-
Notifications
You must be signed in to change notification settings - Fork 370
Description
Hi,
The ESAPI library still depends on Commons Collections 3.x, which contains a known vulnerability.
Apache Commons Collections is a transitive dependency of Apache Commons BeanUtils.
BeanUtils itself has been updated to use Commons Collections 4.x starting with BeanUtils version 2.
Is there any plan to update the BeanUtils version used in ESAPI?
Vulnerability reported by Sonatype:
https://devhub.checkmarx.com/cve-details/Cx78f40514-81ff/
Explanation: The Apache
commons-collectionspackages are vulnerable to a Denial of Service (DoS) attack. Theadd()method of theSetUniqueListclass mishandles the order of operations when invoking its parentListimplementation. Consequently, adding an instance of itself results in infinite recursion and deviates from the behavior defined by the standard JREListcontract. A remote attacker who can cause an application to addSetUniqueListinstances to themselves can exploit this vulnerability to crash the affected application with aStackOverflowErrorexception.
Detection: The application is vulnerable by using this component.
Recommendation: We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
Note forcommons-collections:commons-collectionsusers: The component and its vulnerable classes were relocated (moved) toorg.apache.commons:commons-collections4in later versions. As such, users should upgrade to a fixed version ofcommons-collections4instead.
Note: If this component is included as a bundled/transitive dependency of another component, there may not be an upgrade path. In this instance, we recommend contacting the maintainers who included the vulnerable package. Alternatively, we recommend investigating alternative components or a potential mitigating control.
Threat Vectors: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:NFull Sonatype Scan Report
Issue sonatype-2024-3350
Source Sonatype Data Research
SONATYPE Policy Name Security-High
SONATYPE Threat Level 7
CVE CWE 674
CWE URL https://cwe.mitre.org/data/definitions/674.html
CVE CVSS 3.0 Not Set
CVE CVSS 2.0 Not Set
SONATYPE CVSS 3.0 Not Set
Remediation No recommended versions are available for the current component.