Skip to content

commons-collections4-4.0.jar: 3 vulnerabilities (highest severity is: 9.3) [main] (unreachable) #53

@mend-developer-platform-dev

Description

@mend-developer-platform-dev
📂 Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://www.apache.org/

Path to dependency file: /app/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Findings

Finding Severity 🎯 CVSS Exploit Maturity EPSS Library Type Fixed in Remediation Available Reachability
CVE-2015-4852 🟣 Critical 9.3 High 91.5% commons-collections4-4.0.jar Direct commons-collections:commons-collections:3.2.2 Unreachable
CVE-2015-7501 🟣 Critical 9.3 High 74.299995% commons-collections4-4.0.jar Direct org.apache.commons:commons-collections4:4.1,commons-collections:commons-collections:3.2.2 Unreachable
CVE-2015-6420 🟠 Medium 6.9 Not Defined 13.799999% commons-collections4-4.0.jar Direct org.apache.commons:commons-collections4:4.1,commons-collections:commons-collections:3.2.2 Unreachable

Details

🟣CVE-2015-4852

Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://www.apache.org/

Path to dependency file: /app/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Dependency Hierarchy:

  • commons-collections4-4.0.jar (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.

Publish Date: Nov 18, 2015 03:00 PM

URL: CVE-2015-4852

Threat Assessment

Exploit Maturity:High

EPSS:91.5%

Score: 9.3


Suggested Fix

Type: Upgrade version

Origin: https://www.openwall.com/lists/oss-security/2015/11/17/19

Release Date: Nov 18, 2015 03:00 PM

Fix Resolution : commons-collections:commons-collections:3.2.2

🟣CVE-2015-7501

Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://www.apache.org/

Path to dependency file: /app/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Dependency Hierarchy:

  • commons-collections4-4.0.jar (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Publish Date: Nov 09, 2017 12:00 AM

URL: CVE-2015-7501

Threat Assessment

Exploit Maturity:High

EPSS:74.299995%

Score: 9.3


Suggested Fix

Type: Upgrade version

Origin: GHSA-fjq5-5j5f-mvxh

Release Date: Nov 09, 2017 12:00 AM

Fix Resolution : org.apache.commons:commons-collections4:4.1,commons-collections:commons-collections:3.2.2

🟠CVE-2015-6420

Vulnerable Library - commons-collections4-4.0.jar

The Apache Commons Collections package contains types that extend and augment the Java Collections Framework.

Library home page: http://www.apache.org/

Path to dependency file: /app/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-collections4/4.0/commons-collections4-4.0.jar

Dependency Hierarchy:

  • commons-collections4-4.0.jar (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

Serialized-object interfaces in certain Cisco Collaboration and Social Media; Endpoint Clients and Client Software; Network Application, Service, and Acceleration; Network and Content Security Devices; Network Management and Provisioning; Routing and Switching - Enterprise and Service Provider; Unified Computing; Voice and Unified Communications Devices; Video, Streaming, TelePresence, and Transcoding Devices; Wireless; and Cisco Hosted Services products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.

Publish Date: Dec 15, 2015 02:00 AM

URL: CVE-2015-6420

Threat Assessment

Exploit Maturity:Not Defined

EPSS:13.799999%

Score: 6.9


Suggested Fix

Type: Upgrade version

Origin: GHSA-6hgm-866r-3cjv

Release Date: Dec 15, 2015 02:00 AM

Fix Resolution : org.apache.commons:commons-collections4:4.1,commons-collections:commons-collections:3.2.2

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions