Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

spring-web-5.3.26.jar: 1 vulnerabilities (highest severity is: 9.8) #573

Closed
mend-bolt-for-github bot opened this issue May 2, 2023 · 1 comment
Closed
Labels
invalid This doesn't seem right Mend: dependency security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link

Vulnerable Library - spring-web-5.3.26.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /lowkey-vault-app/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/5.3.26/479b988a36bcaa2d4bf7c50e53bc7cbcedbe645c/spring-web-5.3.26.jar

Found in HEAD commit: a38f5a9d25ea2262597b5ea8a18e1eadf6087115

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (spring-web version) Remediation Available
CVE-2016-1000027 High 9.8 spring-web-5.3.26.jar Direct 6.0.0

Details

CVE-2016-1000027

Vulnerable Library - spring-web-5.3.26.jar

Spring Web

Library home page: https://github.com/spring-projects/spring-framework

Path to dependency file: /lowkey-vault-app/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/5.3.26/479b988a36bcaa2d4bf7c50e53bc7cbcedbe645c/spring-web-5.3.26.jar

Dependency Hierarchy:

  • spring-web-5.3.26.jar (Vulnerable Library)

Found in HEAD commit: a38f5a9d25ea2262597b5ea8a18e1eadf6087115

Found in base branch: main

Vulnerability Details

Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
Mend Note: After conducting further research, Mend has determined that all versions of spring-web up to version 6.0.0 are vulnerable to CVE-2016-1000027.

Publish Date: 2020-01-02

URL: CVE-2016-1000027

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-4wrc-f8pq-fpqp

Release Date: 2020-01-02

Fix Resolution: 6.0.0

Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label May 2, 2023
@nagyesta nagyesta added the invalid This doesn't seem right label May 2, 2023
@nagyesta
Copy link
Owner

nagyesta commented May 2, 2023

The vulnerable code path of Spring Framework is not used in Lowkey Vault. Also, Lowkey Vault is only expected to receive controlled inputs during intended use (as it is only expected to be called from tests and should run only while the tests are executed). Due to these, I am marking this as invalid. Will be fixed during the update to 6.0.0 in #373 later this year.

@nagyesta nagyesta closed this as completed May 2, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
invalid This doesn't seem right Mend: dependency security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

1 participant