We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 PL-Ninja/MySootScript 一共引入了33个开源组件,存在1个漏洞
漏洞标题:Apache Commons IO路径遍历漏洞 缺陷组件:commons-io:[email protected] 漏洞编号:CVE-2021-29425 漏洞描述:Apache Commons IO是美国阿帕奇基金会(Apache)公司的一个应用程序。可以帮助开发IO功能。 Apache Commons IO 2.2版本至2.6版本存在路径遍历漏洞。该漏洞与FileNameUtils.normalize方法有关。攻击者可以利用该漏洞通过发送错误的输入字符串(例如“//../foo”或“\\..\foo”)获得对父目录中文件的访问权限。 国家漏洞库信息:https://www.cnvd.org.cn/flaw/show/CNVD-2021-30583 影响范围:[0, 2.7) 最小修复版本:2.7 缺陷组件引入路径:org.mss:[email protected]>org.soot-oss:[email protected]>commons-io:[email protected]
另外还有几个漏洞,详细报告:https://mofeisec.com/jr?p=aed178
The text was updated successfully, but these errors were encountered:
@PL-Ninja,同学,您好,上面的漏洞报告是我IDE运行时,安全插件提示您这个项目存在的几个漏洞的报告,辛苦您修复一下哈,担心其他人也会用到你这个项目,从而引入这些漏洞。:)
Sorry, something went wrong.
No branches or pull requests
检测到 PL-Ninja/MySootScript 一共引入了33个开源组件,存在1个漏洞
另外还有几个漏洞,详细报告:https://mofeisec.com/jr?p=aed178
The text was updated successfully, but these errors were encountered: