You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /TheWheel.ETL.CyberArk/TheWheel.ETL.CyberArk.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg,/ckages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg
Path to dependency file: /TheWheel.ETL.CyberArk/TheWheel.ETL.CyberArk.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg,/ckages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
Mend Note: Version 4.8.6 of System.Data.SqlClient was discovered to contain DLL components originated in a vulnerable Nuget version (System.Data.SqlClient-4.6.0), and therefore is alerted for CVE-2024-0056. Those components exist in the following paths: system.data.sqlclient.4.8.6\lib\net451\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\ref\net451\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\runtimes\win\lib\net451\System.Data.SqlClient.dll,system.data.sqlclient.4.8.6\runtimes\unix\lib\netstandard1.3\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\runtimes\win\lib\netstandard1.3\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\lib\net46\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\ref\net46\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\runtimes\win\lib\net46\System.Data.SqlClient.dll. Users of System.Data.SqlClient-4.8.6 that do not use any functionality originated in 4.6.0 are not affected.
Path to dependency file: /TheWheel.ETL.CyberArk/TheWheel.ETL.CyberArk.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg,/ckages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg
mend-bolt-for-githubbot
changed the title
system.data.sqlclient.4.8.2.nupkg: 1 vulnerabilities (highest severity is: 5.8)
system.data.sqlclient.4.8.2.nupkg: 2 vulnerabilities (highest severity is: 8.7)
Mar 24, 2024
Vulnerable Library - system.data.sqlclient.4.8.2.nupkg
Provides the data provider for SQL Server. These classes provide access to versions of SQL Server an...
Library home page: https://api.nuget.org/packages/system.data.sqlclient.4.8.2.nupkg
Path to dependency file: /TheWheel.ETL.CyberArk/TheWheel.ETL.CyberArk.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg,/ckages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg
Found in HEAD commit: 4523a90c162a002998acd7d6510bd4bdea60b7e9
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-0056
Vulnerable Library - system.data.sqlclient.4.8.2.nupkg
Provides the data provider for SQL Server. These classes provide access to versions of SQL Server an...
Library home page: https://api.nuget.org/packages/system.data.sqlclient.4.8.2.nupkg
Path to dependency file: /TheWheel.ETL.CyberArk/TheWheel.ETL.CyberArk.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg,/ckages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg
Dependency Hierarchy:
Found in HEAD commit: 4523a90c162a002998acd7d6510bd4bdea60b7e9
Found in base branch: main
Vulnerability Details
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
Mend Note: Version 4.8.6 of System.Data.SqlClient was discovered to contain DLL components originated in a vulnerable Nuget version (System.Data.SqlClient-4.6.0), and therefore is alerted for CVE-2024-0056. Those components exist in the following paths: system.data.sqlclient.4.8.6\lib\net451\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\ref\net451\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\runtimes\win\lib\net451\System.Data.SqlClient.dll,system.data.sqlclient.4.8.6\runtimes\unix\lib\netstandard1.3\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\runtimes\win\lib\netstandard1.3\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\lib\net46\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\ref\net46\System.Data.SqlClient.dll, system.data.sqlclient.4.8.6\runtimes\win\lib\net46\System.Data.SqlClient.dll. Users of System.Data.SqlClient-4.8.6 that do not use any functionality originated in 4.6.0 are not affected.
Publish Date: 2024-01-09
URL: CVE-2024-0056
CVSS 3 Score Details (8.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-98g6-xh36-x2p7
Release Date: 2024-01-09
Fix Resolution: Microsoft.Data.SqlClient - 2.1.7,3.1.5,4.0.5,5.1.3, System.Data.SqlClient - 4.8.6
Step up your Open Source Security Game with Mend here
CVE-2022-41064
Vulnerable Library - system.data.sqlclient.4.8.2.nupkg
Provides the data provider for SQL Server. These classes provide access to versions of SQL Server an...
Library home page: https://api.nuget.org/packages/system.data.sqlclient.4.8.2.nupkg
Path to dependency file: /TheWheel.ETL.CyberArk/TheWheel.ETL.CyberArk.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg,/ckages/system.data.sqlclient/4.8.2/system.data.sqlclient.4.8.2.nupkg
Dependency Hierarchy:
Found in HEAD commit: 4523a90c162a002998acd7d6510bd4bdea60b7e9
Found in base branch: main
Vulnerability Details
.NET Framework Information Disclosure Vulnerability
Mend Note: Converted from WS-2022-0377, on 2022-11-10.
Publish Date: 2022-11-09
URL: CVE-2022-41064
CVSS 3 Score Details (5.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-8g2p-5pqh-5jmc
Release Date: 2022-11-09
Fix Resolution: Microsoft.Data.SqlClient - 1.1.4,2.1.2;System.Data.SqlClient - 4.8.5
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: