CVE-2018-1324 (Medium) detected in commons-compress-1.12.jar - autoclosed #14
Labels
first-timers-only
good first issue
Good for newcomers
Hacktoberfest
help wanted
Extra attention is needed
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
up-for-grabs
@first_tmrs_only picks this up
CVE-2018-1324 - Medium Severity Vulnerability
Vulnerable Library - commons-compress-1.12.jar
Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE and ar, cpio, jar, tar, zip, dump, 7z, arj.
Path to dependency file: android-mycovidconnect/app/build.gradle.kts
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar
Dependency Hierarchy:
Found in HEAD commit: 5c4b3e8c21b6fd83ac6f2c88296dc4d04242f7d1
Found in base branch: master
Vulnerability Details
A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package.
Publish Date: 2018-03-16
URL: CVE-2018-1324
CVSS 3 Score Details (5.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1324
Release Date: 2018-03-16
Fix Resolution: 1.16
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: