You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /tests/test-sessions/test-infinispan-sessions/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/code/gson/gson/2.8.1/gson-2.8.1.jar,/home/wss-scanner/.m2/repository/com/google/code/gson/gson/2.8.1/gson-2.8.1.jar
Path to dependency file: /tests/test-sessions/test-gcloud-sessions/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/code/gson/gson/2.7/gson-2.7.jar,/home/wss-scanner/.m2/repository/com/google/code/gson/gson/2.7/gson-2.7.jar
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
mend-bolt-for-githubbot
changed the title
CVE-2022-25647 (High) detected in gson-2.8.1.jar, gson-2.7.jar
CVE-2022-25647 (High) detected in gson-2.8.1.jar, com-google-gson-RELEASE100.jar
Feb 29, 2024
mend-bolt-for-githubbot
changed the title
CVE-2022-25647 (High) detected in gson-2.8.1.jar, com-google-gson-RELEASE100.jar
CVE-2022-25647 (High) detected in gson-2.8.1.jar, gson-2.7.jar
Mar 17, 2024
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-bolt-for-githubbot
changed the title
CVE-2022-25647 (High) detected in gson-2.8.1.jar, gson-2.7.jar
CVE-2022-25647 (High) detected in gson-2.8.1.jar, gson-2.7.jar - autoclosed
Mar 20, 2024
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
mend-bolt-for-githubbot
changed the title
CVE-2022-25647 (High) detected in gson-2.8.1.jar, gson-2.7.jar - autoclosed
CVE-2022-25647 (High) detected in gson-2.8.1.jar, gson-2.7.jar
Mar 20, 2024
CVE-2022-25647 - High Severity Vulnerability
Vulnerable Libraries - gson-2.8.1.jar, gson-2.7.jar
gson-2.8.1.jar
Gson JSON library
Library home page: https://github.com/google/gson
Path to dependency file: /tests/test-sessions/test-infinispan-sessions/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/code/gson/gson/2.8.1/gson-2.8.1.jar,/home/wss-scanner/.m2/repository/com/google/code/gson/gson/2.8.1/gson-2.8.1.jar
Dependency Hierarchy:
gson-2.7.jar
Gson JSON library
Library home page: https://github.com/google/gson
Path to dependency file: /tests/test-sessions/test-gcloud-sessions/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/code/gson/gson/2.7/gson-2.7.jar,/home/wss-scanner/.m2/repository/com/google/code/gson/gson/2.7/gson-2.7.jar
Dependency Hierarchy:
Found in HEAD commit: 58f30216af0fcc8c8d4ee04369790afc5494c144
Found in base branch: master
Vulnerability Details
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
Publish Date: 2022-05-01
URL: CVE-2022-25647
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`
Release Date: 2022-05-01
Fix Resolution (com.google.code.gson:gson): 2.8.9
Direct dependency fix Resolution (org.infinispan:infinispan-remote-query-client): 9.4.17.Final
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: