Skip to content

react-android-0.78.0-debug.aar: 1 vulnerabilities (highest severity is: 5.9) #925

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - react-android-0.78.0-debug.aar

Path to dependency file: /android/build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.squareup.okio/okio/2.9.0/eaa6725bd15c851530d55f235208568dfb399bb8/okio-2.9.0.pom

Vulnerabilities

Vulnerability Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (react-android version) Remediation Possible** Reachability
CVE-2023-3635 Medium 5.9 Not Defined 0.6% okio-2.9.0.jar Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-3635

Vulnerable Library - okio-2.9.0.jar

A modern I/O API for Java

Library home page: https://github.com/square/okio/

Path to dependency file: /android/build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.squareup.okio/okio/2.9.0/eaa6725bd15c851530d55f235208568dfb399bb8/okio-2.9.0.pom

Dependency Hierarchy:

  • react-android-0.78.0-debug.aar (Root Library)
    • okio-2.9.0.jar (Vulnerable Library)

Found in base branch: develop

Vulnerability Details

GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This may lead to denial of service of the Okio client when handling a crafted GZIP archive, by using the GzipSource class.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: 2023-07-12

URL: CVE-2023-3635

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.6%

CVSS 3 Score Details (5.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-3635

Release Date: 2023-07-12

Fix Resolution: com.squareup.okio:okio-jvm:3.4.0

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions