This is a nice looking tool! Gregg
Sent from my iPhone > On Jan 7, 2017, at 4:56 AM, Peter <j...@zeus.net.au> wrote: > > Neat little tool that generates vulnerability reports on dependencies during > a maven build. N.B. the following aren't actual dependencies of Phoenix. > > <groupId>org.owasp</groupId> > <artifactId>dependency-check-maven</artifactId> > > Cheers, > > Pete. > > Dependency-Check is an open source tool performing a best effort analysis of > 3rd party dependencies; false positives and false negatives may exist in the > analysis performed by the tool. Use of the tool and the reporting provided > constitutes acceptance for use in an AS IS condition, and there are NO > warranties, implied or otherwise, with regard to the analysis or its use. Any > use of the tool and the reporting provided is at the user’s risk. In no event > shall the copyright holder or OWASP be held liable for any damages whatsoever > arising out of or in connection with the use of this tool, the analysis > performed, or the resulting report. > > > How to read the report > <http://jeremylong.github.io/DependencyCheck/general/thereport.html> > | Suppressing false positives > <http://jeremylong.github.io/DependencyCheck/general/suppression.html> > | Getting Help: google group > <https://groups.google.com/forum/#%21forum/dependency-check> | > github issues <https://github.com/jeremylong/DependencyCheck/issues> > > > Project: Module :: Phoenix > > Scan Information (show all): > > * /dependency-check version/: 1.4.4 > * /Report Generated On/: Jan 7, 2017 at 19:06:08 EST > * /Dependencies Scanned/: 62 (62 unique) > * /Vulnerable Dependencies/: 4 > * /Vulnerabilities Found/: 9 > Neat little tool that generates vulnerability reports on dependencies during > a maven build. N.B. the following aren't actual dependencies of Phoenix. > > <groupId>org.owasp</groupId> > <artifactId>dependency-check-maven</artifactId> > > Cheers, > > Pete. > > Dependency-Check is an open source tool performing a best effort analysis of > 3rd party dependencies; false positives and false negatives may exist in the > analysis performed by the tool. Use of the tool and the reporting provided > constitutes acceptance for use in an AS IS condition, and there are NO > warranties, implied or otherwise, with regard to the analysis or its use. Any > use of the tool and the reporting provided is at the user’s risk. In no event > shall the copyright holder or OWASP be held liable for any damages whatsoever > arising out of or in connection with the use of this tool, the analysis > performed, or the resulting report. > > > How to read the report > <http://jeremylong.github.io/DependencyCheck/general/thereport.html> > | Suppressing false positives > <http://jeremylong.github.io/DependencyCheck/general/suppression.html> > | Getting Help: google group > <https://groups.google.com/forum/#%21forum/dependency-check> | > github issues <https://github.com/jeremylong/DependencyCheck/issues> > > > Project: Module :: Phoenix > > Scan Information (show all): > > * /dependency-check version/: 1.4.4 > * /Report Generated On/: Jan 7, 2017 at 19:06:08 EST > * /Dependencies Scanned/: 62 (62 unique) > * /Vulnerable Dependencies/: 4 > * /Vulnerabilities Found/: 9 > * /Vulnerabilities Suppressed/: 0 > * ... > > > Display: Showing Vulnerable Dependencies (click to show all) > > Dependency CPE GAV Highest Severity CVE Count CPE Confidence > Evidence Count > commons-httpclient-3.0.jar cpe:/a:apache:commons-httpclient:3.0 > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Acommons-httpclient%3A3.0> > > cpe:/a:apache:httpclient:3.0 commons-httpclient:commons-httpclient:3.0 > Medium 4 HIGHEST 15 > jackrabbit-jcr-commons-1.5.0.jar cpe:/a:apache:jackrabbit:1.5.0 > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ajackrabbit%3A1.5.0> > org.apache.jackrabbit:jackrabbit-jcr-commons:1.5.0 Medium 2 > HIGHEST 15 > jackrabbit-webdav-1.5.0.jar cpe:/a:apache:jackrabbit:1.5.0 > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ajackrabbit%3A1.5.0> > org.apache.jackrabbit:jackrabbit-webdav:1.5.0 Medium 2 HIGHEST > 13 > wagon-webdav-jackrabbit-1.0-beta-6.jar cpe:/a:apache:jackrabbit:1.0 > org.apache.maven.wagon:wagon-webdav-jackrabbit:1.0-beta-6 Medium 1 LOW > 16 > > > Dependencies > > > commons-httpclient-3.0.jar > > *Description:* The HttpClient component supports the client-side of RFC 1945 > (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 > (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework > by which new request types (methods) or HTTP extensions can be created easily. > > *License:* > > Apache License: http://www.apache.org/licenses/LICENSE-2.0 > > *File Path:* > C:\Users\peter\Documents\NetBeansProjects\river-internet\modularize\JGDMS\target\test-repo\commons-httpclient\commons-httpclient\3.0\commons-httpclient-3.0.jar > *MD5:* cd69c70d6c078f4340bd5e867ec6f1b6 > *SHA1:* 336a280d178bb957e5233189f0f32e067366c4e5 > *Referenced In Project/Scope:* Module :: Phoenix:runtime > > > Evidence > > > Identifiers > > * *maven:* commons-httpclient:commons-httpclient:3.0 /Confidence/:HIGH > * *cpe:* cpe:/a:apache:commons-httpclient:3.0 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Acommons-httpclient%3A3.0> > /Confidence/:HIGHEST > > *cpe:* cpe:/a:apache:httpclient:3.0 /Confidence/:LOW > > > Published Vulnerabilities > > *CVE-2015-5262 > <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262>* > > Severity: Medium > CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P) > CWE: CWE-399 Resource Management Errors > > http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents > HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting > during an SSL handshake, which allows remote attackers to cause a denial of > service (HTTPS call hang) via unspecified vectors. > > * CONFIRM - > http://svn.apache.org/viewvc?view=revision&revision=1626784 > <http://svn.apache.org/viewvc?view=revision&revision=1626784> > * CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=1261538 > * CONFIRM - https://issues.apache.org/jira/browse/HTTPCLIENT-1478 > * FEDORA - FEDORA-2015-15588 > > <http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html> > * FEDORA - FEDORA-2015-15589 > > <http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html> > * FEDORA - FEDORA-2015-15590 > > <http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html> > * SECTRACK - 1033743 <http://www.securitytracker.com/id/1033743> > * UBUNTU - USN-2769-1 <http://www.ubuntu.com/usn/USN-2769-1> > > Vulnerable Software & Versions: > > * cpe:/a:apache:httpclient:4.3.5 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ahttpclient%3A4.3.5> > and all previous versions > > *CVE-2014-3577 > <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3577>* > > Severity: Medium > CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N) > > org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient > before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that > the server hostname matches a domain name in the subject's Common Name (CN) > or subjectAltName field of the X.509 certificate, which allows > man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a > field in the distinguished name (DN) of a certificate, as demonstrated by the > "foo,CN=www.apache.org" string in the O field. > > * BID - 69258 <http://www.securityfocus.com/bid/69258> > * CONFIRM - https://access.redhat.com/solutions/1165533 > * CONFIRM - > > https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564 > * FULLDISC - 20140818 CVE-2014-3577: Apache HttpComponents client: > Hostname verification susceptible to MITM attack > <http://seclists.org/fulldisclosure/2014/Aug/48> > * MISC - > > http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html > * OSVDB - 110143 <http://www.osvdb.org/110143> > * REDHAT - RHSA-2014:1146 > <http://rhn.redhat.com/errata/RHSA-2014-1146.html> > * REDHAT - RHSA-2014:1166 > <http://rhn.redhat.com/errata/RHSA-2014-1166.html> > * REDHAT - RHSA-2014:1833 > <http://rhn.redhat.com/errata/RHSA-2014-1833.html> > * REDHAT - RHSA-2014:1834 > <http://rhn.redhat.com/errata/RHSA-2014-1834.html> > * REDHAT - RHSA-2014:1835 > <http://rhn.redhat.com/errata/RHSA-2014-1835.html> > * REDHAT - RHSA-2014:1836 > <http://rhn.redhat.com/errata/RHSA-2014-1836.html> > * REDHAT - RHSA-2014:1891 > <http://rhn.redhat.com/errata/RHSA-2014-1891.html> > * REDHAT - RHSA-2014:1892 > <http://rhn.redhat.com/errata/RHSA-2014-1892.html> > * REDHAT - RHSA-2015:0125 > <http://rhn.redhat.com/errata/RHSA-2015-0125.html> > * REDHAT - RHSA-2015:0158 > <http://rhn.redhat.com/errata/RHSA-2015-0158.html> > * REDHAT - RHSA-2015:0675 > <http://rhn.redhat.com/errata/RHSA-2015-0675.html> > * REDHAT - RHSA-2015:0720 > <http://rhn.redhat.com/errata/RHSA-2015-0720.html> > * REDHAT - RHSA-2015:0765 > <http://rhn.redhat.com/errata/RHSA-2015-0765.html> > * REDHAT - RHSA-2015:0850 > <http://rhn.redhat.com/errata/RHSA-2015-0850.html> > * REDHAT - RHSA-2015:0851 > <http://rhn.redhat.com/errata/RHSA-2015-0851.html> > * REDHAT - RHSA-2015:1176 > <http://rhn.redhat.com/errata/RHSA-2015-1176.html> > * REDHAT - RHSA-2015:1177 > <http://rhn.redhat.com/errata/RHSA-2015-1177.html> > * SECTRACK - 1030812 <http://www.securitytracker.com/id/1030812> > * SECUNIA - 60466 <http://secunia.com/advisories/60466> > * UBUNTU - USN-2769-1 <http://www.ubuntu.com/usn/USN-2769-1> > * XF - apache-cve20143577-spoofing(95327) > <http://xforce.iss.net/xforce/xfdb/95327> > > Vulnerable Software & Versions: (show all) > > * cpe:/a:apache:httpclient:4.3.4 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ahttpclient%3A4.3.4> > and all previous versions > * ... > > *CVE-2012-6153 > <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6153>* > > Severity: Medium > CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N) > CWE: CWE-20 Improper Input Validation > > http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 > does not properly verify that the server hostname matches a domain name in > the subject's Common Name (CN) or subjectAltName field of the X.509 > certificate, which allows man-in-the-middle attackers to spoof SSL servers > via a certificate with a subject that specifies a common name in a field that > is not the CN field. NOTE: this issue exists because of an incomplete fix for > CVE-2012-5783. > > * BID - 69257 <http://www.securityfocus.com/bid/69257> > * CONFIRM - > http://svn.apache.org/viewvc?view=revision&revision=1411705 > <http://svn.apache.org/viewvc?view=revision&revision=1411705> > * CONFIRM - https://access.redhat.com/solutions/1165533 > * CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=1129916 > * CONFIRM - > > https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564 > * REDHAT - RHSA-2014:1098 > <http://rhn.redhat.com/errata/RHSA-2014-1098.html> > * REDHAT - RHSA-2014:1833 > <http://rhn.redhat.com/errata/RHSA-2014-1833.html> > * REDHAT - RHSA-2014:1834 > <http://rhn.redhat.com/errata/RHSA-2014-1834.html> > * REDHAT - RHSA-2014:1835 > <http://rhn.redhat.com/errata/RHSA-2014-1835.html> > * REDHAT - RHSA-2014:1836 > <http://rhn.redhat.com/errata/RHSA-2014-1836.html> > * REDHAT - RHSA-2014:1891 > <http://rhn.redhat.com/errata/RHSA-2014-1891.html> > * REDHAT - RHSA-2014:1892 > <http://rhn.redhat.com/errata/RHSA-2014-1892.html> > * REDHAT - RHSA-2015:0125 > <http://rhn.redhat.com/errata/RHSA-2015-0125.html> > * REDHAT - RHSA-2015:0158 > <http://rhn.redhat.com/errata/RHSA-2015-0158.html> > * REDHAT - RHSA-2015:0675 > <http://rhn.redhat.com/errata/RHSA-2015-0675.html> > * REDHAT - RHSA-2015:0720 > <http://rhn.redhat.com/errata/RHSA-2015-0720.html> > * REDHAT - RHSA-2015:0765 > <http://rhn.redhat.com/errata/RHSA-2015-0765.html> > * REDHAT - RHSA-2015:0850 > <http://rhn.redhat.com/errata/RHSA-2015-0850.html> > * REDHAT - RHSA-2015:0851 > <http://rhn.redhat.com/errata/RHSA-2015-0851.html> > * UBUNTU - USN-2769-1 <http://www.ubuntu.com/usn/USN-2769-1> > > Vulnerable Software & Versions: (show all) > > * cpe:/a:apache:commons-httpclient:4.2.2 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Acommons-httpclient%3A4.2.2> > and all previous versions > * ... > > *CVE-2012-5783 > <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5783>* > > Severity: Medium > CVSS Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N) > CWE: CWE-20 Improper Input Validation > > Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service > (FPS) merchant Java SDK and other products, does not verify that the server > hostname matches a domain name in the subject's Common Name (CN) or > subjectAltName field of the X.509 certificate, which allows man-in-the-middle > attackers to spoof SSL servers via an arbitrary valid certificate. > > * BID - 58073 <http://www.securityfocus.com/bid/58073> > * MISC - http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf > <http://www.cs.utexas.edu/%7Eshmat/shmat_ccs12.pdf> > * REDHAT - RHSA-2013:0270 > <http://rhn.redhat.com/errata/RHSA-2013-0270.html> > * REDHAT - RHSA-2013:0679 > <http://rhn.redhat.com/errata/RHSA-2013-0679.html> > * REDHAT - RHSA-2013:0680 > <http://rhn.redhat.com/errata/RHSA-2013-0680.html> > * REDHAT - RHSA-2013:0681 > <http://rhn.redhat.com/errata/RHSA-2013-0681.html> > * REDHAT - RHSA-2013:0682 > <http://rhn.redhat.com/errata/RHSA-2013-0682.html> > * REDHAT - RHSA-2013:1147 > <http://rhn.redhat.com/errata/RHSA-2013-1147.html> > * REDHAT - RHSA-2013:1853 > <http://rhn.redhat.com/errata/RHSA-2013-1853.html> > * REDHAT - RHSA-2014:0224 > <http://rhn.redhat.com/errata/RHSA-2014-0224.html> > * SUSE - openSUSE-SU-2013:0354 > <http://lists.opensuse.org/opensuse-updates/2013-02/msg00078.html> > * SUSE - openSUSE-SU-2013:0622 > <http://lists.opensuse.org/opensuse-updates/2013-04/msg00040.html> > * SUSE - openSUSE-SU-2013:0623 > <http://lists.opensuse.org/opensuse-updates/2013-04/msg00041.html> > * SUSE - openSUSE-SU-2013:0638 > <http://lists.opensuse.org/opensuse-updates/2013-04/msg00053.html> > * UBUNTU - USN-2769-1 <http://www.ubuntu.com/usn/USN-2769-1> > * XF - apache-commons-ssl-spoofing(79984) > <http://xforce.iss.net/xforce/xfdb/79984> > > Vulnerable Software & Versions: (show all) > > * cpe:/a:apache:commons-httpclient:3.0 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Acommons-httpclient%3A3.0> > > * ... > > > jackrabbit-jcr-commons-1.5.0.jar > > *Description:* General purpose classes for use with the JCR API > > *License:* > > http://www.apache.org/licenses/LICENSE-2.0.txt > > *File Path:* > C:\Users\peter\Documents\NetBeansProjects\river-internet\modularize\JGDMS\target\test-repo\org\apache\jackrabbit\jackrabbit-jcr-commons\1.5.0\jackrabbit-jcr-commons-1.5.0.jar > *MD5:* 579d2a761b42553e07f6dcd8225f0d53 > *SHA1:* 816ca280dc631b277e7b963723f2e99b038383f2 > *Referenced In Project/Scope:* Module :: Phoenix:runtime > > > Evidence > > > Identifiers > > * *cpe:* cpe:/a:apache:jackrabbit:1.5.0 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ajackrabbit%3A1.5.0> > /Confidence/:HIGHEST > > * *maven:* org.apache.jackrabbit:jackrabbit-jcr-commons:1.5.0 > /Confidence/:HIGH > > > Published Vulnerabilities > > *CVE-2015-1833 > <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1833>* > > Severity: Medium > CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) > CWE: CWE-20 Improper Input Validation > > XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, > 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before > 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary > files and send requests to intranet servers via a crafted WebDAV request. > > * BID - 74761 <http://www.securityfocus.com/bid/74761> > * BUGTRAQ - 20150521 CVE-2015-1833 (Jackrabbit WebDAV XXE > vulnerability) > <http://www.securityfocus.com/archive/1/archive/1/535582/100/0/threaded> > * CONFIRM - > http://www.apache.org/dist/jackrabbit/2.10.1/RELEASE-NOTES.txt > * CONFIRM - https://issues.apache.org/jira/browse/JCR-3883 > * DEBIAN - DSA-3298 <http://www.debian.org/security/2015/dsa-3298> > * EXPLOIT-DB - 37110 <https://www.exploit-db.com/exploits/37110/> > * MISC - > > http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html > * MLIST - [jackrabbit-announce] 20150521 CVE-2015-1833 (Jackrabbit > WebDAV XXE vulnerability) > > <http://mail-archives.apache.org/mod_mbox/jackrabbit-announce/201505.mbox/%3C555DA644.8080908%40greenbytes.de%3E> > > Vulnerable Software & Versions: (show all) > > * cpe:/a:apache:jackrabbit:2.0.5 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ajackrabbit%3A2.0.5> > and all previous versions > * ... > > *CVE-2009-0026 > <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0026>* > > Severity: Medium > CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N) > CWE: CWE-79 Improper Neutralization of Input During Web Page Generation > ('Cross-site Scripting') > > Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit > before 1.5.2 allow remote attackers to inject arbitrary web script or HTML > via the q parameter to (1) search.jsp or (2) swr.jsp. > > * BID - 33360 <http://www.securityfocus.com/bid/33360> > * BUGTRAQ - 20090120 [ANNOUNCE] Apache Jackrabbit 1.5.2 released > <http://www.securityfocus.com/archive/1/archive/1/500196/100/0/threaded> > * CONFIRM - > http://www.apache.org/dist/jackrabbit/RELEASE-NOTES-1.5.2.txt > * CONFIRM - https://issues.apache.org/jira/browse/JCR-1925 > * SREASON - 4942 <http://securityreason.com/securityalert/4942> > * VUPEN - ADV-2009-0177 > <http://www.vupen.com/english/advisories/2009/0177> > * XF - jackrabbit-search-swr-xss(48110) > <http://xforce.iss.net/xforce/xfdb/48110> > > Vulnerable Software & Versions: (show all) > > * cpe:/a:apache:jackrabbit:1.5.0 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ajackrabbit%3A1.5.0> > > * ... > > > jackrabbit-webdav-1.5.0.jar > > *Description:* WebDAV library used by the Jackrabbit WebDAV support > > *File Path:* > C:\Users\peter\Documents\NetBeansProjects\river-internet\modularize\JGDMS\target\test-repo\org\apache\jackrabbit\jackrabbit-webdav\1.5.0\jackrabbit-webdav-1.5.0.jar > *MD5:* 137d4d30c1c78972fec7628c94f4f4a1 > *SHA1:* b14c7fbbd34862d4d51c5e72ba3a69cde892c260 > *Referenced In Project/Scope:* Module :: Phoenix:runtime > > > Evidence > > > Identifiers > > * *cpe:* cpe:/a:apache:jackrabbit:1.5.0 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ajackrabbit%3A1.5.0> > /Confidence/:HIGHEST > > * *maven:* org.apache.jackrabbit:jackrabbit-webdav:1.5.0 > /Confidence/:HIGH > > > Published Vulnerabilities > > *CVE-2015-1833 > <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1833>* > > Severity: Medium > CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) > CWE: CWE-20 Improper Input Validation > > XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, > 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before > 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary > files and send requests to intranet servers via a crafted WebDAV request. > > * BID - 74761 <http://www.securityfocus.com/bid/74761> > * BUGTRAQ - 20150521 CVE-2015-1833 (Jackrabbit WebDAV XXE > vulnerability) > <http://www.securityfocus.com/archive/1/archive/1/535582/100/0/threaded> > * CONFIRM - > http://www.apache.org/dist/jackrabbit/2.10.1/RELEASE-NOTES.txt > * CONFIRM - https://issues.apache.org/jira/browse/JCR-3883 > * DEBIAN - DSA-3298 <http://www.debian.org/security/2015/dsa-3298> > * EXPLOIT-DB - 37110 <https://www.exploit-db.com/exploits/37110/> > * MISC - > > http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html > * MLIST - [jackrabbit-announce] 20150521 CVE-2015-1833 (Jackrabbit > WebDAV XXE vulnerability) > > <http://mail-archives.apache.org/mod_mbox/jackrabbit-announce/201505.mbox/%3C555DA644.8080908%40greenbytes.de%3E> > > Vulnerable Software & Versions: (show all) > > * cpe:/a:apache:jackrabbit:2.0.5 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ajackrabbit%3A2.0.5> > and all previous versions > * ... > > *CVE-2009-0026 > <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0026>* > > Severity: Medium > CVSS Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N) > CWE: CWE-79 Improper Neutralization of Input During Web Page Generation > ('Cross-site Scripting') > > Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit > before 1.5.2 allow remote attackers to inject arbitrary web script or HTML > via the q parameter to (1) search.jsp or (2) swr.jsp. > > * BID - 33360 <http://www.securityfocus.com/bid/33360> > * BUGTRAQ - 20090120 [ANNOUNCE] Apache Jackrabbit 1.5.2 released > <http://www.securityfocus.com/archive/1/archive/1/500196/100/0/threaded> > * CONFIRM - > http://www.apache.org/dist/jackrabbit/RELEASE-NOTES-1.5.2.txt > * CONFIRM - https://issues.apache.org/jira/browse/JCR-1925 > * SREASON - 4942 <http://securityreason.com/securityalert/4942> > * VUPEN - ADV-2009-0177 > <http://www.vupen.com/english/advisories/2009/0177> > * XF - jackrabbit-search-swr-xss(48110) > <http://xforce.iss.net/xforce/xfdb/48110> > > Vulnerable Software & Versions: (show all) > > * cpe:/a:apache:jackrabbit:1.5.0 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ajackrabbit%3A1.5.0> > > * ... > > > wagon-webdav-jackrabbit-1.0-beta-6.jar > > *Description:* Wagon that gets and puts artifacts through webdav protocol > > *File Path:* > C:\Users\peter\Documents\NetBeansProjects\river-internet\modularize\JGDMS\target\test-repo\org\apache\maven\wagon\wagon-webdav-jackrabbit\1.0-beta-6\wagon-webdav-jackrabbit-1.0-beta-6.jar > *MD5:* 54e5811336dab214bd598b4ac92cdf99 > *SHA1:* b694b223d0f19abcb32e304ebd5054061ee0f7b5 > *Referenced In Project/Scope:* Module :: Phoenix:runtime > > > Evidence > > > Identifiers > > * *cpe:* cpe:/a:apache:jackrabbit:1.0 /Confidence/:LOW > > * *maven:* org.apache.maven.wagon:wagon-webdav-jackrabbit:1.0-beta-6 > /Confidence/:HIGH > > > Published Vulnerabilities > > *CVE-2015-1833 > <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1833>* > > Severity: Medium > CVSS Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) > CWE: CWE-20 Improper Input Validation > > XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, > 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before > 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary > files and send requests to intranet servers via a crafted WebDAV request. > > * BID - 74761 <http://www.securityfocus.com/bid/74761> > * BUGTRAQ - 20150521 CVE-2015-1833 (Jackrabbit WebDAV XXE > vulnerability) > <http://www.securityfocus.com/archive/1/archive/1/535582/100/0/threaded> > * CONFIRM - > http://www.apache.org/dist/jackrabbit/2.10.1/RELEASE-NOTES.txt > * CONFIRM - https://issues.apache.org/jira/browse/JCR-3883 > * DEBIAN - DSA-3298 <http://www.debian.org/security/2015/dsa-3298> > * EXPLOIT-DB - 37110 <https://www.exploit-db.com/exploits/37110/> > * MISC - > > http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html > * MLIST - [jackrabbit-announce] 20150521 CVE-2015-1833 (Jackrabbit > WebDAV XXE vulnerability) > > <http://mail-archives.apache.org/mod_mbox/jackrabbit-announce/201505.mbox/%3C555DA644.8080908%40greenbytes.de%3E> > > Vulnerable Software & Versions: (show all) > > * cpe:/a:apache:jackrabbit:2.0.5 > > <https://web.nvd.nist.gov/view/vuln/search-results?adv_search=true&cves=on&cpe_version=cpe%3A%2Fa%3Aapache%3Ajackrabbit%3A2.0.5> > and all previous versions > * ... > > > > This report contains data retrieved from the National Vulnerability Database > <http://nvd.nist.gov>.