You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /TrafficCapture/trafficCaptureProxyServerTest/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.jayway.jsonpath/json-path/2.8.0/b4ab3b7a9e425655a0ca65487bbbd6d7ddb75160/json-path-2.8.0.jar
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Path to dependency file: /TrafficCapture/trafficCaptureProxyServerTest/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.jayway.jsonpath/json-path/2.8.0/b4ab3b7a9e425655a0ca65487bbbd6d7ddb75160/json-path-2.8.0.jar
mend-for-github-combot
changed the title
ApacheJMeter_http-5.6.2.jar: 1 vulnerabilities (highest severity is: 7.5)
ApacheJMeter_http-5.6.2.jar: 1 vulnerabilities (highest severity is: 5.3)
Jan 16, 2024
Vulnerable Library - ApacheJMeter_http-5.6.2.jar
Path to dependency file: /TrafficCapture/trafficCaptureProxyServerTest/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.jayway.jsonpath/json-path/2.8.0/b4ab3b7a9e425655a0ca65487bbbd6d7ddb75160/json-path-2.8.0.jar
Found in HEAD commit: 75ff259c3448f89d01f5578ab5dff0f323c67b35
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-51074
Vulnerable Library - json-path-2.8.0.jar
A library to query and verify JSON
Library home page: https://github.com/jayway/JsonPath
Path to dependency file: /TrafficCapture/trafficCaptureProxyServerTest/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.jayway.jsonpath/json-path/2.8.0/b4ab3b7a9e425655a0ca65487bbbd6d7ddb75160/json-path-2.8.0.jar
Dependency Hierarchy:
Found in HEAD commit: 75ff259c3448f89d01f5578ab5dff0f323c67b35
Found in base branch: main
Vulnerability Details
json-path v2.8.0 was discovered to contain a stack overflow via the Criteria.parse() method.
Publish Date: 2023-12-27
URL: CVE-2023-51074
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-51074
Release Date: 2023-12-27
Fix Resolution: com.jayway.jsonpath:json-path:2.9.0
The text was updated successfully, but these errors were encountered: