Trivy scan security vulnerabilities

During the trivy check of the entitlements-v0-27-1-gc-2:latest docker image we found some security vulnerabilities:

Vulnerability ID Affected libs Severity Description Link Source
CVE-2024-45491 libexpat 2.6.2-r0 CRITICAL An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX) https://avd.aquasec.com/nvd/2024/cve-2024-45491/ alpine 3.17.7
CVE-2024-45492 libexpat 2.6.2-r0 CRITICAL An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX) https://avd.aquasec.com/nvd/2024/cve-2024-45492/ alpine 3.17.7
CVE-2024-38821 org.springframework.security:spring-security-web (app.jar) CRITICAL Spring-WebFlux: Authorization Bypass of Static Resources in WebFlux Applications https://avd.aquasec.com/nvd/2024/cve-2024-38821/ Java (jar)
CVE-2024-6197 curl,libcurl 8.7.1-r0 HIGH libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. https://avd.aquasec.com/nvd/2024/cve-2024-6197/ alpine 3.17.7
CVE-2024-45490 libexpat 2.6.2-r0 HIGH An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer https://avd.aquasec.com/nvd/2024/cve-2024-45490/ alpine 3.17.7
CVE-2020-36518 HIGH jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects. https://avd.aquasec.com/nvd/2020/cve-2020-36518/ Java (jar)
CVE-2021-46877 HIGH ackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. https://avd.aquasec.com/nvd/2021/cve-2021-46877/ Java (jar)
CVE-2022-42003 HIGH In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled." https://avd.aquasec.com/nvd/2022/cve-2022-42003/ Java (jar)
CVE-2022-42004 HIGH In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization. https://avd.aquasec.com/nvd/2022/cve-2022-42004/ Java (jar)
CVE-2024-47535 io.netty:netty-common 4.1.109.Final (applicationinsights-agent.jar), io.netty:netty-common 4.1.111.Final (app.jar) HIGH Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115. https://avd.aquasec.com/nvd/2024/cve-2024-47535/ Java (jar)
CVE-2024-38816 org.springframework:spring-webmvc 6.1.10 (app.jar) HIGH spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource https://avd.aquasec.com/nvd/2024/cve-2024-38816/ Java (jar)
Edited Nov 25, 2024 by Oleksandr Stetskiv-SLB
Assignee Loading
Time tracking Loading