Hello! we found a vulnerable dependency in your project.
JavaEcosystemResearch opened this issue · 0 comments
JavaEcosystemResearch commented
Hi! We spot a vulnerable dependency in your project, which might threaten your software. We also found another project that uses the same vulnerable dependency in a similar way as you did, and they have upgraded the dependency. We, thus, believe that your project is highly possible to be affected by this vulnerability similarly. The following shows the detailed information.
Vulnerability description
- CVE: CVE-2019-16943
- Vulnerable dependency: com.fasterxml.jackson.core:jackson-databind:2.9.8
- Vulnerable function: com.fasterxml.jackson.databind.JavaType:isEnumType()
- Invocation Path:
uk.gov.dstl.baleen.consumers.LocationElasticsearch:doProcess(org.apache.uima.jcas.JCas)
⬇️
com.fasterxml.jackson.databind.ObjectMapper:readValue(java.lang.String,java.lang.Class)
⬇️
...
⬇️
com.fasterxml.jackson.databind.JavaType:isEnumType()
Upgrade example
Another project also used the same dependency with a similar invocation path, and they have taken actions to resolve this issue.
- Project: https://github.com/visionarts/power-jambda
- Action commit:visionarts/power-jambda@c8ed091
- Invocation Path:
com.visionarts.powerjambda.actions.JsonBodyActionRequestReader:readRequest(com.visionarts.powerjambda.AwsProxyRequest)
⬇️
com.fasterxml.jackson.databind.ObjectMapper:readValue(java.lang.String,java.lang.Class)
⬇️
...
⬇️
com.fasterxml.jackson.databind.JavaType:isEnumType()
Therefore, you might also need to upgrade this dependency. Hope this can help you! 😄