You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-framework-cluster-protocol/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar
In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-framework-cluster-protocol/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar
In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-framework-cluster-protocol/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
JSON (JavaScript Object Notation) is a lightweight data-interchange format.
It is easy for humans to read and write. It is easy for machines to parse and generate.
It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition
- December 1999. JSON is a text format that is completely language independent but uses
conventions that are familiar to programmers of the C-family of languages, including C, C++, C#,
Java, JavaScript, Perl, Python, and many others.
These properties make JSON an ideal data-interchange language.
Path to vulnerable library: /home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
dev-mend-for-github-combot
changed the title
nifi-administration-1.4.0-SNAPSHOT.jar: 3 vulnerabilities (highest severity is: 6.5)
nifi-administration-1.4.0-SNAPSHOT.jar: 4 vulnerabilities (highest severity is: 6.5)
Jan 8, 2025
dev-mend-for-github-combot
changed the title
nifi-administration-1.4.0-SNAPSHOT.jar: 4 vulnerabilities (highest severity is: 6.5)
nifi-administration-1.4.0-SNAPSHOT.jar: 4 vulnerabilities (highest severity is: 6.5) - autoclosed
Jan 9, 2025
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
dev-mend-for-github-combot
changed the title
nifi-administration-1.4.0-SNAPSHOT.jar: 4 vulnerabilities (highest severity is: 6.5) - autoclosed
nifi-administration-1.4.0-SNAPSHOT.jar: 4 vulnerabilities (highest severity is: 6.5)
Jan 9, 2025
Vulnerable Library - nifi-administration-1.4.0-SNAPSHOT.jar
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar
Found in HEAD commit: d672f5c3ea38dd0e23359cf12d310c2c27abf963
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-20863
Vulnerable Library - spring-expression-5.2.18.RELEASE.jar
Spring Expression Language (SpEL)
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-framework-cluster-protocol/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: d672f5c3ea38dd0e23359cf12d310c2c27abf963
Found in base branch: master
Vulnerability Details
In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Publish Date: 2023-04-13
URL: CVE-2023-20863
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2023-20863
Release Date: 2023-04-13
Fix Resolution: org.springframework:spring-expression - 5.2.24.RELEASE,5.3.27,6.0.8
CVE-2023-20861
Vulnerable Library - spring-expression-5.2.18.RELEASE.jar
Spring Expression Language (SpEL)
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-framework-cluster-protocol/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: d672f5c3ea38dd0e23359cf12d310c2c27abf963
Found in base branch: master
Vulnerability Details
In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Publish Date: 2023-03-23
URL: CVE-2023-20861
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2023-20861
Release Date: 2023-03-23
Fix Resolution: org.springframework:spring-expression:x5.2.23.RELEASE,5.3.26,6.0.7
CVE-2022-22950
Vulnerable Library - spring-expression-5.2.18.RELEASE.jar
Spring Expression Language (SpEL)
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /nifi-nar-bundles/nifi-framework-bundle/nifi-framework/nifi-framework-cluster-protocol/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.18.RELEASE/spring-expression-5.2.18.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: d672f5c3ea38dd0e23359cf12d310c2c27abf963
Found in base branch: master
Vulnerability Details
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
Publish Date: 2022-04-01
URL: CVE-2022-22950
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://tanzu.vmware.com/security/cve-2022-22950
Release Date: 2022-04-01
Fix Resolution: org.springframework:spring-expression:5.2.20,5.3.17
CVE-2021-27568
Vulnerable Library - json-smart-2.1.1.jar
JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.
Library home page: http://www.minidev.net/
Path to dependency file: /nifi-mock/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.1.1/json-smart-2.1.1.jar
Dependency Hierarchy:
Found in HEAD commit: d672f5c3ea38dd0e23359cf12d310c2c27abf963
Found in base branch: master
Vulnerability Details
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
Publish Date: 2021-02-23
URL: CVE-2021-27568
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2021-02-23
Fix Resolution: net.minidev:json-smart-mini:1.3.2;net.minidev:json-smart:1.3.2,2.3.1,2.4.2;net.minidev:json-smart-action:2.3.1,2.4.2
The text was updated successfully, but these errors were encountered: