Vulnerable Library - mapdb-3.0.8.jar
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Vulnerabilities
| CVE |
Severity |
CVSS |
Dependency |
Type |
Fixed in (mapdb version) |
Remediation Possible** |
Reachability |
| CVE-2019-10103 |
High |
8.1 |
detected in multiple dependencies |
Transitive |
3.0.9 |
✅ |
|
| CVE-2019-10102 |
High |
8.1 |
detected in multiple dependencies |
Transitive |
3.0.9 |
✅ |
|
| CVE-2019-10101 |
High |
8.1 |
detected in multiple dependencies |
Transitive |
N/A* |
❌ |
|
| CVE-2022-24329 |
Medium |
5.3 |
kotlin-stdlib-1.2.71.jar |
Transitive |
N/A* |
❌ |
|
| CVE-2020-29582 |
Medium |
5.3 |
kotlin-stdlib-1.2.71.jar |
Transitive |
N/A* |
❌ |
|
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2019-10103
Vulnerable Libraries - kotlin-stdlib-1.2.71.jar, kotlin-stdlib-common-1.2.71.jar
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- kotlin-stdlib-1.2.71.jar
- ❌ kotlin-stdlib-common-1.2.71.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
JetBrains IntelliJ IDEA projects created using the Kotlin (JS Client/JVM Server) IDE Template were resolving Gradle artifacts using an http connection, potentially allowing an MITM attack. This issue, which was fixed in Kotlin plugin version 1.3.30, is similar to CVE-2019-10101.
Publish Date: 2019-07-03
URL: CVE-2019-10103
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10103
Release Date: 2019-07-03
Fix Resolution (org.jetbrains.kotlin:kotlin-stdlib-common): 1.3.30
Direct dependency fix Resolution (org.mapdb:mapdb): 3.0.9
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2019-10102
Vulnerable Libraries - kotlin-stdlib-1.2.71.jar, kotlin-stdlib-common-1.2.71.jar
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- kotlin-stdlib-1.2.71.jar
- ❌ kotlin-stdlib-common-1.2.71.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.
Publish Date: 2019-07-03
URL: CVE-2019-10102
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10102
Release Date: 2019-07-03
Fix Resolution (org.jetbrains.kotlin:kotlin-stdlib-common): 1.3.30
Direct dependency fix Resolution (org.mapdb:mapdb): 3.0.9
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2019-10101
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- kotlin-stdlib-1.2.71.jar
- ❌ kotlin-stdlib-common-1.2.71.jar (Vulnerable Library)
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
JetBrains Kotlin versions before 1.3.30 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack.
Publish Date: 2019-07-03
URL: CVE-2019-10101
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10101
Release Date: 2019-07-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
CVE-2022-24329
Vulnerable Library - kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
In JetBrains Kotlin before 1.6.0, it was not possible to lock dependencies for Multiplatform Gradle Projects.
Publish Date: 2022-02-25
URL: CVE-2022-24329
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-2qp4-g3q3-f92w
Release Date: 2022-02-25
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.6.0
CVE-2020-29582
Vulnerable Library - kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- mapdb-3.0.8.jar (Root Library)
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.
Publish Date: 2021-02-03
URL: CVE-2020-29582
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-cqj8-47ch-rvvq
Release Date: 2021-02-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.4.21
⛑️Automatic Remediation will be attempted for this issue.
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Libraries - kotlin-stdlib-1.2.71.jar, kotlin-stdlib-common-1.2.71.jar
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
JetBrains IntelliJ IDEA projects created using the Kotlin (JS Client/JVM Server) IDE Template were resolving Gradle artifacts using an http connection, potentially allowing an MITM attack. This issue, which was fixed in Kotlin plugin version 1.3.30, is similar to CVE-2019-10101.
Publish Date: 2019-07-03
URL: CVE-2019-10103
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10103
Release Date: 2019-07-03
Fix Resolution (org.jetbrains.kotlin:kotlin-stdlib-common): 1.3.30
Direct dependency fix Resolution (org.mapdb:mapdb): 3.0.9
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Libraries - kotlin-stdlib-1.2.71.jar, kotlin-stdlib-common-1.2.71.jar
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.
Publish Date: 2019-07-03
URL: CVE-2019-10102
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10102
Release Date: 2019-07-03
Fix Resolution (org.jetbrains.kotlin:kotlin-stdlib-common): 1.3.30
Direct dependency fix Resolution (org.mapdb:mapdb): 3.0.9
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
JetBrains Kotlin versions before 1.3.30 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack.
Publish Date: 2019-07-03
URL: CVE-2019-10101
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10101
Release Date: 2019-07-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
Vulnerable Library - kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
In JetBrains Kotlin before 1.6.0, it was not possible to lock dependencies for Multiplatform Gradle Projects.
Publish Date: 2022-02-25
URL: CVE-2022-24329
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: GHSA-2qp4-g3q3-f92w
Release Date: 2022-02-25
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.6.0
Vulnerable Library - kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /telegrambots-abilities/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.
Publish Date: 2021-02-03
URL: CVE-2020-29582
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: GHSA-cqj8-47ch-rvvq
Release Date: 2021-02-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.4.21
⛑️Automatic Remediation will be attempted for this issue.