Find, fix and prevent vulnerabilities in your code.
high severity
- Vulnerable module: org.hibernate:hibernate-core
- Introduced through: org.hibernate:hibernate-core@4.3.11.Final
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.hibernate:hibernate-core@4.3.11.FinalRemediation: Upgrade to org.hibernate:hibernate-core@5.3.38.Final.
Overview
org.hibernate:hibernate-core is a library providing Object/Relational Mapping (ORM) support to applications, libraries, and frameworks.
Affected versions of this package are vulnerable to SQL Injection via the InlineIdsOrClauseBuilder component when unsanitized non-alphanumeric characters are present in the ID column. An attacker can access sensitive information and manipulate or delete data by injecting crafted input.
Note:
This is only exploitable if the user is able to set their own ids and those ids allow non-alphanumeric characters and the application is using InlineIdsOrClauseBuilder.
Remediation
Upgrade org.hibernate:hibernate-core to version 5.3.38 or higher.
References
high severity
- Vulnerable module: org.hibernate:hibernate-core
- Introduced through: org.hibernate:hibernate-core@4.3.11.Final
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.hibernate:hibernate-core@4.3.11.FinalRemediation: Upgrade to org.hibernate:hibernate-core@5.4.24.Final.
Overview
org.hibernate:hibernate-core is a library providing Object/Relational Mapping (ORM) support to applications, libraries, and frameworks.
Affected versions of this package are vulnerable to SQL Injection. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
Remediation
Upgrade org.hibernate:hibernate-core to version 5.4.24.Final or higher.
References
high severity
- Vulnerable module: org.hibernate:hibernate-core
- Introduced through: org.hibernate:hibernate-core@4.3.11.Final
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.hibernate:hibernate-core@4.3.11.FinalRemediation: Upgrade to org.hibernate:hibernate-core@5.3.18.Final.
Overview
org.hibernate:hibernate-core is a library providing Object/Relational Mapping (ORM) support to applications, libraries, and frameworks.
Affected versions of this package are vulnerable to SQL Injection. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.
Remediation
Upgrade org.hibernate:hibernate-core to version 5.3.18.Final, 5.4.18.Final or higher.
References
high severity
- Vulnerable module: dom4j:dom4j
- Introduced through: org.hibernate:hibernate-core@4.3.11.Final
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.hibernate:hibernate-core@4.3.11.Final › dom4j:dom4j@1.6.1
Overview
dom4j:dom4j is a flexible XML framework for Java. Note: this artifact has been deprecated for org.dom4j:dom4j.
Affected versions of this package are vulnerable to XML External Entity (XXE) Injection due to improper validation of the QName inputs.
Details
XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.
Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.
For example, below is a sample XML document, containing an XML element- username.
<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<username>John</username>
</xml>
An external XML entity - xxe, is defined using a system identifier and present within a DOCTYPE header. These entities can access local or remote content. For example the below code contains an external XML entity that would fetch the content of /etc/passwd and display it to the user rendered by username.
<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
<!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
<username>&xxe;</username>
</xml>
Other XXE Injection attacks can access local resources that may not stop returning data, possibly impacting application availability and leading to Denial of Service.
Remediation
There is no fixed version for dom4j:dom4j.
References
high severity
- Vulnerable module: dom4j:dom4j
- Introduced through: org.hibernate:hibernate-core@4.3.11.Final
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.hibernate:hibernate-core@4.3.11.Final › dom4j:dom4j@1.6.1
Overview
dom4j:dom4j is a flexible XML framework for Java. Note: this artifact has been deprecated for org.dom4j:dom4j.
Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. By using the default SaxReader() provided by Dom4J, external DTDs and External Entities are allowed, resulting in a possible XXE.
Details
XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.
Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.
For example, below is a sample XML document, containing an XML element- username.
<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<username>John</username>
</xml>
An external XML entity - xxe, is defined using a system identifier and present within a DOCTYPE header. These entities can access local or remote content. For example the below code contains an external XML entity that would fetch the content of /etc/passwd and display it to the user rendered by username.
<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
<!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
<username>&xxe;</username>
</xml>
Other XXE Injection attacks can access local resources that may not stop returning data, possibly impacting application availability and leading to Denial of Service.
Remediation
There is no fixed version for dom4j:dom4j.
References
medium severity
- Vulnerable module: org.eclipse.angus:angus-mail
- Introduced through: org.glassfish.jersey.media:jersey-media-moxy@4.0.2
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.glassfish.jersey.media:jersey-media-moxy@4.0.2 › org.eclipse.persistence:org.eclipse.persistence.moxy@5.0.0-B09 › org.eclipse.angus:angus-mail@2.0.3
Overview
org.eclipse.angus:angus-mail is an Angus Mail Provider.
Affected versions of this package are vulnerable to Improper Neutralization via the handling of SMTP message input. An attacker can inject arbitrary SMTP commands by supplying specially crafted input containing carriage return and line feed characters.
Note:
This is only exploitable if the provided dependency org.eclipse.angus:smtp is used.
Remediation
Upgrade org.eclipse.angus:angus-mail to version 2.0.4 or higher.
References
medium severity
- Module: junit:junit
- Introduced through: org.glassfish.jersey.media:jersey-media-moxy@4.0.2
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.glassfish.jersey.media:jersey-media-moxy@4.0.2 › jakarta.json.bind:jakarta.json.bind-api@3.0.1 › junit:junit@4.13.2
EPL-1.0 license
medium severity
- Module: org.hibernate:hibernate-core
- Introduced through: org.hibernate:hibernate-core@4.3.11.Final
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.hibernate:hibernate-core@4.3.11.Final
LGPL-2.0 license
medium severity
- Module: org.hibernate.common:hibernate-commons-annotations
- Introduced through: org.hibernate:hibernate-core@4.3.11.Final
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.hibernate:hibernate-core@4.3.11.Final › org.hibernate.common:hibernate-commons-annotations@4.0.5.Final
LGPL-2.1 license
medium severity
- Module: org.hibernate.javax.persistence:hibernate-jpa-2.1-api
- Introduced through: org.hibernate:hibernate-core@4.3.11.Final
Detailed paths
-
Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 › org.hibernate:hibernate-core@4.3.11.Final › org.hibernate.javax.persistence:hibernate-jpa-2.1-api@1.0.0.Final
EPL-1.0 license