Title: CVE-2021-29425 (Medium) detected in commons-io-1.3.2.jar · Issue #7 · turkdevops/browserstack-local-java · GitHub
Open Graph Title: CVE-2021-29425 (Medium) detected in commons-io-1.3.2.jar · Issue #7 · turkdevops/browserstack-local-java
X Title: CVE-2021-29425 (Medium) detected in commons-io-1.3.2.jar · Issue #7 · turkdevops/browserstack-local-java
Description: CVE-2021-29425 - Medium Severity Vulnerability Vulnerable Library - commons-io-1.3.2.jar Commons-IO contains utility classes, stream implementations, file filters, and endian classes. Path to dependency file: /pom.xml Path to vulnerable ...
Open Graph Description: CVE-2021-29425 - Medium Severity Vulnerability Vulnerable Library - commons-io-1.3.2.jar Commons-IO contains utility classes, stream implementations, file filters, and endian classes. Path to depen...
X Description: CVE-2021-29425 - Medium Severity Vulnerability Vulnerable Library - commons-io-1.3.2.jar Commons-IO contains utility classes, stream implementations, file filters, and endian classes. Path to depen...
Opengraph URL: https://github.com/turkdevops/browserstack-local-java/issues/7
X: @github
Domain: patch-diff.githubusercontent.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"CVE-2021-29425 (Medium) detected in commons-io-1.3.2.jar","articleBody":"## CVE-2021-29425 - Medium Severity Vulnerability\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20\u003e Vulnerable Library - \u003cb\u003ecommons-io-1.3.2.jar\u003c/b\u003e\u003c/p\u003e\u003c/summary\u003e\n\n\u003cp\u003eCommons-IO contains utility classes, stream implementations, file filters, and endian classes.\u003c/p\u003e\n\u003cp\u003ePath to dependency file: /pom.xml\u003c/p\u003e\n\u003cp\u003ePath to vulnerable library: /canner/.m2/repository/commons-io/commons-io/1.3.2/commons-io-1.3.2.jar\u003c/p\u003e\n\u003cp\u003e\n\nDependency Hierarchy:\n - :x: **commons-io-1.3.2.jar** (Vulnerable Library)\n\u003cp\u003eFound in base branch: \u003cb\u003emaster\u003c/b\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20\u003e Vulnerability Details\u003c/summary\u003e\n\u003cp\u003e \n \nIn Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like \"//../foo\", or \"\\\\..\\foo\", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus \"limited\" path traversal), if the calling code would use the result to construct a path value.\n\n\u003cp\u003ePublish Date: 2021-04-13\n\u003cp\u003eURL: \u003ca href=https://www.mend.io/vulnerability-database/CVE-2021-29425\u003eCVE-2021-29425\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20\u003e CVSS 3 Score Details (\u003cb\u003e4.8\u003c/b\u003e)\u003c/summary\u003e\n\u003cp\u003e\n\nBase Score Metrics:\n- Exploitability Metrics:\n - Attack Vector: Network\n - Attack Complexity: High\n - Privileges Required: None\n - User Interaction: None\n - Scope: Unchanged\n- Impact Metrics:\n - Confidentiality Impact: Low\n - Integrity Impact: Low\n - Availability Impact: None\n\u003c/p\u003e\nFor more information on CVSS3 Scores, click \u003ca href=\"https://www.first.org/cvss/calculator/3.0\"\u003ehere\u003c/a\u003e.\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20\u003e Suggested Fix\u003c/summary\u003e\n\u003cp\u003e\n\n\u003cp\u003eType: Upgrade version\u003c/p\u003e\n\u003cp\u003eOrigin: \u003ca href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425\"\u003ehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eRelease Date: 2021-04-13\u003c/p\u003e\n\u003cp\u003eFix Resolution: 2.7\u003c/p\u003e\n\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\n***\nStep up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)","author":{"url":"https://github.com/mend-bolt-for-github[bot]","@type":"Person","name":"mend-bolt-for-github[bot]"},"datePublished":"2023-01-07T01:22:19.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/7/browserstack-local-java/issues/7"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:e2bc037b-e8e5-f589-266a-8bbf72334f99 |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | 9400:29F2AE:3C7363:4FC28F:697309FC |
| html-safe-nonce | cd65bd9277fe7c3892910ac3f80d0c44c3a0c7bf918a835904429601d518df13 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiI5NDAwOjI5RjJBRTozQzczNjM6NEZDMjhGOjY5NzMwOUZDIiwidmlzaXRvcl9pZCI6IjcwNzEyODczNTEwNzM1MDc4MzYiLCJyZWdpb25fZWRnZSI6ImlhZCIsInJlZ2lvbl9yZW5kZXIiOiJpYWQifQ== |
| visitor-hmac | 98cc702cd14d07baa43794e00d504fd35ec0cd271f2d5cfac0862942a1a4738d |
| hovercard-subject-tag | issue:1523381723 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/turkdevops/browserstack-local-java/7/issue_layout |
| twitter:image | https://opengraph.githubassets.com/b7e6a139883fc2231c245cb68731053310d57b74002b5891062deecb41fb8bf2/turkdevops/browserstack-local-java/issues/7 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/b7e6a139883fc2231c245cb68731053310d57b74002b5891062deecb41fb8bf2/turkdevops/browserstack-local-java/issues/7 |
| og:image:alt | CVE-2021-29425 - Medium Severity Vulnerability Vulnerable Library - commons-io-1.3.2.jar Commons-IO contains utility classes, stream implementations, file filters, and endian classes. Path to depen... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | mend-bolt-for-github[bot] |
| hostname | github.com |
| expected-hostname | github.com |
| None | 44ab3188c1dcfe3be0f9c3feca2e04e14fb79f120939ce2395e4f15ab96ec1d4 |
| turbo-cache-control | no-preview |
| go-import | github.com/turkdevops/browserstack-local-java git https://github.com/turkdevops/browserstack-local-java.git |
| octolytics-dimension-user_id | 67343988 |
| octolytics-dimension-user_login | turkdevops |
| octolytics-dimension-repository_id | 380028467 |
| octolytics-dimension-repository_nwo | turkdevops/browserstack-local-java |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | true |
| octolytics-dimension-repository_parent_id | 51923142 |
| octolytics-dimension-repository_parent_nwo | browserstack/browserstack-local-java |
| octolytics-dimension-repository_network_root_id | 51923142 |
| octolytics-dimension-repository_network_root_nwo | browserstack/browserstack-local-java |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | a5e2b48bd1260476599758f5d253b5d24092ab84 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width