Vulnerabilities

4 via 7 paths

Dependencies

49

Source

GitHub

Commit

afda8a49

Find, fix and prevent vulnerabilities in your code.

Issue type
  • 4
  • 14
Severity
  • 6
  • 12
Status
  • 18
  • 0
  • 0

high severity

AGPL-3.0 license

  • Module: org.cryptomator:cryptofs
  • Introduced through: org.cryptomator:cryptofs@2.9.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:cryptofs@2.9.0

AGPL-3.0 license

high severity

AGPL-3.0 license

  • Module: org.cryptomator:cryptolib
  • Introduced through: org.cryptomator:cryptolib@2.2.1

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:cryptolib@2.2.1

AGPL-3.0 license

high severity

AGPL-3.0 license

  • Module: org.cryptomator:fuse-nio-adapter
  • Introduced through: org.cryptomator:fuse-nio-adapter@5.1.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0

AGPL-3.0 license

high severity

AGPL-3.0 license

  • Module: org.cryptomator:integrations-api
  • Introduced through: org.cryptomator:integrations-api@1.7.0, org.cryptomator:fuse-nio-adapter@5.1.0 and others

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:integrations-api@1.7.0
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:integrations-api@1.7.0
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:webdav-nio-adapter@3.0.0 org.cryptomator:integrations-api@1.7.0

AGPL-3.0 license

high severity

AGPL-3.0 license

  • Module: org.cryptomator:webdav-nio-adapter
  • Introduced through: org.cryptomator:webdav-nio-adapter@3.0.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:webdav-nio-adapter@3.0.0

AGPL-3.0 license

high severity

AGPL-3.0 license

  • Module: org.cryptomator:webdav-nio-adapter-servlet
  • Introduced through: org.cryptomator:webdav-nio-adapter@3.0.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:webdav-nio-adapter@3.0.0 org.cryptomator:webdav-nio-adapter-servlet@1.2.10

AGPL-3.0 license

medium severity

Uncontrolled Recursion

  • Vulnerable module: com.nimbusds:nimbus-jose-jwt
  • Introduced through: com.nimbusds:nimbus-jose-jwt@9.37.3

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 com.nimbusds:nimbus-jose-jwt@9.37.3
    Remediation: Upgrade to com.nimbusds:nimbus-jose-jwt@9.37.4.

Overview

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Uncontrolled Recursion due to the improper handling JWT claim sets containing deeply nested JSON objects. An attacker can cause application downtime or resource exhaustion by submitting a specially crafted JWT with excessive nesting.

Note:

This issue only affects nimbus-jose-jwt, not Gson because the Connect2id product could have checked the JSON object nesting depth, regardless of what limits (if any) were imposed by Gson.

PoC

import com.nimbusds.jwt.JWTClaimsSet;
import java.text.ParseException;
import java.util.HashMap;
import java.util.Map;

public class Test {
    // This builds a claimset with a deeply nested map, which could theoretically be supplied by a client.
    // If the JWT is serialized into JSON (for example, in logging or debugging), it can cause a StackOverflowError.
    public static void main(String[] args) throws ParseException {        
        Map<String, Object> nestedMap = new HashMap<>();
        Map<String, Object> currentLevel = nestedMap;

        for (int i = 0; i < 5000; i++) {
            Map<String, Object> nextLevel = new HashMap<>();
            currentLevel.put("", nextLevel);
            currentLevel = nextLevel;
        }

        JWTClaimsSet claimSet = JWTClaimsSet.parse(nestedMap);

        // This will cause a StackOverflowError due to excessive recursion in GSON's serialization
        claimSet.toString();
    }
}

Remediation

Upgrade com.nimbusds:nimbus-jose-jwt to version 9.37.4, 10.0.2 or higher.

References

medium severity

Improper Validation of Syntactic Correctness of Input

  • Vulnerable module: org.eclipse.jetty:jetty-http
  • Introduced through: org.cryptomator:webdav-nio-adapter@3.0.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:webdav-nio-adapter@3.0.0 org.eclipse.jetty:jetty-server@10.0.26 org.eclipse.jetty:jetty-http@10.0.26
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:webdav-nio-adapter@3.0.0 org.eclipse.jetty:jetty-servlet@10.0.26 org.eclipse.jetty:jetty-security@10.0.26 org.eclipse.jetty:jetty-server@10.0.26 org.eclipse.jetty:jetty-http@10.0.26

Overview

org.eclipse.jetty:jetty-http is an is a http module for jetty server.

Affected versions of this package are vulnerable to Improper Validation of Syntactic Correctness of Input via the HttpURI class due to insufficient validation on the authority segment of a URI. An attacker can manipulate the URI parsing to redirect requests or initiate server-side requests to unintended destinations by supplying malformed URIs that bypass validation checks.

Notes:

  1. This is only exploitable if the application uses decoded user data as encoded URIs in conjunction with the HttpURI class used directly;

  2. The Jetty usage of the HttpURI class is not vulnerable.

Workaround

This vulnerability can be mitigated by not passing decoded user data as encoded URIs to any URI class/method, including HttpURI.

PoC

http://browser.check &@vulndetector.com/
http://browser.check #@vulndetector.com/
http://browser.check?@vulndetector.com/
http://browser.check#@vulndetector.com/
http://vulndetector.com\\/

Remediation

Upgrade org.eclipse.jetty:jetty-http to version 9.4.57.v20241219, 12.0.12 or higher.

References

medium severity

Improper Validation of Syntactic Correctness of Input

  • Vulnerable module: org.eclipse.jetty:jetty-server
  • Introduced through: org.cryptomator:webdav-nio-adapter@3.0.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:webdav-nio-adapter@3.0.0 org.eclipse.jetty:jetty-server@10.0.26
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:webdav-nio-adapter@3.0.0 org.eclipse.jetty:jetty-servlet@10.0.26 org.eclipse.jetty:jetty-security@10.0.26 org.eclipse.jetty:jetty-server@10.0.26

Overview

org.eclipse.jetty:jetty-server is a lightweight highly scalable java based web server and servlet engine.

Affected versions of this package are vulnerable to Improper Validation of Syntactic Correctness of Input via the HttpURI class due to insufficient validation on the authority segment of a URI. An attacker can manipulate the URI parsing to redirect requests or initiate server-side requests to unintended destinations by supplying malformed URIs that bypass validation checks.

Notes:

  1. This is only exploitable if the application uses decoded user data as encoded URIs in conjunction with the HttpURI class used directly;

  2. The Jetty usage of the HttpURI class is not vulnerable.

Workaround

This vulnerability can be mitigated by not passing decoded user data as encoded URIs to any URI class/method, including HttpURI.

PoC

http://browser.check &@vulndetector.com/
http://browser.check #@vulndetector.com/
http://browser.check?@vulndetector.com/
http://browser.check#@vulndetector.com/
http://vulndetector.com\\/

Remediation

Upgrade org.eclipse.jetty:jetty-server to version 9.4.57.v20241219, 12.0.12 or higher.

References

medium severity
new

External Initialization of Trusted Variables or Data Stores

  • Vulnerable module: ch.qos.logback:logback-core
  • Introduced through: ch.qos.logback:logback-core@1.5.18 and ch.qos.logback:logback-classic@1.5.18

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 ch.qos.logback:logback-core@1.5.18
    Remediation: Upgrade to ch.qos.logback:logback-core@1.5.19.
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18
    Remediation: Upgrade to ch.qos.logback:logback-classic@1.5.19.

Overview

ch.qos.logback:logback-core is a logback-core module.

Affected versions of this package are vulnerable to External Initialization of Trusted Variables or Data Stores via the conditional processing of the logback.xml configuration file when both the Janino library and Spring Framework are present on the class path. An attacker can execute arbitrary code by compromising an existing configuration file or injecting a malicious environment variable before program execution. This is only exploitable if the attacker has write access to a configuration file or can set a malicious environment variable.

Remediation

Upgrade ch.qos.logback:logback-core to version 1.5.19 or higher.

References

medium severity

Dual license: EPL-1.0, LGPL-2.1

  • Module: ch.qos.logback:logback-classic
  • Introduced through: ch.qos.logback:logback-classic@1.5.18

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 ch.qos.logback:logback-classic@1.5.18

Dual license: EPL-1.0, LGPL-2.1

medium severity

Dual license: EPL-1.0, LGPL-2.1

  • Module: ch.qos.logback:logback-core
  • Introduced through: ch.qos.logback:logback-core@1.5.18 and ch.qos.logback:logback-classic@1.5.18

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 ch.qos.logback:logback-core@1.5.18
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 ch.qos.logback:logback-classic@1.5.18 ch.qos.logback:logback-core@1.5.18

Dual license: EPL-1.0, LGPL-2.1

medium severity

LGPL-3.0 license

  • Module: org.cryptomator:jfuse
  • Introduced through: org.cryptomator:fuse-nio-adapter@5.1.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3

LGPL-3.0 license

medium severity

LGPL-3.0 license

  • Module: org.cryptomator:jfuse-api
  • Introduced through: org.cryptomator:fuse-nio-adapter@5.1.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3 org.cryptomator:jfuse-api@0.7.3
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3 org.cryptomator:jfuse-linux-aarch64@0.7.3 org.cryptomator:jfuse-api@0.7.3
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3 org.cryptomator:jfuse-linux-amd64@0.7.3 org.cryptomator:jfuse-api@0.7.3
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3 org.cryptomator:jfuse-mac@0.7.3 org.cryptomator:jfuse-api@0.7.3
  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3 org.cryptomator:jfuse-win@0.7.3 org.cryptomator:jfuse-api@0.7.3

LGPL-3.0 license

medium severity

LGPL-3.0 license

  • Module: org.cryptomator:jfuse-linux-aarch64
  • Introduced through: org.cryptomator:fuse-nio-adapter@5.1.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3 org.cryptomator:jfuse-linux-aarch64@0.7.3

LGPL-3.0 license

medium severity

LGPL-3.0 license

  • Module: org.cryptomator:jfuse-linux-amd64
  • Introduced through: org.cryptomator:fuse-nio-adapter@5.1.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3 org.cryptomator:jfuse-linux-amd64@0.7.3

LGPL-3.0 license

medium severity

LGPL-3.0 license

  • Module: org.cryptomator:jfuse-mac
  • Introduced through: org.cryptomator:fuse-nio-adapter@5.1.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3 org.cryptomator:jfuse-mac@0.7.3

LGPL-3.0 license

medium severity

LGPL-3.0 license

  • Module: org.cryptomator:jfuse-win
  • Introduced through: org.cryptomator:fuse-nio-adapter@5.1.0

Detailed paths

  • Introduced through: cryptomator/cryptomator@cryptomator/cryptomator#afda8a4981a9a6b861a315e5562ddf14b4af6538 org.cryptomator:fuse-nio-adapter@5.1.0 org.cryptomator:jfuse@0.7.3 org.cryptomator:jfuse-win@0.7.3

LGPL-3.0 license