Skip to content

WS-2019-0490 (High) detected in jcommander-1.48.jar #3

@mend-for-github-com

Description

@mend-for-github-com

WS-2019-0490 - High Severity Vulnerability

Vulnerable Library - jcommander-1.48.jar

A Java framework to parse command line options with annotations.

Library home page: http://beust.com/

Path to dependency file: /plugin-gradle/build.gradle

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.48/jcommander-1.48.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.48/jcommander-1.48.jar,/home/wss-scanner/.m2/repository/com/beust/jcommander/1.48/jcommander-1.48.jar

Dependency Hierarchy:

  • core-0.1.0-SNAPSHOT (Root Library)
    • testng-6.9.10.jar
      • jcommander-1.48.jar (Vulnerable Library)

Found in HEAD commit: caa1893aca39ac0610637f8a8c3cfc1c28d32304

Found in base branch: master

Vulnerability Details

Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS.

Publish Date: 2019-02-19

URL: WS-2019-0490

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-02-19

Fix Resolution: com.beust:jcommander:1.75

Metadata

Metadata

Assignees

No one assigned

    Labels

    security vulnerabilitySecurity vulnerability detected by WhiteSource

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions