve-2018-1272","url":"https://pivotal.io/security/cve-2018-1272"},{"title":"Oracle Advisory cpujul2018-4258247","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}],"cwes":[],"description":"Possible privilege escalation in org.springframework:spring-core","detail":"# Possible privilege escalation in org.springframework:spring-core Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2018-10-17T20:27:47","updated":"2024-12-05T05:30:27","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2021-22060","bom-ref":"CVE-2021-22060/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.3.14|<5.3.14","status":"affected"},{"version":"5.3.14","status":"unaffected"}]}],"recommendation":"Update to version 5.3.14 to resolve CVE-2021-22060 or update to version 6.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22060","name":"NVD"},"references":[{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"CVE-2021-22060","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22060","name":"NVD"}},{"id":"cve-2021-22060","source":{"name":"Vmware Advisory","url":"https://tanzu.vmware.com/security/cve-2021-22060"}}],"advisories":[{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"CVE-2021-22060","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22060"},{"title":"Vmware Advisory cve-2021-22060","url":"https://tanzu.vmware.com/security/cve-2021-22060"}],"cwes":[],"description":"Log entry injection in Spring Framework","detail":"# Log entry injection in Spring Framework In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.","ratings":[{"method":"CVSSv31","severity":"medium","score":4.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"published":"2022-01-12T23:04:06","updated":"2024-12-04T05:23:15","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-1258","bom-ref":"CVE-2018-1258/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.0.6.RELEASE|<5.0.6.RELEASE","status":"affected"},{"version":"5.0.6.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 5.0.6.RELEASE to resolve CVE-2018-1258 or update to version 6.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-1258"},"references":[{"id":"archive-msg-104222","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200227032934/http://www.securityfocus.com/bid/104222"}},{"id":"cve-2018-1258","source":{"url":"https://pivotal.io/security/cve-2018-1258"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"archive-msg-1041896","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200807033751/http://www.securitytracker.com/id/1041896"}},{"id":"CVE-2018-1258","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1258","name":"NVD"}},{"id":"cpujul2018-4258247","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}},{"id":"ntap-20181018-0002","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20181018-0002"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"archive-msg-1041888","source":{"name":"Archive Mailing List","url":"https://web.archive.org/web/20200807025819/http://www.securitytracker.com/id/1041888"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"GHSA-cxrj-66c5-9fmh","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-cxrj-66c5-9fmh"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"RHSA-2019:2413","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2019:2413"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}}],"advisories":[{"title":"cve-2018-1258","url":"https://pivotal.io/security/cve-2018-1258"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"CVE-2018-1258","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1258"},{"title":"Oracle Advisory cpujul2018-4258247","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"title":"NetApp Advisory ntap-20181018-0002","url":"https://security.netapp.com/advisory/ntap-20181018-0002"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"GitHub Advisory GHSA-cxrj-66c5-9fmh","url":"https://github.com/advisories/GHSA-cxrj-66c5-9fmh"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Red Hat Advisory RHSA-2019:2413","url":"https://access.redhat.com/errata/RHSA-2019:2413"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}],"cwes":[863],"description":"Spring Framework when used in combination with any versions of Spring Security contains an authorization bypass","detail":"# Spring Framework when used in combination with any versions of Spring Security contains an authorization bypass Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.","ratings":[{"method":"CVSSv3","severity":"high","score":8.8,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2018-10-17T20:05:49","updated":"2024-03-14T21:08:21","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-11040","bom-ref":"CVE-2018-11040/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.0.7.RELEASE|<5.0.7.RELEASE","status":"affected"},{"version":"5.0.7.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 5.0.7.RELEASE to resolve CVE-2018-11040 or update to version 6.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11040","name":"NVD"},"references":[{"id":"CVE-2018-11040","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11040","name":"NVD"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"GHSA-f26x-pr96-vw86","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-f26x-pr96-vw86"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"debian-msg-msg00022","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html"}},{"id":"cve-2018-11040","source":{"url":"https://pivotal.io/security/cve-2018-11040"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}}],"advisories":[{"title":"CVE-2018-11040","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11040"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"GitHub Advisory GHSA-f26x-pr96-vw86","url":"https://github.com/advisories/GHSA-f26x-pr96-vw86"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"cve-2018-11040","url":"https://pivotal.io/security/cve-2018-11040"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"cwes":[829],"description":"Moderate severity vulnerability that affects org.springframework:spring-core","detail":"# Moderate severity vulnerability that affects org.springframework:spring-core Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the \"jsonp\" and \"callback\" JSONP parameters, enabling cross-domain requests.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-16T17:43:45","updated":"2024-05-15T06:31:22","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-15756","bom-ref":"CVE-2018-15756/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.1.1.RELEASE|<5.1.1.RELEASE","status":"affected"},{"version":"5.1.1.RELEASE","status":"unaffected"}]}],"recommendation":"Update to version 5.1.1.RELEASE to resolve CVE-2018-15756 or update to version 6.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://pivotal.io/security/cve-2018-15756"},"references":[{"id":"securityfocus-msg-105703","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/105703"}},{"id":"apache-msg-77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3@%3Cissues.activemq.apache.org%3E"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"cve-2018-15756","source":{"url":"https://pivotal.io/security/cve-2018-15756"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"apache-msg-339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68@%3Cissues.activemq.apache.org%3E"}},{"id":"apache-msg-8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd@%3Cissues.activemq.apache.org%3E"}},{"id":"cpuoct2019-5072832","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}},{"id":"debian-msg-msg00022","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html"}},{"id":"apache-msg-bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d@%3Cissues.activemq.apache.org%3E"}},{"id":"CVE-2018-15756","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-15756","name":"NVD"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"apache-msg-f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc@%3Cissues.activemq.apache.org%3E"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"apache-msg-efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d@%3Cissues.activemq.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"cve-2018-15756","url":"https://pivotal.io/security/cve-2018-15756"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuoct2019-5072832","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"title":"CVE-2018-15756","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-15756"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}],"cwes":[],"description":"Denial of Service in Spring Framework","detail":"# Denial of Service in Spring Framework Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.","ratings":[{"method":"CVSSv3","severity":"high","score":7.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2020-06-15T19:34:50","updated":"2024-12-01T05:32:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-1271","bom-ref":"CVE-2018-1271/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.0.5|<5.0.5","status":"affected"},{"version":"5.0.5","status":"unaffected"}]}],"recommendation":"Update to version 5.0.5 to resolve CVE-2018-1271 or update to version 6.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1271","name":"NVD"},"references":[{"id":"RHSA-2018:1320","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1320"}},{"id":"GHSA-g8hw-794c-4j9g","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-g8hw-794c-4j9g"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"CVE-2018-1271","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1271","name":"NVD"}},{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"RHSA-2018:2669","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2669"}},{"id":"RHSA-2018:2939","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2939"}},{"id":"cpujul2018-4258247","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"}},{"id":"cve-2018-1271","source":{"url":"https://pivotal.io/security/cve-2018-1271"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"securityfocus-msg-103699","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/103699"}}],"advisories":[{"title":"Red Hat Advisory RHSA-2018:1320","url":"https://access.redhat.com/errata/RHSA-2018:1320"},{"title":"GitHub Advisory GHSA-g8hw-794c-4j9g","url":"https://github.com/advisories/GHSA-g8hw-794c-4j9g"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"CVE-2018-1271","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1271"},{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Red Hat Advisory RHSA-2018:2669","url":"https://access.redhat.com/errata/RHSA-2018:2669"},{"title":"Red Hat Advisory RHSA-2018:2939","url":"https://access.redhat.com/errata/RHSA-2018:2939"},{"title":"Oracle Advisory cpujul2018-4258247","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"title":"cve-2018-1271","url":"https://pivotal.io/security/cve-2018-1271"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[22],"description":"Path Traversal in org.springframework:spring-core","detail":"# Path Traversal in org.springframework:spring-core Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.9,"vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"published":"2018-10-17T20:07:03","updated":"2024-03-17T05:16:56","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2024-22233","bom-ref":"CVE-2024-22233/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=6.1.3|<6.1.3","status":"affected"},{"version":"6.1.3","status":"unaffected"}]}],"recommendation":"Update to version 6.1.3.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22233","name":"NVD"},"references":[{"id":"ntap-20240614-0005","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20240614-0005"}},{"id":"CVE-2024-22233","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22233","name":"NVD"}},{"id":"cve-2024-22233","source":{"url":"https://spring.io/security/cve-2024-22233"}}],"advisories":[{"title":"NetApp Advisory ntap-20240614-0005","url":"https://security.netapp.com/advisory/ntap-20240614-0005"},{"title":"CVE-2024-22233","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22233"},{"title":"cve-2024-22233","url":"https://spring.io/security/cve-2024-22233"}],"cwes":[],"description":"Spring Framework server Web DoS Vulnerability","detail":"# Spring Framework server Web DoS Vulnerability In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web\u00a0and org.springframework.boot:spring-boot-starter-security\u00a0dependencies to meet all conditions.","ratings":[{"method":"CVSSv31","severity":"high","score":7.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"published":"2024-01-22T15:30:23","updated":"2025-02-13T19:33:11","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-1257","bom-ref":"CVE-2018-1257/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.0.6|<5.0.6","status":"affected"},{"version":"5.0.6","status":"unaffected"}]}],"recommendation":"Update to version 5.0.6 to resolve CVE-2018-1257 or update to version 6.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1257","name":"NVD"},"references":[{"id":"cpujan2019-5072801","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}},{"id":"RHSA-2018:1809","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:1809"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"CVE-2018-1257","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1257","name":"NVD"}},{"id":"GHSA-rcpf-vj53-7h2m","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-rcpf-vj53-7h2m"}},{"id":"cve-2018-1257","source":{"url":"https://pivotal.io/security/cve-2018-1257"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"cpuapr2019-5072813","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}},{"id":"securityfocus-msg-104260","source":{"name":"Security Focus Mailing List","url":"http://www.securityfocus.com/bid/104260"}},{"id":"RHSA-2018:3768","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:3768"}},{"id":"cpujul2019-5072835","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"}},{"id":"cpuoct2018-4428296","source":{"name":"Oracle Advisory","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}}],"advisories":[{"title":"Oracle Advisory cpujan2019-5072801","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"title":"Red Hat Advisory RHSA-2018:1809","url":"https://access.redhat.com/errata/RHSA-2018:1809"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"CVE-2018-1257","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1257"},{"title":"GitHub Advisory GHSA-rcpf-vj53-7h2m","url":"https://github.com/advisories/GHSA-rcpf-vj53-7h2m"},{"title":"cve-2018-1257","url":"https://pivotal.io/security/cve-2018-1257"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"Oracle Advisory cpuapr2019-5072813","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"title":"Red Hat Advisory RHSA-2018:3768","url":"https://access.redhat.com/errata/RHSA-2018:3768"},{"title":"Oracle Advisory cpujul2019-5072835","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"title":"Oracle Advisory cpuoct2018-4428296","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"cwes":[],"description":"Denial of Service in org.springframework:spring-core","detail":"# Denial of Service in org.springframework:spring-core Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.","ratings":[{"method":"CVSSv3","severity":"medium","score":6.5,"vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"published":"2018-10-17T20:02:20","updated":"2024-12-03T06:11:33","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2018-1199","bom-ref":"CVE-2018-1199/pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar","versions":[{"range":"vers:maven/!=4.3.14|<4.3.14","status":"affected"},{"version":"4.3.14","status":"unaffected"}]}],"recommendation":"Update to version 4.3.14 to resolve CVE-2018-1199 or update to version 6.1.3 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199","name":"NVD"},"references":[{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}},{"id":"apache-msg-dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E"}},{"id":"CVE-2018-1199","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199","name":"NVD"}},{"id":"GHSA-v596-fwhq-8x48","source":{"name":"GitHub Advisory","url":"https://github.com/advisories/GHSA-v596-fwhq-8x48"}},{"id":"apache-msg-4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E"}},{"id":"cve-2018-1199","source":{"url":"https://pivotal.io/security/cve-2018-1199"}},{"id":"RHSA-2018:2405","source":{"name":"Red Hat Advisory","url":"https://access.redhat.com/errata/RHSA-2018:2405"}},{"id":"apache-msg-ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"title":"CVE-2018-1199","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1199"},{"title":"GitHub Advisory GHSA-v596-fwhq-8x48","url":"https://github.com/advisories/GHSA-v596-fwhq-8x48"},{"title":"cve-2018-1199","url":"https://pivotal.io/security/cve-2018-1199"},{"title":"Red Hat Advisory RHSA-2018:2405","url":"https://access.redhat.com/errata/RHSA-2018:2405"}],"cwes":[20],"description":"Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core","detail":"# Improper Input Validation in org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.","ratings":[{"method":"CVSSv3","severity":"medium","score":5.3,"vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"published":"2018-10-17T20:01:54","updated":"2024-03-15T16:11:19","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-web@4.2.12.RELEASE?type=jar\", \"pkg:maven/org.springframework/spring-core@4.3.6.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 7 locations"}]},{"id":"CVE-2023-34034","bom-ref":"CVE-2023-34034/pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.6.12|<5.6.12","status":"affected"},{"version":"5.6.12","status":"unaffected"}]}],"recommendation":"Update to version 5.6.12 to resolve CVE-2023-34034 or update to version 5.8.5 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34034","name":"NVD"},"references":[{"id":"CVE-2023-34034","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34034","name":"NVD"}},{"id":"CVE-2023-34034","source":{"name":"Sonatype Advisory","url":"https://ossindex.sonatype.org/vulnerability/CVE-2023-34034"}},{"id":"ntap-20230814-0008","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20230814-0008"}},{"id":"cve-2023-34034","source":{"url":"https://spring.io/security/cve-2023-34034"}},{"id":"SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893","source":{"name":"Snyk Advisory","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893"}}],"advisories":[{"title":"CVE-2023-34034","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34034"},{"title":"Sonatype Advisory CVE-2023-34034","url":"https://ossindex.sonatype.org/vulnerability/CVE-2023-34034"},{"title":"NetApp Advisory ntap-20230814-0008","url":"https://security.netapp.com/advisory/ntap-20230814-0008"},{"title":"cve-2023-34034","url":"https://spring.io/security/cve-2023-34034"},{"title":"Snyk Advisory SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893","url":"https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893"}],"cwes":[281,284],"description":"Access Control Bypass in Spring Security","detail":"# Access Control Bypass in Spring Security Using \"**\" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"published":"2023-07-19T15:30:26","updated":"2024-10-28T19:33:10","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 3 locations"}]},{"id":"CVE-2023-34035","bom-ref":"CVE-2023-34035/pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar","affects":[{"ref":"pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar","versions":[{"range":"vers:maven/!=5.8.5|<5.8.5","status":"affected"},{"version":"5.8.5","status":"unaffected"}]}],"recommendation":"Update to version 5.8.5.","source":{"url":"https://spring.io/security/cve-2023-34035"},"references":[{"id":"cve-2023-34035","source":{"url":"https://spring.io/security/cve-2023-34035"}},{"id":"CVE-2023-34035","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34035","name":"NVD"}}],"advisories":[{"title":"cve-2023-34035","url":"https://spring.io/security/cve-2023-34035"},{"title":"CVE-2023-34035","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34035"}],"cwes":[863],"description":"Spring Security's authorization rules can be misconfigured when using multiple servlets","detail":"# Spring Security's authorization rules can be misconfigured when using multiple servlets Spring Security versions 5.8\u00a0prior to 5.8.5, 6.0\u00a0prior to 6.0.5,\u00a0and 6.1\u00a0prior to 6.1.2\u00a0could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String)\u00a0and multiple servlets, one of them being Spring MVC\u2019s DispatcherServlet.\u00a0(DispatcherServlet\u00a0is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.) Specifically, an application is vulnerable when all of the following are true: * Spring MVC is on the classpath * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC\u2019s DispatcherServlet) * The application uses requestMatchers(String)\u00a0to refer to endpoints that are not Spring MVC endpoints An application is not vulnerable if any of the following is true: * The application does not have Spring MVC on the classpath * The application secures no servlets other than Spring MVC\u2019s DispatcherServlet * The application uses requestMatchers(String)\u00a0only for Spring MVC endpoints","ratings":[{"method":"CVSSv31","severity":"high","score":7.3,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"published":"2023-07-18T18:30:36","updated":"2024-02-16T08:20:17","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.springframework.security/spring-security-config@4.2.12.RELEASE?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 3 locations"}]},{"id":"CVE-2021-37533","bom-ref":"CVE-2021-37533/pkg:maven/commons-net/commons-net@3.6?type=jar","affects":[{"ref":"pkg:maven/commons-net/commons-net@3.6?type=jar","versions":[{"range":"vers:maven/>=1.0.0|<=3.8.0|!=3.9.0","status":"affected"},{"version":"3.9.0","status":"unaffected"}]}],"recommendation":"Update to version 3.9.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37533","name":"NVD"},"references":[{"id":"debian-msg-msg00038","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html"}},{"id":"apache-msg-o6yn9r9x6s94v97264hmgol1sf48mvx7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7"}},{"id":"NET-711","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/NET-711"}},{"id":"openwall-oss-security-msg-2022-12-03-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2022/12/03/1"}},{"id":"CVE-2021-37533","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37533","name":"NVD"}},{"id":"dsa-5307","source":{"name":"Debian Advisory","url":"https://www.debian.org/security/2022/dsa-5307"}}],"advisories":[{"title":"Apache Advisory NET-711","url":"https://issues.apache.org/jira/browse/NET-711"},{"title":"CVE-2021-37533","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37533"},{"title":"Debian Advisory dsa-5307","url":"https://www.debian.org/security/2022/dsa-5307"}],"cwes":[20],"description":"Apache Commons Net vulnerable to information leakage via malicious server","detail":"# Apache Commons Net vulnerable to information leakage via malicious server Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.","ratings":[{"method":"CVSSv31","severity":"medium","score":6.5,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"published":"2022-12-03T15:30:26","updated":"2023-11-08T04:06:18","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/commons-net/commons-net@3.6?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2020-26945","bom-ref":"CVE-2020-26945/pkg:maven/org.mybatis/mybatis@3.4.6?type=jar","affects":[{"ref":"pkg:maven/org.mybatis/mybatis@3.4.6?type=jar","versions":[{"range":"vers:maven/>=2.3.5|<=3.5.5|!=3.5.6","status":"affected"},{"version":"3.5.6","status":"unaffected"}]}],"recommendation":"Update to version 3.5.6.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26945","name":"NVD"},"references":[{"id":"CVE-2020-26945","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26945","name":"NVD"}}],"advisories":[{"title":"CVE-2020-26945","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26945"}],"cwes":[502],"description":"\"Deserialization errors in MyBatis\"","detail":"# \"Deserialization errors in MyBatis\" MyBatis before 3.5.6 mishandles deserialization of object streams leading to potential cache poisoning.","ratings":[{"method":"CVSSv31","severity":"high","score":8.1,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2021-04-22T16:14:38","updated":"2023-11-08T04:03:20","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.mybatis.spring.boot/mybatis-spring-boot-starter@1.3.2?type=jar\", \"pkg:maven/org.mybatis/mybatis@3.4.6?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 3 locations"}]},{"id":"CVE-2020-13936","bom-ref":"CVE-2020-13936/pkg:maven/org.apache.velocity/velocity@1.7?type=jar","affects":[{"ref":"pkg:maven/org.apache.velocity/velocity@1.7?type=jar","versions":[{"range":"vers:maven/>=1.5|<=1.7|>=1.5|<=1.7","status":"affected"}]}],"recommendation":"","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13936","name":"NVD"},"references":[{"id":"apache-msg-r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E"}},{"id":"glsa-202107-52","source":{"name":"Gentoo Advisory","url":"https://security.gentoo.org/glsa/202107-52"}},{"id":"apache-msg-r293284c6806c73f51098001ea86a14271c39f72cd76af9e946d9d9ad","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r293284c6806c73f51098001ea86a14271c39f72cd76af9e946d9d9ad@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-reab5978b54a9f4c078402161e30a89c42807b198814acadbe6c862c7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/reab5978b54a9f4c078402161e30a89c42807b198814acadbe6c862c7@%3Cdev.ws.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"apache-msg-r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"}},{"id":"apache-msg-rd2a89e17e8a9b451ce655f1a34117752ea1d18a22ce580d8baa824fd","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd2a89e17e8a9b451ce655f1a34117752ea1d18a22ce580d8baa824fd@%3Ccommits.druid.apache.org%3E"}},{"id":"apache-msg-r0bc98e9cd080b4a13b905c571b9bed87e1a0878d44dbf21487c6cca4","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0bc98e9cd080b4a13b905c571b9bed87e1a0878d44dbf21487c6cca4@%3Cdev.santuario.apache.org%3E"}},{"id":"apache-msg-r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a@%3Cuser.velocity.apache.org%3E"}},{"id":"apache-msg-r39de20c7e9c808b1f96790875d33e58c9c0aabb44fd9227e7b3dc5da","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r39de20c7e9c808b1f96790875d33e58c9c0aabb44fd9227e7b3dc5da@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-r3ea4c4c908505b20a4c268330dfe7188b90c84dcf777728d02068ae6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3ea4c4c908505b20a4c268330dfe7188b90c84dcf777728d02068ae6@%3Cannounce.apache.org%3E"}},{"id":"apache-msg-r4cd59453b65d4ac290fcb3b71fdf32b4f1f8989025e89558deb5a245","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4cd59453b65d4ac290fcb3b71fdf32b4f1f8989025e89558deb5a245@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E"}},{"id":"apache-msg-rf7d369de88dc88a1347006a3323b3746d849234db40a8edfd5ebc436","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rf7d369de88dc88a1347006a3323b3746d849234db40a8edfd5ebc436@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-re8e7482fe54d289fc0229e61cc64947b63b12c3c312e9f25bf6f3b8c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re8e7482fe54d289fc0229e61cc64947b63b12c3c312e9f25bf6f3b8c@%3Cdev.ws.apache.org%3E"}},{"id":"openwall-oss-security-msg-2021-03-10-1","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2021/03/10/1"}},{"id":"apache-msg-r7f209b837217d2a0fe5977fb692e7f15d37fa5de8214bcdc4c21d9a7","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r7f209b837217d2a0fe5977fb692e7f15d37fa5de8214bcdc4c21d9a7@%3Ccommits.turbine.apache.org%3E"}},{"id":"debian-msg-msg00019","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00019.html"}},{"id":"CVE-2020-13936","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13936","name":"NVD"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-rd7e865c87f9043c21d9c1fd9d4df866061d9a08cfc322771160d8058","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd7e865c87f9043c21d9c1fd9d4df866061d9a08cfc322771160d8058@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-re641197d204765130618086238c73dd2ce5a3f94b33785b587d72726","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re641197d204765130618086238c73dd2ce5a3f94b33785b587d72726@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-r17cb932fab14801b14e5b97a7f05192f4f366ef260c10d4a8dba8ac9","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r17cb932fab14801b14e5b97a7f05192f4f366ef260c10d4a8dba8ac9@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-rbee7270556f4172322936b5ecc9fabf0c09f00d4fa56c9de1963c340","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbee7270556f4172322936b5ecc9fabf0c09f00d4fa56c9de1963c340@%3Cdev.ws.apache.org%3E"}},{"id":"apache-msg-r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E"}}],"advisories":[{"title":"Gentoo Advisory glsa-202107-52","url":"https://security.gentoo.org/glsa/202107-52"},{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"CVE-2020-13936","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13936"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}],"cwes":[20],"description":"Sandbox Bypass in Apache Velocity Engine","detail":"# Sandbox Bypass in Apache Velocity Engine An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.","ratings":[{"method":"CVSSv31","severity":"high","score":8.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-01-06T20:32:36","updated":"2024-03-15T05:20:53","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.velocity/velocity@1.7?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2019-12415","bom-ref":"CVE-2019-12415/pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar","affects":[{"ref":"pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar","versions":[{"range":"vers:maven/>=3.0-FINAL|<=4.1.0|!=4.1.1","status":"affected"},{"version":"4.1.1","status":"unaffected"}]}],"recommendation":"Update to version 4.1.1.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12415","name":"NVD"},"references":[{"id":"apache-msg-895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007@%3Cuser.tika.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"cpuapr2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}},{"id":"cpujan2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}},{"id":"CVE-2019-12415","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12415","name":"NVD"}},{"id":"apache-msg-2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c@%3Cuser.tika.apache.org%3E"}},{"id":"apache-msg-d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c@%3Cuser.tika.apache.org%3E"}},{"id":"apache-msg-r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"}},{"id":"cpujan2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2021.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"cpujul2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}},{"id":"apache-msg-13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"cpujul2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}}],"advisories":[{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpuapr2020","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"title":"Oracle Advisory cpujan2020","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"title":"CVE-2019-12415","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12415"},{"title":"Oracle Advisory cpujan2021","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpujul2021","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Oracle Advisory cpujul2020","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"cwes":[611],"description":"Improper Restriction of XML External Entity Reference in Apache POI ","detail":"# Improper Restriction of XML External Entity Reference in Apache POI In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.","ratings":[{"method":"CVSSv31","severity":"medium","score":5.5,"vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"published":"2022-05-24T16:59:46","updated":"2023-11-08T04:01:04","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.poi/poi@3.10-FINAL?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 1 locations"}]},{"id":"CVE-2025-31672","bom-ref":"CVE-2025-31672/pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar","affects":[{"ref":"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar","versions":[{"range":"vers:maven/>=3.5-FINAL|<=5.3.0|!=5.4.0","status":"affected"},{"version":"5.4.0","status":"unaffected"}]}],"recommendation":"Update to version 5.4.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-31672","name":"NVD"},"references":[{"id":"apache-msg-k14w8vcjqy4h34hh5kzldko78kpylkq5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/k14w8vcjqy4h34hh5kzldko78kpylkq5"}},{"id":"CVE-2025-31672","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-31672","name":"NVD"}},{"id":"openwall-oss-security-msg-2025-04-08-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2025/04/08/2"}},{"id":"show_bug","source":{"name":"Apache Advisory","url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=69620"}}],"advisories":[{"title":"CVE-2025-31672","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-31672"},{"title":"Apache Advisory show_bug","url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=69620"}],"cwes":[20],"description":"Apache POI OOXML Vulnerable to Improper Input Validation in OOXML File Parsing","detail":"# Apache POI OOXML Vulnerable to Improper Input Validation in OOXML File Parsing Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.","ratings":[{"method":"CVSSv4","severity":"medium","score":6.9,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"}],"published":"2025-04-09T12:30:24","updated":"2025-04-18T19:03:06","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 2 locations"}]},{"id":"CVE-2021-23926","bom-ref":"CVE-2021-23926/pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar","affects":[{"ref":"pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar","versions":[{"range":"vers:maven/>=2.2.0|<=2.6.0|!=3.0.0","status":"affected"},{"version":"3.0.0","status":"unaffected"}]}],"recommendation":"Update to version 3.0.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23926","name":"NVD"},"references":[{"id":"ntap-20210513-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20210513-0004"}},{"id":"debian-msg-msg00024","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00024.html"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1@%3Cjava-dev.axis.apache.org%3E"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"CVE-2021-23926","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23926","name":"NVD"}},{"id":"XMLBEANS-517","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/XMLBEANS-517"}},{"id":"apache-msg-r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed@%3Cjava-dev.axis.apache.org%3E"}}],"advisories":[{"title":"NetApp Advisory ntap-20210513-0004","url":"https://security.netapp.com/advisory/ntap-20210513-0004"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"CVE-2021-23926","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23926"},{"title":"Apache Advisory XMLBEANS-517","url":"https://issues.apache.org/jira/browse/XMLBEANS-517"}],"cwes":[776],"description":"Improper Restriction of Recursive Entity References in Apache XMLBeans","detail":"# Improper Restriction of Recursive Entity References in Apache XMLBeans The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.","ratings":[{"method":"CVSSv31","severity":"critical","score":9.1,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"published":"2021-06-16T17:37:11","updated":"2024-02-19T05:31:48","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/org.apache.poi/poi-ooxml@3.9?type=jar\", \"pkg:maven/org.apache.poi/poi-ooxml-schemas@3.9?type=jar\", \"pkg:maven/org.apache.xmlbeans/xmlbeans@2.3.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Direct dependency"}]},{"id":"CVE-2022-23640","bom-ref":"CVE-2022-23640/pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar","affects":[{"ref":"pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar","versions":[{"range":"vers:maven/>=0.2.3|<=2.0.0|!=2.1.0","status":"affected"},{"version":"2.1.0","status":"unaffected"}]}],"recommendation":"Update to version 2.1.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23640","name":"NVD"},"references":[{"id":"GHSA-xvm2-9xvc-hx7f","source":{"name":"GitHub Advisory","url":"https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f"}},{"id":"CVE-2022-23640","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23640","name":"NVD"}}],"advisories":[{"title":"GitHub Advisory GHSA-xvm2-9xvc-hx7f","url":"https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f"},{"title":"CVE-2022-23640","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23640"}],"cwes":[611,776],"description":"Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer","detail":"# Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer ### Impact Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues. ### Patches Upgrade to version 2.1.0. ### Workarounds No known workaround. ### References https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73 ### For more information If you have any questions or comments about this advisory: * Open an issue in [monitorjbl/excel-streaming-reader](https://github.com/monitorjbl/excel-streaming-reader)","ratings":[{"method":"CVSSv31","severity":"critical","score":9.8,"vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"published":"2022-03-02T21:30:54","updated":"2024-02-16T08:13:13","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/com.monitorjbl/xlsx-streamer@2.0.0?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"true"},{"name":"depscan:insights","value":"Endpoint-Reachable\\nUsed in 1 locations"}]},{"id":"CVE-2024-47554","bom-ref":"CVE-2024-47554/pkg:maven/commons-io/commons-io@2.5?type=jar","affects":[{"ref":"pkg:maven/commons-io/commons-io@2.5?type=jar","versions":[{"range":"vers:maven/!=2.14.0|<2.14.0","status":"affected"},{"version":"2.14.0","status":"unaffected"}]}],"recommendation":"Update to version 2.14.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47554","name":"NVD"},"references":[{"id":"CVE-2024-47554","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47554","name":"NVD"}},{"id":"openwall-oss-security-msg-2024-10-03-2","source":{"name":"Openwall Mailing List","url":"http://www.openwall.com/lists/oss-security/2024/10/03/2"}},{"id":"apache-msg-6ozr91rr9cj5lm0zyhv30bsp317hk5z1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1"}},{"id":"ntap-20250131-0010","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20250131-0010"}}],"advisories":[{"title":"CVE-2024-47554","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47554"},{"title":"NetApp Advisory ntap-20250131-0010","url":"https://security.netapp.com/advisory/ntap-20250131-0010"}],"cwes":[400],"description":"Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader","detail":"# Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The `org.apache.commons.io.input.XmlStreamReader` class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.","ratings":[{"method":"CVSSv4","severity":"high","score":8.7,"vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}],"published":"2024-10-03T12:30:48","updated":"2025-01-31T15:38:02","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/commons-io/commons-io@2.5?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2021-29425","bom-ref":"CVE-2021-29425/pkg:maven/commons-io/commons-io@2.5?type=jar","affects":[{"ref":"pkg:maven/commons-io/commons-io@2.5?type=jar","versions":[{"range":"vers:maven/>=0.1|<=2.6|!=2.7","status":"affected"},{"version":"2.7","status":"unaffected"}]}],"recommendation":"Update to version 2.7 to resolve CVE-2021-29425 or update to version 2.14.0 to resolve additional vulnerabilities for this package.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29425","name":"NVD"},"references":[{"id":"apache-msg-ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E"}},{"id":"apache-msg-r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E"}},{"id":"apache-msg-r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E"}},{"id":"cpuapr2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}},{"id":"IO-556","source":{"name":"Apache Advisory","url":"https://issues.apache.org/jira/browse/IO-556"}},{"id":"apache-msg-raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}},{"id":"apache-msg-r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E"}},{"id":"apache-msg-rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E"}},{"id":"apache-msg-r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E"}},{"id":"apache-msg-r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E"}},{"id":"apache-msg-r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E"}},{"id":"apache-msg-r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E"}},{"id":"apache-msg-r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"CVE-2021-29425","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29425","name":"NVD"}},{"id":"apache-msg-rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E"}},{"id":"apache-msg-r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E"}},{"id":"apache-msg-r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"ntap-20220210-0004","source":{"name":"NetApp Advisory","url":"https://security.netapp.com/advisory/ntap-20220210-0004"}},{"id":"debian-msg-msg00016","source":{"name":"Debian Mailing List","url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html"}},{"id":"apache-msg-r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E"}},{"id":"apache-msg-rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"apache-msg-r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E"}},{"id":"apache-msg-r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"apache-msg-r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E"}},{"id":"apache-msg-rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E"}},{"id":"cpuoct2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}},{"id":"apache-msg-r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E"}},{"id":"apache-msg-r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E"}}],"advisories":[{"title":"Oracle Advisory cpuapr2022","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"title":"Apache Advisory IO-556","url":"https://issues.apache.org/jira/browse/IO-556"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"title":"CVE-2021-29425","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29425"},{"title":"NetApp Advisory ntap-20220210-0004","url":"https://security.netapp.com/advisory/ntap-20220210-0004"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpuoct2021","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"cwes":[20,22],"description":"Path Traversal and Improper Input Validation in Apache Commons IO","detail":"# Path Traversal and Improper Input Validation in Apache Commons IO In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like \"//../foo\", or \"\\\\..\\foo\", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus \"limited\" path traversal), if the calling code would use the result to construct a path value.","ratings":[{"method":"CVSSv31","severity":"medium","score":4.8,"vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"published":"2021-04-26T16:04:00","updated":"2024-03-12T05:31:30","analysis":{"state":"in_triage","detail":"Dependency Tree: [\"pkg:maven/sec/java-sec-code@1.0.0?type=jar\", \"pkg:maven/commons-io/commons-io@2.5?type=jar\"]"},"properties":[{"name":"depscan:prioritized","value":"false"},{"name":"depscan:insights","value":"Used in 1 locations"}]},{"id":"CVE-2019-17495","bom-ref":"CVE-2019-17495/pkg:maven/io.springfox/springfox-swagger-ui@2.9.2?type=jar","affects":[{"ref":"pkg:maven/io.springfox/springfox-swagger-ui@2.9.2?type=jar","versions":[{"range":"vers:maven/>=2.0.1|<=2.9.2|!=2.10.0","status":"affected"},{"version":"2.10.0","status":"unaffected"}]}],"recommendation":"Update to version 2.10.0.","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17495","name":"NVD"},"references":[{"id":"apache-msg-r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E"}},{"id":"CVE-2019-17495","source":{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17495","name":"NVD"}},{"id":"apache-msg-r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf@%3Ccommits.airflow.apache.org%3E"}},{"id":"CVE-2019-17495","source":{"url":"https://security.snyk.io/vuln/maven?search=CVE-2019-17495"}},{"id":"cpujan2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}},{"id":"cpuoct2020","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"}},{"id":"apache-msg-ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f@%3Ccommits.airflow.apache.org%3E"}},{"id":"apache-msg-r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E"}},{"id":"apache-msg-r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f","source":{"name":"Apache Mailing List","url":"https://lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f@%3Ccommits.airflow.apache.org%3E"}},{"id":"cpuApr2021","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"}},{"id":"cpujul2022","source":{"name":"Oracle Advisory","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}}],"advisories":[{"title":"CVE-2019-17495","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17495"},{"title":"CVE-2019-17495","url":"https://security.snyk.io/vuln/maven?search=CVE-2019-17495"},{"title":"Oracle Advisory cpujan2022","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"title":"Oracle Advisory cpuoct2020","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"title":"Oracle Advisory cpuApr2021","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"title":"Oracle Advisory cpujul2022","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"cwes":[352,79],"description":"Cross-site scripting in Swagger-UI","detail":"# Cross-site scripting in Swagger-UI A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that