📂 Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Findings
| Finding |
Severity |
🎯 CVSS |
Exploit Maturity |
EPSS |
Library |
Type |
Fixed in |
Remediation Available |
Reachability |
| CVE-82529-348347 |
🟣 Critical |
9.8 |
N/A |
N/A |
guava-30.1-jre.jar |
Direct |
N/A |
❌ |
Reachable |
| CVE-2020-8908 |
🟠 Medium |
4.8 |
Not Defined |
< 1% |
guava-30.1-jre.jar |
Direct |
com.google.guava:guava:32.0.0-android |
✅ |
Reachable |
Details
🟣CVE-82529-348347
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Dependency Hierarchy:
Reachability Analysis
This vulnerability is potentially reachable:
- org.apache.maven.session.scope.internal.SessionScopeModule (Application)
- org.apache.maven.repository.internal.MavenResolverModule (Extension)
- com.google.inject.binder.LinkedBindingBuilder (Extension)
- com.google.inject.TypeLiteral (Extension)
- com.google.common.collect.ImmutableList (Extension)
- com.google.common.collect.Iterables (Extension)
- com.google.common.collect.Iterables$3 (Extension)
- com.google.common.collect.StandardTable$ColumnKeyIterator (Extension)
- com.google.common.cache.CacheBuilder$2 (Extension)
- com.google.common.cache.CacheBuilder (Extension)
- com.google.common.cache.LocalCache (Extension)
- com.google.common.cache.LocalCache$Segment (Extension)
-> ❌ com.google.common.cache.RemovalCause$3 (Vulnerable Component)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-82529-348347
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2020-8908
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Dependency Hierarchy:
Reachability Analysis
This vulnerability is potentially reachable:
- org.apache.maven.session.scope.internal.SessionScopeModule (Application)
- com.google.inject.util.Modules$OverrideModule (Extension)
- com.google.common.collect.Sets (Extension)
- com.google.common.collect.Sets$FilteredNavigableSet (Extension)
- com.google.common.reflect.TypeToken$TypeFilter$2 (Extension)
- com.google.common.reflect.TypeToken (Extension)
- com.google.common.reflect.TypeToken$InterfaceSet (Extension)
- com.google.common.collect.FluentIterable$1 (Extension)
-> ❌ com.google.common.graph.AbstractNetwork$1$1$1 (Vulnerable Component)
Vulnerability Details
A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.
Mend Note:
Publish Date: Dec 10, 2020 10:10 PM
URL: CVE-2020-8908
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-5mg8-w23w-74h3
Release Date: Dec 10, 2020 10:10 PM
Fix Resolution : com.google.guava:guava:32.0.0-android
📂 Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Findings
Details
🟣CVE-82529-348347
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Dependency Hierarchy:
❌ guava-30.1-jre.jar (Vulnerable Library)
maven-core-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-82529-348347
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2020-8908
Vulnerable Library - guava-30.1-jre.jar
Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.
Library home page: https://github.com/google/guava
Path to dependency file: /maven-embedder/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar
Dependency Hierarchy:
❌ guava-30.1-jre.jar (Vulnerable Library)
maven-core-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)
Reachability Analysis
This vulnerability is potentially reachable:
Vulnerability Details
A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.
Mend Note:
Publish Date: Dec 10, 2020 10:10 PM
URL: CVE-2020-8908
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 4.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-5mg8-w23w-74h3
Release Date: Dec 10, 2020 10:10 PM
Fix Resolution : com.google.guava:guava:32.0.0-android