|
| 1 | +{ |
| 2 | + "SchemaVersion": 2, |
| 3 | + "CreatedAt": "2021-08-25T12:20:30.000000005Z", |
| 4 | + "ArtifactName": "testdata/fixtures/repo/sbt", |
| 5 | + "ArtifactType": "repository", |
| 6 | + "Metadata": { |
| 7 | + "ImageConfig": { |
| 8 | + "architecture": "", |
| 9 | + "created": "0001-01-01T00:00:00Z", |
| 10 | + "os": "", |
| 11 | + "rootfs": { |
| 12 | + "type": "", |
| 13 | + "diff_ids": null |
| 14 | + }, |
| 15 | + "config": {} |
| 16 | + } |
| 17 | + }, |
| 18 | + "Results": [ |
| 19 | + { |
| 20 | + "Target": "build.sbt.lock", |
| 21 | + "Class": "lang-pkgs", |
| 22 | + "Type": "sbt", |
| 23 | + "Vulnerabilities": [ |
| 24 | + { |
| 25 | + "VulnerabilityID": "CVE-2020-9548", |
| 26 | + "PkgID": "com.fasterxml.jackson.core:jackson-databind:2.9.1", |
| 27 | + "PkgName": "com.fasterxml.jackson.core:jackson-databind", |
| 28 | + "PkgIdentifier": { |
| 29 | + "PURL": "pkg:maven/com.fasterxml.jackson.core/ [email protected]", |
| 30 | + "UID": "9ccd2eb3e03373ff" |
| 31 | + }, |
| 32 | + "InstalledVersion": "2.9.1", |
| 33 | + "FixedVersion": "2.9.10.4", |
| 34 | + "Status": "fixed", |
| 35 | + "Layer": {}, |
| 36 | + "SeveritySource": "ghsa", |
| 37 | + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-9548", |
| 38 | + "DataSource": { |
| 39 | + "ID": "ghsa", |
| 40 | + "Name": "GitHub Security Advisory Maven", |
| 41 | + "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Amaven" |
| 42 | + }, |
| 43 | + "Title": "jackson-databind: Serialization gadgets in anteros-core", |
| 44 | + "Description": "FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).", |
| 45 | + "Severity": "CRITICAL", |
| 46 | + "CweIDs": [ |
| 47 | + "CWE-502" |
| 48 | + ], |
| 49 | + "VendorSeverity": { |
| 50 | + "ghsa": 4, |
| 51 | + "nvd": 4, |
| 52 | + "redhat": 3 |
| 53 | + }, |
| 54 | + "CVSS": { |
| 55 | + "nvd": { |
| 56 | + "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", |
| 57 | + "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", |
| 58 | + "V2Score": 6.8, |
| 59 | + "V3Score": 9.8 |
| 60 | + }, |
| 61 | + "redhat": { |
| 62 | + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", |
| 63 | + "V3Score": 8.1 |
| 64 | + } |
| 65 | + }, |
| 66 | + "References": [ |
| 67 | + "https://access.redhat.com/security/cve/CVE-2020-9548", |
| 68 | + "https://github.com/FasterXML/jackson-databind/issues/2634", |
| 69 | + "https://github.com/advisories/GHSA-p43x-xfjf-5jhr", |
| 70 | + "https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E", |
| 71 | + "https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E", |
| 72 | + "https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E", |
| 73 | + "https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E", |
| 74 | + "https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E", |
| 75 | + "https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E", |
| 76 | + "https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E", |
| 77 | + "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E", |
| 78 | + "https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html", |
| 79 | + "https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", |
| 80 | + "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", |
| 81 | + "https://security.netapp.com/advisory/ntap-20200904-0006/", |
| 82 | + "https://www.oracle.com/security-alerts/cpujan2021.html", |
| 83 | + "https://www.oracle.com/security-alerts/cpujul2020.html", |
| 84 | + "https://www.oracle.com/security-alerts/cpuoct2020.html", |
| 85 | + "https://www.oracle.com/security-alerts/cpuoct2021.html" |
| 86 | + ], |
| 87 | + "PublishedDate": "2020-03-02T04:15:00Z", |
| 88 | + "LastModifiedDate": "2021-12-02T21:23:00Z" |
| 89 | + }, |
| 90 | + { |
| 91 | + "VulnerabilityID": "CVE-2021-20190", |
| 92 | + "PkgID": "com.fasterxml.jackson.core:jackson-databind:2.9.1", |
| 93 | + "PkgName": "com.fasterxml.jackson.core:jackson-databind", |
| 94 | + "PkgIdentifier": { |
| 95 | + "PURL": "pkg:maven/com.fasterxml.jackson.core/ [email protected]", |
| 96 | + "UID": "9ccd2eb3e03373ff" |
| 97 | + }, |
| 98 | + "InstalledVersion": "2.9.1", |
| 99 | + "FixedVersion": "2.9.10.7", |
| 100 | + "Status": "fixed", |
| 101 | + "Layer": {}, |
| 102 | + "SeveritySource": "nvd", |
| 103 | + "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2021-20190", |
| 104 | + "DataSource": { |
| 105 | + "ID": "glad", |
| 106 | + "Name": "GitLab Advisory Database Community", |
| 107 | + "URL": "https://gitlab.com/gitlab-org/advisories-community" |
| 108 | + }, |
| 109 | + "Title": "jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing", |
| 110 | + "Description": "A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", |
| 111 | + "Severity": "HIGH", |
| 112 | + "CweIDs": [ |
| 113 | + "CWE-502" |
| 114 | + ], |
| 115 | + "VendorSeverity": { |
| 116 | + "ghsa": 3, |
| 117 | + "nvd": 3, |
| 118 | + "redhat": 3 |
| 119 | + }, |
| 120 | + "CVSS": { |
| 121 | + "nvd": { |
| 122 | + "V2Vector": "AV:N/AC:M/Au:N/C:P/I:P/A:C", |
| 123 | + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", |
| 124 | + "V2Score": 8.3, |
| 125 | + "V3Score": 8.1 |
| 126 | + }, |
| 127 | + "redhat": { |
| 128 | + "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", |
| 129 | + "V3Score": 8.1 |
| 130 | + } |
| 131 | + }, |
| 132 | + "References": [ |
| 133 | + "https://access.redhat.com/security/cve/CVE-2021-20190", |
| 134 | + "https://bugzilla.redhat.com/show_bug.cgi?id=1916633", |
| 135 | + "https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a", |
| 136 | + "https://github.com/FasterXML/jackson-databind/issues/2854", |
| 137 | + "https://github.com/advisories/GHSA-5949-rw7g-wx7w", |
| 138 | + "https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E", |
| 139 | + "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html", |
| 140 | + "https://nvd.nist.gov/vuln/detail/CVE-2021-20190", |
| 141 | + "https://security.netapp.com/advisory/ntap-20210219-0008/" |
| 142 | + ], |
| 143 | + "PublishedDate": "2021-01-19T17:15:00Z", |
| 144 | + "LastModifiedDate": "2021-07-20T23:15:00Z" |
| 145 | + } |
| 146 | + ] |
| 147 | + } |
| 148 | + ] |
| 149 | +} |
0 commit comments