jhipster-dependencies-8.7.2.pom: 1 vulnerabilities (highest severity is: 9.8) #9767
Labels
assessment
Pull requests that affect the corresponding module
core
Pull requests that affect the corresponding module
iris
Pull requests that affect the corresponding module
Mend: dependency security vulnerability
Security vulnerability detected by Mend
programming
Pull requests that affect the corresponding module
Vulnerable Library - jhipster-dependencies-8.7.2.pom
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/10.1.33/d4d10b953164db057e4a803506e4552731e5a6a0/tomcat-embed-core-10.1.33.jar
Found in HEAD commit: c9f0c0df3aeb15b9978bd7f10ac66a7913f5a284
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-50379
Vulnerable Library - tomcat-embed-core-10.1.33.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/10.1.33/d4d10b953164db057e4a803506e4552731e5a6a0/tomcat-embed-core-10.1.33.jar
Dependency Hierarchy:
Found in HEAD commit: c9f0c0df3aeb15b9978bd7f10ac66a7913f5a284
Found in base branch: develop
Vulnerability Details
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.
Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.08, which fixes the issue.
Publish Date: 2024-12-17
URL: CVE-2024-50379
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://tomcat.apache.org/security-11.html
Release Date: 2024-12-17
Fix Resolution: org.apache.tomcat:tomcat-catalina:9.0.98,10.1.34,11.0.2, org.apache.tomcat.embed:tomcat-embed-core:9.0.98,10.1.34,11.0.2
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: