forked from DataDog/dd-trace-java
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-22096 (Medium) detected in multiple libraries #464
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
Comments
This was referenced Apr 18, 2022
Closed
Closed
Closed
This was referenced May 5, 2022
Open
This was referenced May 15, 2022
Open
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
0 participants
CVE-2021-22096 - Medium Severity Vulnerability
spring-webmvc-5.2.6.RELEASE.jar
Spring Web MVC
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /dd-smoke-tests/springboot-openliberty/application/pom.xml
Path to vulnerable library: /dd-smoke-tests/springboot-openliberty/application/target/liberty/wlp/usr/shared/resources/lib.index.cache/bf/cf0312998a4fb1f69d6a044dfd13e49d72b233caf0347c7df76db6f3223369/spring-webmvc-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-webmvc/5.2.6.RELEASE/spring-webmvc-5.2.6.RELEASE.jar
Dependency Hierarchy:
spring-core-5.1.5.RELEASE.jar
Spring Core
Library home page: http://projects.spring.io/spring-framework
Path to vulnerable library: /home/wss-scanner/.ivy2/cache/org.springframework/spring-core/jars/spring-core-5.1.5.RELEASE.jar
Dependency Hierarchy:
spring-core-5.2.6.RELEASE.jar
Spring Core
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /dd-smoke-tests/springboot-openliberty/application/pom.xml
Path to vulnerable library: /home/wss-scanner/.ivy2/cache/org.springframework/spring-core/jars/spring-core-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-core/5.2.6.RELEASE/spring-core-5.2.6.RELEASE.jar,/dd-smoke-tests/springboot-openliberty/application/target/liberty/wlp/usr/shared/resources/lib.index.cache/2d/253b184420fd3e918550cd3f7261797cc915593a98b43e001fb2ca100268fd/spring-core-5.2.6.RELEASE.jar
Dependency Hierarchy:
spring-core-5.3.0.jar
Spring Core
Library home page: https://spring.io/projects/spring-framework
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/5.3.0/spring-core-5.3.0.jar
Dependency Hierarchy:
spring-web-5.2.6.RELEASE.jar
Spring Web
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /dd-smoke-tests/springboot-openliberty/application/pom.xml
Path to vulnerable library: /dd-smoke-tests/springboot-openliberty/application/target/liberty/wlp/usr/shared/resources/lib.index.cache/ab/985550bff31d118fe0fa2863c134a37e605bc1eef1d9185baac9d0a272f924/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: 2819174635979a19573ec0ce8e3e2b63a3848079
Found in base branch: master
In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
Publish Date: 2021-10-28
URL: CVE-2021-22096
Base Score Metrics:
Type: Upgrade version
Origin: https://tanzu.vmware.com/security/cve-2021-22096
Release Date: 2021-10-28
Fix Resolution (org.springframework:spring-core): 5.2.18.RELEASE
Direct dependency fix Resolution (com.typesafe.play:play-java-forms_2.13): 2.8.12
The text was updated successfully, but these errors were encountered: