You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
XStream is a serialization library from Java objects to XML and back.
Path to dependency file: /webgoat-server/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
mend-for-github-combot
changed the title
CVE-2022-40151 (Medium) detected in xstream-1.4.5.jar
CVE-2022-40151 (Medium) detected in xstream-1.4.5.jar - autoclosed
Sep 23, 2022
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-for-github-combot
changed the title
CVE-2022-40151 (Medium) detected in xstream-1.4.5.jar - autoclosed
CVE-2022-40151 (High) detected in xstream-1.4.5.jar
Oct 29, 2022
CVE-2022-40151 - High Severity Vulnerability
XStream is a serialization library from Java objects to XML and back.
Path to dependency file: /webgoat-server/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar
Dependency Hierarchy:
Found in HEAD commit: e7564c1173880dc1f705b984990b5ab4330140e2
Found in base branch: develop
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Publish Date: 2022-09-16
URL: CVE-2022-40151
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-f8cc-g7j8-xxpm
Release Date: 2022-09-16
Fix Resolution: 1.4.20
⛑️ Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: