CVE-2020-9493 (High) detected in log4j-1.2.14.jar - autoclosed
Closed this issue · 1 comments
CVE-2020-9493 - High Severity Vulnerability
Vulnerable Library - log4j-1.2.14.jar
Log4j
Library home page: http://logging.apache.org/log4j/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.14/log4j-1.2.14.jar
Dependency Hierarchy:
- ready-api-soapui-pro-1.3.0.jar (Root Library)
- ready-api-soapui-1.3.0.jar
- ❌ log4j-1.2.14.jar (Vulnerable Library)
- ready-api-soapui-1.3.0.jar
Found in base branch: master
Vulnerability Details
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
Publish Date: 2021-06-16
URL: CVE-2020-9493
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://www.openwall.com/lists/oss-security/2021/06/16/1
Release Date: 2021-06-16
Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.