madhon/ReactiveETL

CVE-2024-35255 (Medium) detected in azure.identity.1.11.0.nupkg - autoclosed

mend-bolt-for-github opened this issue · 1 comments

CVE-2024-35255 - Medium Severity Vulnerability

Vulnerable Library - azure.identity.1.11.0.nupkg

This is the implementation of the Azure SDK Client Library for Azure Identity

Library home page: https://api.nuget.org/packages/azure.identity.1.11.0.nupkg

Path to dependency file: /ReactiveETL.Tests/ReactiveETL.Tests.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/azure.identity/1.11.0/azure.identity.1.11.0.nupkg

Dependency Hierarchy:

  • azure.identity.1.11.0.nupkg (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability

Publish Date: 2024-06-11

URL: CVE-2024-35255

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-m5vv-6r4h-3vj9

Release Date: 2024-06-11

Fix Resolution: @azure/identity (npm) - 4.2.1, @azure/msal-node (npm) - 2.9.1, Azure.Identity (NuGet) - 1.11.4, Microsoft.Identity.Client (NuGet) - 4.61.3, azure-identity (pip) - 1.16.1, com.azure:azure-identity:1.12.2 (Maven), github.com/Azure/azure-sdk-for-go/sdk/azidentity (go) - 1.6.0


Step up your Open Source Security Game with Mend here

✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.