📂 Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /legend-depot-artifacts-refresh/pom.xml
Findings
| Finding |
Severity |
🎯 CVSS |
Exploit Maturity |
EPSS |
Library |
Type |
Fixed in |
Remediation Available |
Reachability |
| CVE-82529-348347 |
🟣 Critical |
9.8 |
N/A |
N/A |
guava-30.1-jre.jar |
Direct |
N/A |
❌ |
|
| CVE-2020-8908 |
🟠 Medium |
4.8 |
Not Defined |
< 1% |
guava-30.1-jre.jar |
Direct |
com.google.guava:guava:32.0.0-android |
✅ |
|
Details
🟣CVE-82529-348347
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /legend-depot-artifacts-refresh/pom.xml
Dependency Hierarchy:
-
❌ guava-30.1-jre.jar (Vulnerable Library)
-
legend-depot-store-status-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar
- legend-depot-artifacts-repository-maven-impl-1.7.6-SNAPSHOT.jar
- ❌ guava-30.1-jre.jar (Vulnerable Library)
-
legend-depot-artifacts-repository-maven-impl-1.7.6-SNAPSHOT.jar (Root Library)
- ❌ guava-30.1-jre.jar (Vulnerable Library)
-
legend-engine-extensions-collection-generation-4.4.5.jar (Root Library)
- legend-engine-language-pure-dsl-generation-4.4.5.jar
- legend-engine-external-shared-4.4.5.jar
- legend-engine-language-pure-modelManager-4.4.5.jar
- ❌ guava-30.1-jre.jar (Vulnerable Library)
-
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-artifacts-repository-maven-impl-1.7.6-SNAPSHOT.jar
- ❌ guava-30.1-jre.jar (Vulnerable Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-82529-348347
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2020-8908
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /legend-depot-artifacts-refresh/pom.xml
Dependency Hierarchy:
-
❌ guava-30.1-jre.jar (Vulnerable Library)
-
legend-depot-store-status-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar
- legend-depot-artifacts-repository-maven-impl-1.7.6-SNAPSHOT.jar
- ❌ guava-30.1-jre.jar (Vulnerable Library)
-
legend-depot-artifacts-repository-maven-impl-1.7.6-SNAPSHOT.jar (Root Library)
- ❌ guava-30.1-jre.jar (Vulnerable Library)
-
legend-engine-extensions-collection-generation-4.4.5.jar (Root Library)
- legend-engine-language-pure-dsl-generation-4.4.5.jar
- legend-engine-external-shared-4.4.5.jar
- legend-engine-language-pure-modelManager-4.4.5.jar
- ❌ guava-30.1-jre.jar (Vulnerable Library)
-
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-artifacts-repository-maven-impl-1.7.6-SNAPSHOT.jar
- ❌ guava-30.1-jre.jar (Vulnerable Library)
Vulnerability Details
A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.
Mend Note:
Publish Date: Dec 10, 2020 10:10 PM
URL: CVE-2020-8908
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-5mg8-w23w-74h3
Release Date: Dec 10, 2020 10:10 PM
Fix Resolution : com.google.guava:guava:32.0.0-android
📂 Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /legend-depot-artifacts-refresh/pom.xml
Findings
Details
🟣CVE-82529-348347
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /legend-depot-artifacts-refresh/pom.xml
Dependency Hierarchy:
❌ guava-30.1-jre.jar (Vulnerable Library)
legend-depot-store-status-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-repository-maven-impl-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-extensions-collection-generation-4.4.5.jar (Root Library)
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-82529-348347
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2020-8908
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /legend-depot-artifacts-refresh/pom.xml
Dependency Hierarchy:
❌ guava-30.1-jre.jar (Vulnerable Library)
legend-depot-store-status-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-repository-maven-impl-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-extensions-collection-generation-4.4.5.jar (Root Library)
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
Vulnerability Details
A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.
Mend Note:
Publish Date: Dec 10, 2020 10:10 PM
URL: CVE-2020-8908
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-5mg8-w23w-74h3
Release Date: Dec 10, 2020 10:10 PM
Fix Resolution : com.google.guava:guava:32.0.0-android