Vulnerabilities

6 via 16 paths

Dependencies

128

Source

GitHub

Commit

355c67c7

Find, fix and prevent vulnerabilities in your code.

Severity
  • 1
  • 5
Status
  • 6
  • 0
  • 0

high severity
new

Infinite loop

  • Vulnerable module: org.bouncycastle:bcprov-jdk18on
  • Introduced through: com.sendgrid:sendgrid-java@4.10.2

Detailed paths

  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb com.sendgrid:sendgrid-java@4.10.2 org.bouncycastle:bcprov-jdk18on@1.76

Overview

Affected versions of this package are vulnerable to Infinite loop in ED25519 verification in the ScalarUtil class. An attacker can send a malicious signature and public key to trigger denial of service.

Remediation

Upgrade org.bouncycastle:bcprov-jdk18on to version 1.78 or higher.

References

medium severity
new

Observable Discrepancy

  • Vulnerable module: org.bouncycastle:bcprov-jdk18on
  • Introduced through: com.sendgrid:sendgrid-java@4.10.2

Detailed paths

  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb com.sendgrid:sendgrid-java@4.10.2 org.bouncycastle:bcprov-jdk18on@1.76

Overview

Affected versions of this package are vulnerable to Observable Discrepancy due to the timing difference between exceptions thrown when processing RSA key exchange handshakes, AKA Marvin.

Note: The implemented fix mitigates the leakage of data via the PKCS#1 interface, but does not fully alleviate the side-channel as it allows cases in which the padding check fails but the handshake succeeds.

Remediation

Upgrade org.bouncycastle:bcprov-jdk18on to version 1.78 or higher.

References

medium severity

Observable Timing Discrepancy

  • Vulnerable module: org.bouncycastle:bcprov-jdk18on
  • Introduced through: com.sendgrid:sendgrid-java@4.10.2

Detailed paths

  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb com.sendgrid:sendgrid-java@4.10.2 org.bouncycastle:bcprov-jdk18on@1.76

Overview

Affected versions of this package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process. An attacker can recover ciphertexts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.

Remediation

There is no fixed version for org.bouncycastle:bcprov-jdk18on.

References

medium severity
new

Open Redirect

  • Vulnerable module: org.springframework:spring-web
  • Introduced through: org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE and org.springframework.boot:spring-boot-starter-webflux@3.2.4

Detailed paths

  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE org.springframework:spring-web@6.1.5
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.springframework.boot:spring-boot-starter-webflux@3.2.4 org.springframework:spring-web@6.1.5
    Remediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.springframework.boot:spring-boot-starter-webflux@3.2.4 org.springframework.boot:spring-boot-starter-json@3.2.4 org.springframework:spring-web@6.1.5
    Remediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.springframework.boot:spring-boot-starter-webflux@3.2.4 org.springframework:spring-webflux@6.1.5 org.springframework:spring-web@6.1.5
    Remediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.

Overview

org.springframework:spring-web is a package that provides a comprehensive programming and configuration model for modern Java-based enterprise applications - on any kind of deployment platform.

Affected versions of this package are vulnerable to Open Redirect when UriComponentsBuilder is used to parse an externally provided URL and perform validation checks on the host of the parsed URL.

Note: This is the same as CVE-2024-22259 and CVE-2024-22243, but with different input.

Remediation

Upgrade org.springframework:spring-web to version 5.3.34, 6.0.19, 6.1.6 or higher.

References

medium severity
new

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: io.netty:netty-codec-http
  • Introduced through: org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE and org.springframework.boot:spring-boot-starter-webflux@3.2.4

Detailed paths

  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE io.projectreactor.netty:reactor-netty@1.1.18 io.projectreactor.netty:reactor-netty-http@1.1.17 io.netty:netty-codec-http@4.1.107.Final
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.springframework.boot:spring-boot-starter-webflux@3.2.4 org.springframework.boot:spring-boot-starter-reactor-netty@3.2.4 io.projectreactor.netty:reactor-netty-http@1.1.17 io.netty:netty-codec-http@4.1.107.Final
    Remediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE io.projectreactor.netty:reactor-netty@1.1.18 io.projectreactor.netty:reactor-netty-core@1.1.18 io.netty:netty-handler-proxy@4.1.108.Final io.netty:netty-codec-http@4.1.107.Final
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE io.projectreactor.netty:reactor-netty@1.1.18 io.projectreactor.netty:reactor-netty-http@1.1.17 io.netty:netty-codec-http2@4.1.107.Final io.netty:netty-codec-http@4.1.107.Final
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.springframework.boot:spring-boot-starter-webflux@3.2.4 org.springframework.boot:spring-boot-starter-reactor-netty@3.2.4 io.projectreactor.netty:reactor-netty-http@1.1.17 io.netty:netty-codec-http2@4.1.107.Final io.netty:netty-codec-http@4.1.107.Final
    Remediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE io.projectreactor.netty:reactor-netty@1.1.18 io.projectreactor.netty.incubator:reactor-netty-incubator-quic@0.1.18 io.projectreactor.netty:reactor-netty-core@1.1.18 io.netty:netty-handler-proxy@4.1.108.Final io.netty:netty-codec-http@4.1.107.Final
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE io.projectreactor.netty:reactor-netty@1.1.18 io.projectreactor.netty:reactor-netty-http@1.1.17 io.projectreactor.netty:reactor-netty-core@1.1.18 io.netty:netty-handler-proxy@4.1.108.Final io.netty:netty-codec-http@4.1.107.Final
  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb org.springframework.boot:spring-boot-starter-webflux@3.2.4 org.springframework.boot:spring-boot-starter-reactor-netty@3.2.4 io.projectreactor.netty:reactor-netty-http@1.1.17 io.projectreactor.netty:reactor-netty-core@1.1.18 io.netty:netty-handler-proxy@4.1.108.Final io.netty:netty-codec-http@4.1.107.Final
    Remediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.

Overview

io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing for data to accumulate without limits.

An attacker can cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.

Remediation

Upgrade io.netty:netty-codec-http to version 4.1.108.Final or higher.

References

medium severity
new

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: org.bouncycastle:bcprov-jdk18on
  • Introduced through: com.sendgrid:sendgrid-java@4.10.2

Detailed paths

  • Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb com.sendgrid:sendgrid-java@4.10.2 org.bouncycastle:bcprov-jdk18on@1.76

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the solveQuadraticEquation() function used for certificate verification in ECCurve.java. Passing a large f2m parameter can cause excessive CPU consumption.

Remediation

Upgrade org.bouncycastle:bcprov-jdk18on to version 1.78 or higher.

References