Vulnerable Library - asciidoctorj-1.5.8.1.jar
Path to dependency file: /webgoat-server/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar
Found in HEAD commit: d009fa7fce1dede0a3ec27d4e5deb31ab5da228b
Vulnerabilities
| CVE |
Severity |
CVSS |
Dependency |
Type |
Fixed in (asciidoctorj version) |
Remediation Possible** |
Reachability |
| WS-2019-0490 |
High |
8.1 |
jcommander-1.35.jar |
Transitive |
2.3.1 |
✅ |
|
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2019-0490
Vulnerable Library - jcommander-1.35.jar
A Java framework to parse command line options with annotations.
Library home page: http://beust.com/
Path to dependency file: /webgoat-server/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar
Dependency Hierarchy:
- asciidoctorj-1.5.8.1.jar (Root Library)
- ❌ jcommander-1.35.jar (Vulnerable Library)
Found in HEAD commit: d009fa7fce1dede0a3ec27d4e5deb31ab5da228b
Found in base branch: master
Vulnerability Details
Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS.
Publish Date: 2019-02-19
URL: WS-2019-0490
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2019-02-19
Fix Resolution (com.beust:jcommander): 1.75
Direct dependency fix Resolution (org.asciidoctor:asciidoctorj): 2.3.1
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
Path to dependency file: /webgoat-server/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar
Found in HEAD commit: d009fa7fce1dede0a3ec27d4e5deb31ab5da228b
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - jcommander-1.35.jar
A Java framework to parse command line options with annotations.
Library home page: http://beust.com/
Path to dependency file: /webgoat-server/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.35/jcommander-1.35.jar
Dependency Hierarchy:
Found in HEAD commit: d009fa7fce1dede0a3ec27d4e5deb31ab5da228b
Found in base branch: master
Vulnerability Details
Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS.
Publish Date: 2019-02-19
URL: WS-2019-0490
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2019-02-19
Fix Resolution (com.beust:jcommander): 1.75
Direct dependency fix Resolution (org.asciidoctor:asciidoctorj): 2.3.1
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.