Find, fix and prevent vulnerabilities in your code.
high severity
new
- Vulnerable module: org.bouncycastle:bcprov-jdk18on
- Introduced through: com.sendgrid:sendgrid-java@4.10.2
Detailed paths
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › com.sendgrid:sendgrid-java@4.10.2 › org.bouncycastle:bcprov-jdk18on@1.76
Overview
Affected versions of this package are vulnerable to Infinite loop in ED25519 verification in the ScalarUtil
class. An attacker can send a malicious signature and public key to trigger denial of service.
Remediation
Upgrade org.bouncycastle:bcprov-jdk18on
to version 1.78 or higher.
References
medium severity
new
- Vulnerable module: org.bouncycastle:bcprov-jdk18on
- Introduced through: com.sendgrid:sendgrid-java@4.10.2
Detailed paths
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › com.sendgrid:sendgrid-java@4.10.2 › org.bouncycastle:bcprov-jdk18on@1.76
Overview
Affected versions of this package are vulnerable to Observable Discrepancy due to the timing difference between exceptions thrown when processing RSA key exchange handshakes, AKA Marvin.
Note: The implemented fix mitigates the leakage of data via the PKCS#1 interface, but does not fully alleviate the side-channel as it allows cases in which the padding check fails but the handshake succeeds.
Remediation
Upgrade org.bouncycastle:bcprov-jdk18on
to version 1.78 or higher.
References
medium severity
- Vulnerable module: org.bouncycastle:bcprov-jdk18on
- Introduced through: com.sendgrid:sendgrid-java@4.10.2
Detailed paths
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › com.sendgrid:sendgrid-java@4.10.2 › org.bouncycastle:bcprov-jdk18on@1.76
Overview
Affected versions of this package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process. An attacker can recover ciphertexts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher
exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.
Remediation
There is no fixed version for org.bouncycastle:bcprov-jdk18on
.
References
medium severity
new
- Vulnerable module: org.springframework:spring-web
- Introduced through: org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE and org.springframework.boot:spring-boot-starter-webflux@3.2.4
Detailed paths
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE › org.springframework:spring-web@6.1.5
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.springframework.boot:spring-boot-starter-webflux@3.2.4 › org.springframework:spring-web@6.1.5Remediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.springframework.boot:spring-boot-starter-webflux@3.2.4 › org.springframework.boot:spring-boot-starter-json@3.2.4 › org.springframework:spring-web@6.1.5Remediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.springframework.boot:spring-boot-starter-webflux@3.2.4 › org.springframework:spring-webflux@6.1.5 › org.springframework:spring-web@6.1.5Remediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
Overview
org.springframework:spring-web is a package that provides a comprehensive programming and configuration model for modern Java-based enterprise applications - on any kind of deployment platform.
Affected versions of this package are vulnerable to Open Redirect when UriComponentsBuilder
is used to parse an externally provided URL and perform validation checks on the host of the parsed URL.
Note: This is the same as CVE-2024-22259 and CVE-2024-22243, but with different input.
Remediation
Upgrade org.springframework:spring-web
to version 5.3.34, 6.0.19, 6.1.6 or higher.
References
medium severity
new
- Vulnerable module: io.netty:netty-codec-http
- Introduced through: org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE and org.springframework.boot:spring-boot-starter-webflux@3.2.4
Detailed paths
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE › io.projectreactor.netty:reactor-netty@1.1.18 › io.projectreactor.netty:reactor-netty-http@1.1.17 › io.netty:netty-codec-http@4.1.107.Final
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.springframework.boot:spring-boot-starter-webflux@3.2.4 › org.springframework.boot:spring-boot-starter-reactor-netty@3.2.4 › io.projectreactor.netty:reactor-netty-http@1.1.17 › io.netty:netty-codec-http@4.1.107.FinalRemediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE › io.projectreactor.netty:reactor-netty@1.1.18 › io.projectreactor.netty:reactor-netty-core@1.1.18 › io.netty:netty-handler-proxy@4.1.108.Final › io.netty:netty-codec-http@4.1.107.Final
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE › io.projectreactor.netty:reactor-netty@1.1.18 › io.projectreactor.netty:reactor-netty-http@1.1.17 › io.netty:netty-codec-http2@4.1.107.Final › io.netty:netty-codec-http@4.1.107.Final
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.springframework.boot:spring-boot-starter-webflux@3.2.4 › org.springframework.boot:spring-boot-starter-reactor-netty@3.2.4 › io.projectreactor.netty:reactor-netty-http@1.1.17 › io.netty:netty-codec-http2@4.1.107.Final › io.netty:netty-codec-http@4.1.107.FinalRemediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE › io.projectreactor.netty:reactor-netty@1.1.18 › io.projectreactor.netty.incubator:reactor-netty-incubator-quic@0.1.18 › io.projectreactor.netty:reactor-netty-core@1.1.18 › io.netty:netty-handler-proxy@4.1.108.Final › io.netty:netty-codec-http@4.1.107.Final
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.cloudfoundry:cloudfoundry-client-reactor@5.12.1.RELEASE › io.projectreactor.netty:reactor-netty@1.1.18 › io.projectreactor.netty:reactor-netty-http@1.1.17 › io.projectreactor.netty:reactor-netty-core@1.1.18 › io.netty:netty-handler-proxy@4.1.108.Final › io.netty:netty-codec-http@4.1.107.Final
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › org.springframework.boot:spring-boot-starter-webflux@3.2.4 › org.springframework.boot:spring-boot-starter-reactor-netty@3.2.4 › io.projectreactor.netty:reactor-netty-http@1.1.17 › io.projectreactor.netty:reactor-netty-core@1.1.18 › io.netty:netty-handler-proxy@4.1.108.Final › io.netty:netty-codec-http@4.1.107.FinalRemediation: Upgrade to org.springframework.boot:spring-boot-starter-webflux@3.2.5.
Overview
io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the accumulation of data in the HttpPostRequestDecoder
. The decoder cumulates bytes in the undecodedChunk
buffer until it can decode a field, allowing for data to accumulate without limits.
An attacker can cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData
list.
Remediation
Upgrade io.netty:netty-codec-http
to version 4.1.108.Final or higher.
References
medium severity
new
- Vulnerable module: org.bouncycastle:bcprov-jdk18on
- Introduced through: com.sendgrid:sendgrid-java@4.10.2
Detailed paths
-
Introduced through: pacphi/cf-butler@pacphi/cf-butler#355c67c7829978ea25a83fd6ba8ad37c762f58cb › com.sendgrid:sendgrid-java@4.10.2 › org.bouncycastle:bcprov-jdk18on@1.76
Overview
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the solveQuadraticEquation()
function used for certificate verification in ECCurve.java
. Passing a large f2m parameter can cause excessive CPU consumption.
Remediation
Upgrade org.bouncycastle:bcprov-jdk18on
to version 1.78 or higher.