|
| 1 | +{ |
| 2 | + "ok": false, |
| 3 | + "vulnerabilities": [ |
| 4 | + { |
| 5 | + "id": "SNYK-JAVA-JUNIT-1017047", |
| 6 | + "title": "Information Exposure", |
| 7 | + "CVSSv3": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:R", |
| 8 | + "credit": [ |
| 9 | + "Jonathan Leitschuh" |
| 10 | + ], |
| 11 | + "semver": { |
| 12 | + "vulnerable": [ |
| 13 | + "[4.7,4.13.1)" |
| 14 | + ] |
| 15 | + }, |
| 16 | + "exploit": "Proof of Concept", |
| 17 | + "fixedIn": [ |
| 18 | + "4.13.1" |
| 19 | + ], |
| 20 | + "patches": [], |
| 21 | + "insights": { |
| 22 | + "triageAdvice": "This vulnerability is only applicable on Linux operating systems" |
| 23 | + }, |
| 24 | + "language": "java", |
| 25 | + "severity": "low", |
| 26 | + "cvssScore": 2.9, |
| 27 | + "functions": [ |
| 28 | + { |
| 29 | + "version": [ |
| 30 | + "[4.7,4.11-beta-1)" |
| 31 | + ], |
| 32 | + "functionId": { |
| 33 | + "filePath": "org/junit/rules/TemporaryFolder.java", |
| 34 | + "className": "TemporaryFolder", |
| 35 | + "functionName": "newFolder" |
| 36 | + } |
| 37 | + }, |
| 38 | + { |
| 39 | + "version": [ |
| 40 | + "[4.11-beta-1,4.13.1)" |
| 41 | + ], |
| 42 | + "functionId": { |
| 43 | + "filePath": "org/junit/rules/TemporaryFolder.java", |
| 44 | + "className": "TemporaryFolder", |
| 45 | + "functionName": "createTemporaryFolderIn" |
| 46 | + } |
| 47 | + } |
| 48 | + ], |
| 49 | + "malicious": false, |
| 50 | + "isDisputed": false, |
| 51 | + "moduleName": "junit:junit", |
| 52 | + "references": [ |
| 53 | + { |
| 54 | + "url": "https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae", |
| 55 | + "title": "GitHub Commit" |
| 56 | + }, |
| 57 | + { |
| 58 | + "url": "https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp", |
| 59 | + "title": "POC: GitHub Advisory" |
| 60 | + } |
| 61 | + ], |
| 62 | + "cvssDetails": [ |
| 63 | + { |
| 64 | + "assigner": "NVD", |
| 65 | + "severity": "medium", |
| 66 | + "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", |
| 67 | + "cvssV3BaseScore": 5.5, |
| 68 | + "modificationTime": "2024-03-11T09:49:11.114404Z" |
| 69 | + }, |
| 70 | + { |
| 71 | + "assigner": "Red Hat", |
| 72 | + "severity": "medium", |
| 73 | + "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", |
| 74 | + "cvssV3BaseScore": 4, |
| 75 | + "modificationTime": "2024-03-11T09:52:05.359911Z" |
| 76 | + } |
| 77 | + ], |
| 78 | + "cvssSources": [ |
| 79 | + { |
| 80 | + "type": "primary", |
| 81 | + "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:R", |
| 82 | + "assigner": "Snyk", |
| 83 | + "severity": "low", |
| 84 | + "baseScore": 2.9, |
| 85 | + "cvssVersion": "3.1", |
| 86 | + "modificationTime": "2024-03-06T14:02:14.725467Z" |
| 87 | + }, |
| 88 | + { |
| 89 | + "type": "secondary", |
| 90 | + "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", |
| 91 | + "assigner": "NVD", |
| 92 | + "severity": "medium", |
| 93 | + "baseScore": 5.5, |
| 94 | + "cvssVersion": "3.1", |
| 95 | + "modificationTime": "2024-03-11T09:49:11.114404Z" |
| 96 | + }, |
| 97 | + { |
| 98 | + "type": "secondary", |
| 99 | + "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", |
| 100 | + "assigner": "Red Hat", |
| 101 | + "severity": "medium", |
| 102 | + "baseScore": 4, |
| 103 | + "cvssVersion": "3.1", |
| 104 | + "modificationTime": "2024-03-11T09:52:05.359911Z" |
| 105 | + } |
| 106 | + ], |
| 107 | + "description": "## Overview\n[junit:junit](https://mvnrepository.com/artifact/junit/junit) is an unit testing framework for Java\n\nAffected versions of this package are vulnerable to Information Exposure. The JUnit4 test rule `TemporaryFolder` contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system.\r\n\r\n*Note:* This vulnerability does not allow other users to overwrite the contents of these directories or files.\r\nThis only affects Unix like systems.\n## Remediation\nUpgrade `junit:junit` to version 4.13.1 or higher.\n## References\n- [GitHub Commit](https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae)\n- [POC: GitHub Advisory](https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp)\n", |
| 108 | + "epssDetails": { |
| 109 | + "percentile": "0.30006", |
| 110 | + "probability": "0.00066", |
| 111 | + "modelVersion": "v2023.03.01" |
| 112 | + }, |
| 113 | + "identifiers": { |
| 114 | + "CVE": [ |
| 115 | + "CVE-2020-15250" |
| 116 | + ], |
| 117 | + "CWE": [ |
| 118 | + "CWE-200" |
| 119 | + ], |
| 120 | + "GHSA": [ |
| 121 | + "GHSA-269g-pwp5-87pp" |
| 122 | + ] |
| 123 | + }, |
| 124 | + "packageName": "junit:junit", |
| 125 | + "proprietary": true, |
| 126 | + "creationTime": "2020-10-12T10:07:32.302340Z", |
| 127 | + "functions_new": [ |
| 128 | + { |
| 129 | + "version": [ |
| 130 | + "[4.7,4.11-beta-1)" |
| 131 | + ], |
| 132 | + "functionId": { |
| 133 | + "className": "org.junit.rules.TemporaryFolder", |
| 134 | + "functionName": "newFolder" |
| 135 | + } |
| 136 | + }, |
| 137 | + { |
| 138 | + "version": [ |
| 139 | + "[4.11-beta-1,4.13.1)" |
| 140 | + ], |
| 141 | + "functionId": { |
| 142 | + "className": "org.junit.rules.TemporaryFolder", |
| 143 | + "functionName": "createTemporaryFolderIn" |
| 144 | + } |
| 145 | + } |
| 146 | + ], |
| 147 | + "alternativeIds": [], |
| 148 | + "disclosureTime": "2020-10-12T10:07:30Z", |
| 149 | + "exploitDetails": { |
| 150 | + "sources": [ |
| 151 | + "Snyk" |
| 152 | + ], |
| 153 | + "maturityLevels": [ |
| 154 | + { |
| 155 | + "type": "secondary", |
| 156 | + "level": "Proof of Concept", |
| 157 | + "format": "CVSSv3" |
| 158 | + }, |
| 159 | + { |
| 160 | + "type": "primary", |
| 161 | + "level": "Proof of Concept", |
| 162 | + "format": "CVSSv4" |
| 163 | + } |
| 164 | + ] |
| 165 | + }, |
| 166 | + "packageManager": "maven", |
| 167 | + "mavenModuleName": { |
| 168 | + "groupId": "junit", |
| 169 | + "artifactId": "junit" |
| 170 | + }, |
| 171 | + "publicationTime": "2020-10-13T14:27:37Z", |
| 172 | + "severityBasedOn": "CVSS", |
| 173 | + "modificationTime": "2024-03-11T09:52:05.359911Z", |
| 174 | + "socialTrendAlert": false, |
| 175 | + "severityWithCritical": "low", |
| 176 | + "packagePopularityRank": 99, |
| 177 | + "from": [ |
| 178 | + "acmeair/acmeair@acmeair/acmeair#f16122729873ef0449ea276dfb2d2a1d45bebb40", |
| 179 | + "com.googlecode.json-simple:json-simple@1.1.1", |
| 180 | + "junit:junit@4.10" |
| 181 | + ], |
| 182 | + "upgradePath": [ |
| 183 | + false, |
| 184 | + false, |
| 185 | + "junit:junit@4.13.1" |
| 186 | + ], |
| 187 | + "version": "4.10", |
| 188 | + "name": "junit:junit", |
| 189 | + "isUpgradable": false, |
| 190 | + "isPatchable": false, |
| 191 | + "isPinnable": false |
| 192 | + } |
| 193 | + ], |
| 194 | + "numDependencies": 9, |
| 195 | + "severityMap": { |
| 196 | + "critical": 0, |
| 197 | + "high": 0, |
| 198 | + "medium": 0, |
| 199 | + "low": 1 |
| 200 | + }, |
| 201 | + "packageManager": "gradle", |
| 202 | + "summary": "1 vulnerable dependency path", |
| 203 | + "filesystemPolicy": false, |
| 204 | + "filtered": { |
| 205 | + "ignore": [], |
| 206 | + "patch": [] |
| 207 | + }, |
| 208 | + "uniqueCount": 1, |
| 209 | + "path": "https://github.com/acmeair/acmeair" |
| 210 | +} |
0 commit comments