You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Apache Commons Compress software defines an API for working with
compression and archive formats. These include: bzip2, gzip, pack200,
lzma, xz, Snappy, traditional Unix Compress, DEFLATE, DEFLATE64, LZ4,
Brotli, Zstandard and ar, cpio, jar, tar, zip, dump, 7z, arj.
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.16.1/commons-compress-1.16.1.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.16.1/commons-compress-1.16.1.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.16.1/commons-compress-1.16.1.jar
Apache Commons Compress software defines an API for working with compression and archive formats.
These include: bzip2, gzip, pack200, xz and ar, cpio, jar, tar, zip, dump.
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.4.1/commons-compress-1.4.1.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.4.1/commons-compress-1.4.1.jar
mend-for-github-combot
changed the title
CVE-2024-25710 (High) detected in commons-compress-1.4.1.jar
CVE-2024-25710 (Medium) detected in commons-compress-1.4.1.jar
Mar 17, 2024
mend-for-github-combot
changed the title
CVE-2024-25710 (Medium) detected in commons-compress-1.4.1.jar
CVE-2024-25710 (Medium) detected in commons-compress-1.16.1.jar, commons-compress-1.4.1.jar
Apr 18, 2024
mend-for-github-combot
changed the title
CVE-2024-25710 (Medium) detected in commons-compress-1.16.1.jar, commons-compress-1.4.1.jar
CVE-2024-25710 (High) detected in commons-compress-1.16.1.jar, commons-compress-1.4.1.jar
Jul 17, 2024
CVE-2024-25710 - High Severity Vulnerability
Vulnerable Libraries - commons-compress-1.16.1.jar, commons-compress-1.4.1.jar
commons-compress-1.16.1.jar
Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE, DEFLATE64, LZ4, Brotli, Zstandard and ar, cpio, jar, tar, zip, dump, 7z, arj.
Library home page: https://www.apache.org/
Path to dependency file: /foxtrot-common/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.16.1/commons-compress-1.16.1.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.16.1/commons-compress-1.16.1.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.16.1/commons-compress-1.16.1.jar
Dependency Hierarchy:
commons-compress-1.4.1.jar
Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, xz and ar, cpio, jar, tar, zip, dump.
Library home page: http://www.apache.org/
Path to dependency file: /foxtrot-core/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.4.1/commons-compress-1.4.1.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-compress/1.4.1/commons-compress-1.4.1.jar
Dependency Hierarchy:
Found in HEAD commit: ffb8a6014463ce8aac1bf6e7dc9a23fc4a2a8adc
Found in base branch: master
Vulnerability Details
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.3 through 1.25.0.
Users are recommended to upgrade to version 1.26.0 which fixes the issue.
Publish Date: 2024-02-19
URL: CVE-2024-25710
CVSS 3 Score Details (8.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-25710
Release Date: 2024-02-19
Fix Resolution (org.apache.commons:commons-compress): 1.26.0
Direct dependency fix Resolution (org.apache.hbase:hbase-server): 1.2.2
⛑️ Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: