dptetc/soapbox-race

CVE-2022-25647 (High) detected in gson-2.8.0.jar

Opened this issue · 0 comments

CVE-2022-25647 - High Severity Vulnerability

Vulnerable Library - gson-2.8.0.jar

Gson JSON library

Library home page: https://github.com/google/gson

Path to dependency file: /pom.xml

Path to vulnerable library: /canner/.m2/repository/com/google/code/gson/gson/2.8.0/gson-2.8.0.jar

Dependency Hierarchy:

  • gson-2.8.0.jar (Vulnerable Library)

Found in HEAD commit: 7baeabef941f276d373d889506fe0a0cf89f4ee6

Found in base branch: master

Vulnerability Details

The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.

Publish Date: 2022-05-01

URL: CVE-2022-25647

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`

Release Date: 2022-05-01

Fix Resolution: 2.8.9


Step up your Open Source Security Game with Mend here