Vulnerabilities

2 via 2 paths

Dependencies

43

Source

GitHub

Commit

af1303ad

Find, fix and prevent vulnerabilities in your code.

Issue type
  • 2
  • 2
Severity
  • 1
  • 3
Status
  • 4
  • 0
  • 0

high severity

Uncontrolled Recursion

  • Vulnerable module: org.apache.commons:commons-lang3
  • Introduced through: org.cyclonedx:cyclonedx-core-java@11.0.0

Detailed paths

  • Introduced through: cf-toolsuite/spring-boot-starter-runtime-metadata@cf-toolsuite/spring-boot-starter-runtime-metadata#af1303ad5247818918004ef9f897e323a03bea51 org.cyclonedx:cyclonedx-core-java@11.0.0 org.apache.commons:commons-lang3@3.17.0
    Remediation: Upgrade to org.cyclonedx:cyclonedx-core-java@11.0.0.

Overview

Affected versions of this package are vulnerable to Uncontrolled Recursion via the ClassUtils.getClass function. An attacker can cause the application to terminate unexpectedly by providing excessively long input values.

Remediation

Upgrade org.apache.commons:commons-lang3 to version 3.18.0 or higher.

References

medium severity
new

External Initialization of Trusted Variables or Data Stores

  • Vulnerable module: ch.qos.logback:logback-core
  • Introduced through: org.springframework.boot:spring-boot-starter-actuator@3.5.6

Detailed paths

  • Introduced through: cf-toolsuite/spring-boot-starter-runtime-metadata@cf-toolsuite/spring-boot-starter-runtime-metadata#af1303ad5247818918004ef9f897e323a03bea51 org.springframework.boot:spring-boot-starter-actuator@3.5.6 org.springframework.boot:spring-boot-starter@3.5.6 org.springframework.boot:spring-boot-starter-logging@3.5.6 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18

Overview

ch.qos.logback:logback-core is a logback-core module.

Affected versions of this package are vulnerable to External Initialization of Trusted Variables or Data Stores via the conditional processing of the logback.xml configuration file when both the Janino library and Spring Framework are present on the class path. An attacker can execute arbitrary code by compromising an existing configuration file or injecting a malicious environment variable before program execution. This is only exploitable if the attacker has write access to a configuration file or can set a malicious environment variable.

Remediation

Upgrade ch.qos.logback:logback-core to version 1.5.19 or higher.

References

medium severity

Dual license: EPL-1.0, LGPL-2.1

  • Module: ch.qos.logback:logback-classic
  • Introduced through: org.springframework.boot:spring-boot-starter-actuator@3.5.6

Detailed paths

  • Introduced through: cf-toolsuite/spring-boot-starter-runtime-metadata@cf-toolsuite/spring-boot-starter-runtime-metadata#af1303ad5247818918004ef9f897e323a03bea51 org.springframework.boot:spring-boot-starter-actuator@3.5.6 org.springframework.boot:spring-boot-starter@3.5.6 org.springframework.boot:spring-boot-starter-logging@3.5.6 ch.qos.logback:logback-classic@1.5.18

Dual license: EPL-1.0, LGPL-2.1

medium severity

Dual license: EPL-1.0, LGPL-2.1

  • Module: ch.qos.logback:logback-core
  • Introduced through: org.springframework.boot:spring-boot-starter-actuator@3.5.6

Detailed paths

  • Introduced through: cf-toolsuite/spring-boot-starter-runtime-metadata@cf-toolsuite/spring-boot-starter-runtime-metadata#af1303ad5247818918004ef9f897e323a03bea51 org.springframework.boot:spring-boot-starter-actuator@3.5.6 org.springframework.boot:spring-boot-starter@3.5.6 org.springframework.boot:spring-boot-starter-logging@3.5.6 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18

Dual license: EPL-1.0, LGPL-2.1