Skip to content

guava-30.1-jre.jar: 2 vulnerabilities (highest severity is: 9.8) [master] (reachable) #20

@mend-developer-platform-dev

Description

@mend-developer-platform-dev
📂 Vulnerable Library - guava-30.1-jre.jar

Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.

Library home page: https://github.com/google/guava

Path to dependency file: /maven-embedder/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar

Findings

Finding Severity 🎯 CVSS Exploit Maturity EPSS Library Type Fixed in Remediation Available Reachability
CVE-82529-348347 🟣 Critical 9.8 N/A N/A guava-30.1-jre.jar Direct N/A Reachable
CVE-2020-8908 🟠 Medium 4.8 Not Defined < 1% guava-30.1-jre.jar Direct com.google.guava:guava:32.0.0-android Reachable

Details

🟣CVE-82529-348347

Vulnerable Library - guava-30.1-jre.jar

Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.

Library home page: https://github.com/google/guava

Path to dependency file: /maven-embedder/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar

Dependency Hierarchy:

  • guava-30.1-jre.jar (Vulnerable Library)

  • maven-core-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)

    • guava-30.1-jre.jar (Vulnerable Library)

Reachability Analysis

This vulnerability is potentially reachable:

- org.apache.maven.session.scope.internal.SessionScopeModule (Application)
    - org.apache.maven.repository.internal.MavenResolverModule (Extension)
        - com.google.inject.binder.LinkedBindingBuilder (Extension)
            - com.google.inject.TypeLiteral (Extension)
                - com.google.common.collect.ImmutableList (Extension)
                    - com.google.common.collect.Iterables (Extension)
                        - com.google.common.collect.Iterables$3 (Extension)
                            - com.google.common.collect.StandardTable$ColumnKeyIterator (Extension)
                                - com.google.common.cache.CacheBuilder$2 (Extension)
                                    - com.google.common.cache.CacheBuilder (Extension)
                                        - com.google.common.cache.LocalCache (Extension)
                                            - com.google.common.cache.LocalCache$Segment (Extension)
                                                -> ❌ com.google.common.cache.RemovalCause$3 (Vulnerable Component)

Vulnerability Details

Created automatically by the test suite

Publish Date: Jun 07, 2010 05:12 PM

URL: CVE-82529-348347

Threat Assessment

Exploit Maturity:N/A

EPSS:N/A

Score: 9.8


Suggested Fix

Type: Upgrade version

Origin:

Release Date:

Fix Resolution :

🟠CVE-2020-8908

Vulnerable Library - guava-30.1-jre.jar

Guava is a suite of core and expanded libraries that include
utility classes, Google's collections, I/O classes, and
much more.

Library home page: https://github.com/google/guava

Path to dependency file: /maven-embedder/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/30.1-jre/guava-30.1-jre.jar

Dependency Hierarchy:

  • guava-30.1-jre.jar (Vulnerable Library)

  • maven-core-4.0.0-alpha-6-SNAPSHOT.jar (Root Library)

    • guava-30.1-jre.jar (Vulnerable Library)

Reachability Analysis

This vulnerability is potentially reachable:

- org.apache.maven.session.scope.internal.SessionScopeModule (Application)
    - com.google.inject.util.Modules$OverrideModule (Extension)
        - com.google.common.collect.Sets (Extension)
            - com.google.common.collect.Sets$FilteredNavigableSet (Extension)
                - com.google.common.reflect.TypeToken$TypeFilter$2 (Extension)
                    - com.google.common.reflect.TypeToken (Extension)
                        - com.google.common.reflect.TypeToken$InterfaceSet (Extension)
                            - com.google.common.collect.FluentIterable$1 (Extension)
                                -> ❌ com.google.common.graph.AbstractNetwork$1$1$1 (Vulnerable Component)

Vulnerability Details

A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.
Mend Note:

Publish Date: Dec 10, 2020 10:10 PM

URL: CVE-2020-8908

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 4.8


Suggested Fix

Type: Upgrade version

Origin: GHSA-5mg8-w23w-74h3

Release Date: Dec 10, 2020 10:10 PM

Fix Resolution : com.google.guava:guava:32.0.0-android

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions