Vulnerabilities

6 via 6 paths

Dependencies

34

Source

GitHub

Commit

e392abf8

Find, fix and prevent vulnerabilities in your code.

Issue type
  • 6
  • 4
Severity
  • 5
  • 5
Status
  • 10
  • 0
  • 0

high severity

SQL Injection

  • Vulnerable module: org.hibernate:hibernate-core
  • Introduced through: org.hibernate:hibernate-core@4.3.11.Final

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.hibernate:hibernate-core@4.3.11.Final
    Remediation: Upgrade to org.hibernate:hibernate-core@5.3.38.Final.

Overview

org.hibernate:hibernate-core is a library providing Object/Relational Mapping (ORM) support to applications, libraries, and frameworks.

Affected versions of this package are vulnerable to SQL Injection via the InlineIdsOrClauseBuilder component when unsanitized non-alphanumeric characters are present in the ID column. An attacker can access sensitive information and manipulate or delete data by injecting crafted input.

Note:

This is only exploitable if the user is able to set their own ids and those ids allow non-alphanumeric characters and the application is using InlineIdsOrClauseBuilder.

Remediation

Upgrade org.hibernate:hibernate-core to version 5.3.38 or higher.

References

high severity

SQL Injection

  • Vulnerable module: org.hibernate:hibernate-core
  • Introduced through: org.hibernate:hibernate-core@4.3.11.Final

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.hibernate:hibernate-core@4.3.11.Final
    Remediation: Upgrade to org.hibernate:hibernate-core@5.4.24.Final.

Overview

org.hibernate:hibernate-core is a library providing Object/Relational Mapping (ORM) support to applications, libraries, and frameworks.

Affected versions of this package are vulnerable to SQL Injection. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.

Remediation

Upgrade org.hibernate:hibernate-core to version 5.4.24.Final or higher.

References

high severity

SQL Injection

  • Vulnerable module: org.hibernate:hibernate-core
  • Introduced through: org.hibernate:hibernate-core@4.3.11.Final

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.hibernate:hibernate-core@4.3.11.Final
    Remediation: Upgrade to org.hibernate:hibernate-core@5.3.18.Final.

Overview

org.hibernate:hibernate-core is a library providing Object/Relational Mapping (ORM) support to applications, libraries, and frameworks.

Affected versions of this package are vulnerable to SQL Injection. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

Remediation

Upgrade org.hibernate:hibernate-core to version 5.3.18.Final, 5.4.18.Final or higher.

References

high severity

XML External Entity (XXE) Injection

  • Vulnerable module: dom4j:dom4j
  • Introduced through: org.hibernate:hibernate-core@4.3.11.Final

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.hibernate:hibernate-core@4.3.11.Final dom4j:dom4j@1.6.1

Overview

dom4j:dom4j is a flexible XML framework for Java. Note: this artifact has been deprecated for org.dom4j:dom4j.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection due to improper validation of the QName inputs.

Details

XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.

Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.

For example, below is a sample XML document, containing an XML element- username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
   <username>John</username>
</xml>

An external XML entity - xxe, is defined using a system identifier and present within a DOCTYPE header. These entities can access local or remote content. For example the below code contains an external XML entity that would fetch the content of /etc/passwd and display it to the user rendered by username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
   <!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
   <username>&xxe;</username>
</xml>

Other XXE Injection attacks can access local resources that may not stop returning data, possibly impacting application availability and leading to Denial of Service.

Remediation

There is no fixed version for dom4j:dom4j.

References

high severity

XML External Entity (XXE) Injection

  • Vulnerable module: dom4j:dom4j
  • Introduced through: org.hibernate:hibernate-core@4.3.11.Final

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.hibernate:hibernate-core@4.3.11.Final dom4j:dom4j@1.6.1

Overview

dom4j:dom4j is a flexible XML framework for Java. Note: this artifact has been deprecated for org.dom4j:dom4j.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. By using the default SaxReader() provided by Dom4J, external DTDs and External Entities are allowed, resulting in a possible XXE.

Details

XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.

Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.

For example, below is a sample XML document, containing an XML element- username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
   <username>John</username>
</xml>

An external XML entity - xxe, is defined using a system identifier and present within a DOCTYPE header. These entities can access local or remote content. For example the below code contains an external XML entity that would fetch the content of /etc/passwd and display it to the user rendered by username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
   <!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
   <username>&xxe;</username>
</xml>

Other XXE Injection attacks can access local resources that may not stop returning data, possibly impacting application availability and leading to Denial of Service.

Remediation

There is no fixed version for dom4j:dom4j.

References

medium severity

Improper Neutralization

  • Vulnerable module: org.eclipse.angus:angus-mail
  • Introduced through: org.glassfish.jersey.media:jersey-media-moxy@4.0.2

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.glassfish.jersey.media:jersey-media-moxy@4.0.2 org.eclipse.persistence:org.eclipse.persistence.moxy@5.0.0-B09 org.eclipse.angus:angus-mail@2.0.3

Overview

org.eclipse.angus:angus-mail is an Angus Mail Provider.

Affected versions of this package are vulnerable to Improper Neutralization via the handling of SMTP message input. An attacker can inject arbitrary SMTP commands by supplying specially crafted input containing carriage return and line feed characters.

Note:

This is only exploitable if the provided dependency org.eclipse.angus:smtp is used.

Remediation

Upgrade org.eclipse.angus:angus-mail to version 2.0.4 or higher.

References

medium severity

EPL-1.0 license

  • Module: junit:junit
  • Introduced through: org.glassfish.jersey.media:jersey-media-moxy@4.0.2

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.glassfish.jersey.media:jersey-media-moxy@4.0.2 jakarta.json.bind:jakarta.json.bind-api@3.0.1 junit:junit@4.13.2

EPL-1.0 license

medium severity

LGPL-2.0 license

  • Module: org.hibernate:hibernate-core
  • Introduced through: org.hibernate:hibernate-core@4.3.11.Final

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.hibernate:hibernate-core@4.3.11.Final

LGPL-2.0 license

medium severity

LGPL-2.1 license

  • Module: org.hibernate.common:hibernate-commons-annotations
  • Introduced through: org.hibernate:hibernate-core@4.3.11.Final

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.hibernate:hibernate-core@4.3.11.Final org.hibernate.common:hibernate-commons-annotations@4.0.5.Final

LGPL-2.1 license

medium severity

EPL-1.0 license

  • Module: org.hibernate.javax.persistence:hibernate-jpa-2.1-api
  • Introduced through: org.hibernate:hibernate-core@4.3.11.Final

Detailed paths

  • Introduced through: mixaverros88/convert-Greek-To-Greeklish-java@mixaverros88/convert-Greek-To-Greeklish-java#e392abf8b191e8b587ea584b91de55779524ca72 org.hibernate:hibernate-core@4.3.11.Final org.hibernate.javax.persistence:hibernate-jpa-2.1-api@1.0.0.Final

EPL-1.0 license