CVE-2024-47554 (High) detected in commons-io-2.11.0.jar #4790
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
triaged
Issues labeled as 'Triaged' have been reviewed and are deemed actionable.
CVE-2024-47554 - High Severity Vulnerability
Vulnerable Library - commons-io-2.11.0.jar
The Apache Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.
Library home page: https://www.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/commons-io/commons-io/2.11.0/a2503f302b11ebde7ebc3df41daebe0e4eea3689/commons-io-2.11.0.jar
Dependency Hierarchy:
Found in HEAD commit: 597953ff0de54c6511ce28618070e7896b31f52a
Found in base branch: main
Vulnerability Details
Uncontrolled Resource Consumption vulnerability in Apache Commons IO.
The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.
This issue affects Apache Commons IO: from 2.0 before 2.14.0.
Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.
Publish Date: 2024-10-03
URL: CVE-2024-47554
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1
Release Date: 2024-10-03
Fix Resolution: commons-io:commons-io:2.14.0
The text was updated successfully, but these errors were encountered: