telegrambots-abilities-6.5.0.jar: 4 vulnerabilities (highest severity is: 8.1)
mend-bolt-for-github opened this issue · 0 comments
Vulnerable Library - telegrambots-abilities-6.5.0.jar
Path to dependency file: /internal/services/bot/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Found in HEAD commit: a9d3cdab2cd20c7ee948996ab092931e5f0f465c
Vulnerabilities
CVE | Severity | CVSS | Dependency | Type | Fixed in (telegrambots-abilities version) | Remediation Available |
---|---|---|---|---|---|---|
CVE-2019-10101 | High | 8.1 | detected in multiple dependencies | Transitive | N/A* | ❌ |
CVE-2019-10103 | High | 8.1 | detected in multiple dependencies | Transitive | N/A* | ❌ |
CVE-2019-10102 | High | 8.1 | detected in multiple dependencies | Transitive | N/A* | ❌ |
CVE-2022-24329 | Medium | 5.3 | kotlin-stdlib-1.2.71.jar | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
CVE-2019-10101
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /internal/services/bot/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
- telegrambots-abilities-6.5.0.jar (Root Library)
- mapdb-3.0.8.jar
- kotlin-stdlib-1.2.71.jar
- ❌ kotlin-stdlib-common-1.2.71.jar (Vulnerable Library)
- kotlin-stdlib-1.2.71.jar
- mapdb-3.0.8.jar
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /internal/services/bot/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- telegrambots-abilities-6.5.0.jar (Root Library)
- mapdb-3.0.8.jar
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
- mapdb-3.0.8.jar
Found in HEAD commit: a9d3cdab2cd20c7ee948996ab092931e5f0f465c
Found in base branch: main
Vulnerability Details
JetBrains Kotlin versions before 1.3.30 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack.
Publish Date: 2019-07-03
URL: CVE-2019-10101
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10101
Release Date: 2019-07-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
Step up your Open Source Security Game with Mend here
CVE-2019-10103
Vulnerable Libraries - kotlin-stdlib-common-1.2.71.jar, kotlin-stdlib-1.2.71.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /internal/services/bot/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
- telegrambots-abilities-6.5.0.jar (Root Library)
- mapdb-3.0.8.jar
- kotlin-stdlib-1.2.71.jar
- ❌ kotlin-stdlib-common-1.2.71.jar (Vulnerable Library)
- kotlin-stdlib-1.2.71.jar
- mapdb-3.0.8.jar
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /internal/services/bot/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- telegrambots-abilities-6.5.0.jar (Root Library)
- mapdb-3.0.8.jar
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
- mapdb-3.0.8.jar
Found in HEAD commit: a9d3cdab2cd20c7ee948996ab092931e5f0f465c
Found in base branch: main
Vulnerability Details
JetBrains IntelliJ IDEA projects created using the Kotlin (JS Client/JVM Server) IDE Template were resolving Gradle artifacts using an http connection, potentially allowing an MITM attack. This issue, which was fixed in Kotlin plugin version 1.3.30, is similar to CVE-2019-10101.
Publish Date: 2019-07-03
URL: CVE-2019-10103
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10103
Release Date: 2019-07-03
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
Step up your Open Source Security Game with Mend here
CVE-2019-10102
Vulnerable Libraries - kotlin-stdlib-1.2.71.jar, kotlin-stdlib-common-1.2.71.jar
kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /internal/services/bot/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- telegrambots-abilities-6.5.0.jar (Root Library)
- mapdb-3.0.8.jar
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
- mapdb-3.0.8.jar
kotlin-stdlib-common-1.2.71.jar
Kotlin Common Standard Library
Path to dependency file: /internal/services/bot/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib-common/1.2.71/kotlin-stdlib-common-1.2.71.jar
Dependency Hierarchy:
- telegrambots-abilities-6.5.0.jar (Root Library)
- mapdb-3.0.8.jar
- kotlin-stdlib-1.2.71.jar
- ❌ kotlin-stdlib-common-1.2.71.jar (Vulnerable Library)
- kotlin-stdlib-1.2.71.jar
- mapdb-3.0.8.jar
Found in HEAD commit: a9d3cdab2cd20c7ee948996ab092931e5f0f465c
Found in base branch: main
Vulnerability Details
JetBrains Ktor framework (created using the Kotlin IDE template) versions before 1.1.0 were resolving artifacts using an http connection during the build process, potentially allowing an MITM attack. This issue was fixed in Kotlin plugin version 1.3.30.
Publish Date: 2019-07-03
URL: CVE-2019-10102
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10102
Release Date: 2019-07-03
Fix Resolution: io.ktor:ktor:1.1.0,org.jetbrains.kotlin:kotlin-stdlib:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-common:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk7:1.3.30,org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.3.30,org.jetbrains.kotlin:kotlin-reflect:1.3.30
Step up your Open Source Security Game with Mend here
CVE-2022-24329
Vulnerable Library - kotlin-stdlib-1.2.71.jar
Kotlin Standard Library for JVM
Path to dependency file: /internal/services/bot/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/jetbrains/kotlin/kotlin-stdlib/1.2.71/kotlin-stdlib-1.2.71.jar
Dependency Hierarchy:
- telegrambots-abilities-6.5.0.jar (Root Library)
- mapdb-3.0.8.jar
- ❌ kotlin-stdlib-1.2.71.jar (Vulnerable Library)
- mapdb-3.0.8.jar
Found in HEAD commit: a9d3cdab2cd20c7ee948996ab092931e5f0f465c
Found in base branch: main
Vulnerability Details
In JetBrains Kotlin before 1.6.0, it was not possible to lock dependencies for Multiplatform Gradle Projects.
Publish Date: 2022-02-25
URL: CVE-2022-24329
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-2qp4-g3q3-f92w
Release Date: 2022-02-25
Fix Resolution: org.jetbrains.kotlin:kotlin-stdlib:1.6.0
Step up your Open Source Security Game with Mend here