René's URL Explorer Experiment


Title: CVE-2021-29425 (Medium) detected in commons-io-1.3.2.jar · Issue #7 · turkdevops/browserstack-local-java · GitHub

Open Graph Title: CVE-2021-29425 (Medium) detected in commons-io-1.3.2.jar · Issue #7 · turkdevops/browserstack-local-java

X Title: CVE-2021-29425 (Medium) detected in commons-io-1.3.2.jar · Issue #7 · turkdevops/browserstack-local-java

Description: CVE-2021-29425 - Medium Severity Vulnerability Vulnerable Library - commons-io-1.3.2.jar Commons-IO contains utility classes, stream implementations, file filters, and endian classes. Path to dependency file: /pom.xml Path to vulnerable ...

Open Graph Description: CVE-2021-29425 - Medium Severity Vulnerability Vulnerable Library - commons-io-1.3.2.jar Commons-IO contains utility classes, stream implementations, file filters, and endian classes. Path to depen...

X Description: CVE-2021-29425 - Medium Severity Vulnerability Vulnerable Library - commons-io-1.3.2.jar Commons-IO contains utility classes, stream implementations, file filters, and endian classes. Path to depen...

Opengraph URL: https://github.com/turkdevops/browserstack-local-java/issues/7

X: @github

direct link

Domain: patch-diff.githubusercontent.com


Hey, it has json ld scripts:
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"CVE-2021-29425 (Medium) detected in commons-io-1.3.2.jar","articleBody":"## CVE-2021-29425 - Medium Severity Vulnerability\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20\u003e Vulnerable Library - \u003cb\u003ecommons-io-1.3.2.jar\u003c/b\u003e\u003c/p\u003e\u003c/summary\u003e\n\n\u003cp\u003eCommons-IO contains utility classes, stream implementations, file filters, and endian classes.\u003c/p\u003e\n\u003cp\u003ePath to dependency file: /pom.xml\u003c/p\u003e\n\u003cp\u003ePath to vulnerable library: /canner/.m2/repository/commons-io/commons-io/1.3.2/commons-io-1.3.2.jar\u003c/p\u003e\n\u003cp\u003e\n\nDependency Hierarchy:\n  - :x: **commons-io-1.3.2.jar** (Vulnerable Library)\n\u003cp\u003eFound in base branch: \u003cb\u003emaster\u003c/b\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20\u003e Vulnerability Details\u003c/summary\u003e\n\u003cp\u003e  \n  \nIn Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like \"//../foo\", or \"\\\\..\\foo\", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus \"limited\" path traversal), if the calling code would use the result to construct a path value.\n\n\u003cp\u003ePublish Date: 2021-04-13\n\u003cp\u003eURL: \u003ca href=https://www.mend.io/vulnerability-database/CVE-2021-29425\u003eCVE-2021-29425\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20\u003e CVSS 3 Score Details (\u003cb\u003e4.8\u003c/b\u003e)\u003c/summary\u003e\n\u003cp\u003e\n\nBase Score Metrics:\n- Exploitability Metrics:\n  - Attack Vector: Network\n  - Attack Complexity: High\n  - Privileges Required: None\n  - User Interaction: None\n  - Scope: Unchanged\n- Impact Metrics:\n  - Confidentiality Impact: Low\n  - Integrity Impact: Low\n  - Availability Impact: None\n\u003c/p\u003e\nFor more information on CVSS3 Scores, click \u003ca href=\"https://www.first.org/cvss/calculator/3.0\"\u003ehere\u003c/a\u003e.\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20\u003e Suggested Fix\u003c/summary\u003e\n\u003cp\u003e\n\n\u003cp\u003eType: Upgrade version\u003c/p\u003e\n\u003cp\u003eOrigin: \u003ca href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425\"\u003ehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eRelease Date: 2021-04-13\u003c/p\u003e\n\u003cp\u003eFix Resolution: 2.7\u003c/p\u003e\n\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\n***\nStep up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)","author":{"url":"https://github.com/mend-bolt-for-github[bot]","@type":"Person","name":"mend-bolt-for-github[bot]"},"datePublished":"2023-01-07T01:22:19.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/7/browserstack-local-java/issues/7"}

route-pattern/_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format)
route-controllervoltron_issues_fragments
route-actionissue_layout
fetch-noncev2:e2bc037b-e8e5-f589-266a-8bbf72334f99
current-catalog-service-hash81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114
request-id9400:29F2AE:3C7363:4FC28F:697309FC
html-safe-noncecd65bd9277fe7c3892910ac3f80d0c44c3a0c7bf918a835904429601d518df13
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiI5NDAwOjI5RjJBRTozQzczNjM6NEZDMjhGOjY5NzMwOUZDIiwidmlzaXRvcl9pZCI6IjcwNzEyODczNTEwNzM1MDc4MzYiLCJyZWdpb25fZWRnZSI6ImlhZCIsInJlZ2lvbl9yZW5kZXIiOiJpYWQifQ==
visitor-hmac98cc702cd14d07baa43794e00d504fd35ec0cd271f2d5cfac0862942a1a4738d
hovercard-subject-tagissue:1523381723
github-keyboard-shortcutsrepository,issues,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location///voltron/issues_fragments/issue_layout
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/turkdevops/browserstack-local-java/7/issue_layout
twitter:imagehttps://opengraph.githubassets.com/b7e6a139883fc2231c245cb68731053310d57b74002b5891062deecb41fb8bf2/turkdevops/browserstack-local-java/issues/7
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/b7e6a139883fc2231c245cb68731053310d57b74002b5891062deecb41fb8bf2/turkdevops/browserstack-local-java/issues/7
og:image:altCVE-2021-29425 - Medium Severity Vulnerability Vulnerable Library - commons-io-1.3.2.jar Commons-IO contains utility classes, stream implementations, file filters, and endian classes. Path to depen...
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
og:author:usernamemend-bolt-for-github[bot]
hostnamegithub.com
expected-hostnamegithub.com
None44ab3188c1dcfe3be0f9c3feca2e04e14fb79f120939ce2395e4f15ab96ec1d4
turbo-cache-controlno-preview
go-importgithub.com/turkdevops/browserstack-local-java git https://github.com/turkdevops/browserstack-local-java.git
octolytics-dimension-user_id67343988
octolytics-dimension-user_loginturkdevops
octolytics-dimension-repository_id380028467
octolytics-dimension-repository_nwoturkdevops/browserstack-local-java
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forktrue
octolytics-dimension-repository_parent_id51923142
octolytics-dimension-repository_parent_nwobrowserstack/browserstack-local-java
octolytics-dimension-repository_network_root_id51923142
octolytics-dimension-repository_network_root_nwobrowserstack/browserstack-local-java
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
releasea5e2b48bd1260476599758f5d253b5d24092ab84
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/issues/7#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fturkdevops%2Fbrowserstack-local-java%2Fissues%2F7
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fturkdevops%2Fbrowserstack-local-java%2Fissues%2F7
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E%2Fvoltron%2Fissues_fragments%2Fissue_layout&source=header-repo&source_repo=turkdevops%2Fbrowserstack-local-java
Reloadhttps://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/issues/7
Reloadhttps://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/issues/7
Reloadhttps://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/issues/7
turkdevops https://patch-diff.githubusercontent.com/turkdevops
browserstack-local-javahttps://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java
browserstack/browserstack-local-javahttps://patch-diff.githubusercontent.com/browserstack/browserstack-local-java
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fturkdevops%2Fbrowserstack-local-java
Fork 0 https://patch-diff.githubusercontent.com/login?return_to=%2Fturkdevops%2Fbrowserstack-local-java
Star 1 https://patch-diff.githubusercontent.com/login?return_to=%2Fturkdevops%2Fbrowserstack-local-java
Code https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java
Issues 3 https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/issues
Pull requests 1 https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/pulls
Discussions https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/discussions
Actions https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/actions
Projects 0 https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/projects
Security 0 https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/security
Insights https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/pulse
Code https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java
Issues https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/issues
Pull requests https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/pulls
Discussions https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/discussions
Actions https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/actions
Projects https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/projects
Security https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/security
Insights https://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/pulse
New issuehttps://patch-diff.githubusercontent.com/login?return_to=https://github.com/turkdevops/browserstack-local-java/issues/7
New issuehttps://patch-diff.githubusercontent.com/login?return_to=https://github.com/turkdevops/browserstack-local-java/issues/7
CVE-2021-29425 (Medium) detected in commons-io-1.3.2.jarhttps://patch-diff.githubusercontent.com/turkdevops/browserstack-local-java/issues/7#top
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourcehttps://github.com/turkdevops/browserstack-local-java/issues?q=state%3Aopen%20label%3A%22Mend%3A%20dependency%20security%20vulnerability%22
https://github.com/apps/mend-bolt-for-github
https://github.com/apps/mend-bolt-for-github
mend-bolt-for-githubhttps://github.com/apps/mend-bolt-for-github
on Jan 7, 2023https://github.com/turkdevops/browserstack-local-java/issues/7#issue-1523381723
CVE-2021-29425https://github.com/advisories/GHSA-gwrp-pvrq-jmwv
https://camo.githubusercontent.com/7f707ecbb163ab74b555da5daea2f4e73596a00ea0f498a511bb2245fe6dcafc/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f76756c6e65726162696c6974795f64657461696c732e706e67
https://camo.githubusercontent.com/f9f200a7c4440310647c7e7ca57c98f5749c6d1803e68db0d25cd69edd8a2207/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f6d656469756d5f76756c2e706e673f
CVE-2021-29425https://www.mend.io/vulnerability-database/CVE-2021-29425
https://camo.githubusercontent.com/8b05d7d0c83d5dc1f3422d1e4497c6a700365c61fc1dd1e3769cd369cdeb63a5/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f63767373332e706e67
herehttps://www.first.org/cvss/calculator/3.0
https://camo.githubusercontent.com/a06e014122a02d3958748cbca226e8fc721aaef2a61d9ec4be1c79248702fdd7/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f7375676765737465645f6669782e706e67
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425
herehttps://www.whitesourcesoftware.com/full_solution_bolt_github
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourcehttps://github.com/turkdevops/browserstack-local-java/issues?q=state%3Aopen%20label%3A%22Mend%3A%20dependency%20security%20vulnerability%22
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.