You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /workflow-language/build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.dataformat/jackson-dataformat-properties/2.14.1/36de33fa1870eccd3a7899a41866b69b7b7cfd5b/jackson-dataformat-properties-2.14.1.jar
Path to dependency file: /workflow-language/build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.33/2cd0a87ff7df953f810c344bdf2fe3340b954c69/snakeyaml-1.33.jar
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
Support for reading and writing content of "Java Properties" style
configuration files as if there was implied nesting structure (by default using dots as separators).
Path to dependency file: /workflow-language/build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.dataformat/jackson-dataformat-properties/2.14.1/36de33fa1870eccd3a7899a41866b69b7b7cfd5b/jackson-dataformat-properties-2.14.1.jar
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
mend-for-github-combot
changed the title
jackson-annotations-2.14.1.jar: 1 vulnerabilities (highest severity is: 9.8) reachable
jackson-annotations-2.14.1.jar: 2 vulnerabilities (highest severity is: 9.8) reachable
Aug 10, 2023
mend-for-github-combot
changed the title
jackson-annotations-2.14.1.jar: 2 vulnerabilities (highest severity is: 9.8) reachable
jackson-annotations-2.14.1.jar: 2 vulnerabilities (highest severity is: 9.8)
Sep 15, 2023
mend-for-github-combot
changed the title
jackson-annotations-2.14.1.jar: 2 vulnerabilities (highest severity is: 9.8)
jackson-annotations-2.14.1.jar: 2 vulnerabilities (highest severity is: 8.3)
Sep 8, 2024
mend-for-github-combot
changed the title
jackson-annotations-2.14.1.jar: 2 vulnerabilities (highest severity is: 8.3)
jackson-annotations-2.14.1.jar: 2 vulnerabilities (highest severity is: 8.3) reachable
Dec 17, 2024
Vulnerable Library - jackson-annotations-2.14.1.jar
Path to dependency file: /workflow-language/build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.dataformat/jackson-dataformat-properties/2.14.1/36de33fa1870eccd3a7899a41866b69b7b7cfd5b/jackson-dataformat-properties-2.14.1.jar
Vulnerabilities
Reachable
Unreachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-1471
Vulnerable Library - snakeyaml-1.33.jar
YAML 1.1 parser and emitter for Java
Library home page: https://bitbucket.org/snakeyaml/snakeyaml
Path to dependency file: /workflow-language/build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.33/2cd0a87ff7df953f810c344bdf2fe3340b954c69/snakeyaml-1.33.jar
Dependency Hierarchy:
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
Publish Date: 2022-12-01
URL: CVE-2022-1471
CVSS 3 Score Details (8.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64634374
Release Date: 2022-12-01
Fix Resolution (org.yaml:snakeyaml): 2.0
Direct dependency fix Resolution (com.fasterxml.jackson.core:jackson-annotations): 2.14.2
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2023-3894
Vulnerable Library - jackson-dataformat-properties-2.14.1.jar
Support for reading and writing content of "Java Properties" style configuration files as if there was implied nesting structure (by default using dots as separators).
Library home page: http://fasterxml.com/
Path to dependency file: /workflow-language/build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.dataformat/jackson-dataformat-properties/2.14.1/36de33fa1870eccd3a7899a41866b69b7b7cfd5b/jackson-dataformat-properties-2.14.1.jar
Dependency Hierarchy:
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Publish Date: 2023-08-08
URL: CVE-2023-3894
CVSS 3 Score Details (5.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2023-08-08
Fix Resolution (com.fasterxml.jackson.dataformat:jackson-dataformat-properties): 2.15.0-rc1
Direct dependency fix Resolution (com.fasterxml.jackson.core:jackson-annotations): 2.14.2
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: