Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

High severity vulnerability introduced from io.netty #3187

Open
0dd opened this issue Feb 23, 2025 · 1 comment
Open

High severity vulnerability introduced from io.netty #3187

0dd opened this issue Feb 23, 2025 · 1 comment
Labels
bug Something isn't working

Comments

@0dd
Copy link

0dd commented Feb 23, 2025

service/pom.xml (pom)

Total: 11 (UNKNOWN: 0, LOW: 2, MEDIUM: 7, HIGH: 2, CRITICAL: 0)

┌─────────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬────────────────┬─────────────────────────────────────────────────────────────┐
│             Library             │ Vulnerability  │ Severity │ Status │ Installed Version │ Fixed Version  │                            Title                            │
├─────────────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤
│ com.google.guava:guava          │ CVE-2023-2976  │ MEDIUM   │ fixed  │ 29.0-jre          │ 32.0.0-android │ guava: insecure temporary directory creation                │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2023-2976                   │
│                                 ├────────────────┼──────────┤        │                   │                ├─────────────────────────────────────────────────────────────┤
│                                 │ CVE-2020-8908  │ LOW      │        │                   │                │ guava: local information disclosure via temporary directory │
│                                 │                │          │        │                   │                │ created with unsafe permissions                             │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2020-8908                   │
├─────────────────────────────────┼────────────────┼──────────┤        ├───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤
│ io.netty:netty-common           │ CVE-2025-25193 │ MEDIUM   │        │ 4.1.117.Final     │ 4.1.118.Final  │ Denial of Service attack on windows app using Netty         │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2025-25193                  │
├─────────────────────────────────┼────────────────┼──────────┤        │                   │                ├─────────────────────────────────────────────────────────────┤
│ io.netty:netty-handler          │ CVE-2025-24970 │ HIGH     │        │                   │                │ io.netty:netty-handler: SslHandler doesn't correctly        │
│                                 │                │          │        │                   │                │ validate packets which can lead to native crash...          │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2025-24970                  │
├─────────────────────────────────┼────────────────┤          │        ├───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤
│ net.minidev:json-smart          │ CVE-2024-57699 │          │        │ 2.5.1             │ 2.5.2          │ A security issue was found in Netplex Json-smart 2.5.0      │
│                                 │                │          │        │                   │                │ through 2.5.1. ...                                          │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-57699                  │
├─────────────────────────────────┼────────────────┼──────────┤        ├───────────────────┼────────────────┼─────────────────────────────────────────────────────────────┤
│ org.bouncycastle:bcpkix-jdk18on │ CVE-2023-33202 │ MEDIUM   │        │ 1.72              │ 1.73           │ bc-java: Out of memory while parsing ASN.1 crafted data in  │
│                                 │                │          │        │                   │                │ org.bouncycastle.openssl.PEMParser class...                 │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2023-33202                  │
├─────────────────────────────────┼────────────────┤          │        │                   ├────────────────┼─────────────────────────────────────────────────────────────┤
│ org.bouncycastle:bcprov-jdk18on │ CVE-2023-33201 │          │        │                   │ 1.74           │ bouncycastle: potential blind LDAP injection attack using a │
│                                 │                │          │        │                   │                │ self-signed certificate                                     │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2023-33201                  │
│                                 ├────────────────┤          │        │                   ├────────────────┼─────────────────────────────────────────────────────────────┤
│                                 │ CVE-2023-33202 │          │        │                   │ 1.73           │ bc-java: Out of memory while parsing ASN.1 crafted data in  │
│                                 │                │          │        │                   │                │ org.bouncycastle.openssl.PEMParser class...                 │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2023-33202                  │
│                                 ├────────────────┤          │        │                   ├────────────────┼─────────────────────────────────────────────────────────────┤
│                                 │ CVE-2024-29857 │          │        │                   │ 1.78           │ org.bouncycastle: Importing an EC certificate with crafted  │
│                                 │                │          │        │                   │                │ F2m parameters may lead to...                               │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-29857                  │
│                                 ├────────────────┤          │        │                   │                ├─────────────────────────────────────────────────────────────┤
│                                 │ CVE-2024-30171 │          │        │                   │                │ bc-java: BouncyCastle vulnerable to a timing variant of     │
│                                 │                │          │        │                   │                │ Bleichenbacher (Marvin Attack)                              │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-30171                  │
│                                 ├────────────────┼──────────┤        │                   │                ├─────────────────────────────────────────────────────────────┤
│                                 │ CVE-2024-34447 │ LOW      │        │                   │                │ org.bouncycastle: Use of Incorrectly-Resolved Name or       │
│                                 │                │          │        │                   │                │ Reference                                                   │
│                                 │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-34447                  │
└─────────────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴────────────────┴─────────────────────────────────────────────────────────────┘


@0dd 0dd added the bug Something isn't working label Feb 23, 2025
@0dd
Copy link
Author

0dd commented Feb 23, 2025

Upgrade Springboot version from 3.4.2 to 3.4.3 to fix the high severity CVE from netty

Fix in #3188

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant