You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: TimeBase/java/installer/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jdom/jdom2/2.0.6/6f14738ec2e9dd0011e343717fa624a10f8aab64/jdom2-2.0.6.jar,canner/.gradle/caches/modules-2/files-2.1/org.jdom/jdom2/2.0.6/6f14738ec2e9dd0011e343717fa624a10f8aab64/jdom2-2.0.6.jar
mend-for-github-combot
changed the title
CVE-2021-33813 (Medium) detected in jdom2-2.0.5.jar
CVE-2021-33813 (High) detected in jdom2-2.0.5.jar
Jun 23, 2021
mend-for-github-combot
changed the title
CVE-2021-33813 (High) detected in jdom2-2.0.5.jar
CVE-2021-33813 (High) detected in jdom2-2.0.6.jar
Jun 23, 2021
CVE-2021-33813 - High Severity Vulnerability
Vulnerable Library - jdom2-2.0.6.jar
A complete, Java-based solution for accessing, manipulating, and outputting XML data
Library home page: http://www.jdom.org
Path to dependency file: TimeBase/java/installer/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jdom/jdom2/2.0.6/6f14738ec2e9dd0011e343717fa624a10f8aab64/jdom2-2.0.6.jar,canner/.gradle/caches/modules-2/files-2.1/org.jdom/jdom2/2.0.6/6f14738ec2e9dd0011e343717fa624a10f8aab64/jdom2-2.0.6.jar
Dependency Hierarchy:
Found in HEAD commit: 98f6880b361c00a247f77e79a787646e9664cadd
Found in base branch: main
Vulnerability Details
An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request.
Publish Date: 2021-06-16
URL: CVE-2021-33813
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Change files
Origin: hunterhacker/jdom@bd3ab78
Release Date: 2021-02-18
Fix Resolution: Replace or update the following files: TestSAXBuilder.java, SAXBuilder.java
The text was updated successfully, but these errors were encountered: