Skip to content

appcues-5.0.0.aar: 1 vulnerabilities (highest severity is: 5.9) #95

@appcues-wss

Description

@appcues-wss
Vulnerable Library - appcues-5.0.0.aar

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okio/okio-jvm/3.3.0/441db5e3f85f26d8891b7ae05cffb9a1a67ee54f/okio-jvm-3.3.0.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okio/okio-jvm/3.3.0/441db5e3f85f26d8891b7ae05cffb9a1a67ee54f/okio-jvm-3.3.0.pom

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (appcues version) Remediation Possible**
CVE-2023-3635 Medium 5.9 okio-jvm-3.3.0.jar Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-3635

Vulnerable Library - okio-jvm-3.3.0.jar

A modern I/O API for Java

Library home page: https://github.com/square/okio/

Path to dependency file: /segment-appcues/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okio/okio-jvm/3.3.0/441db5e3f85f26d8891b7ae05cffb9a1a67ee54f/okio-jvm-3.3.0.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okio/okio-jvm/3.3.0/441db5e3f85f26d8891b7ae05cffb9a1a67ee54f/okio-jvm-3.3.0.pom

Dependency Hierarchy:

  • appcues-5.0.0.aar (Root Library)
    • moshi-1.15.0.jar
      • okio-3.3.0.jar
        • okio-jvm-3.3.0.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This may lead to denial of service of the Okio client when handling a crafted GZIP archive, by using the GzipSource class.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: 2023-07-12

URL: CVE-2023-3635

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-3635

Release Date: 2023-07-12

Fix Resolution: com.squareup.okio:okio-jvm:3.4.0

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions