You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The scope of this CVE affected version is [,1.18-RC1)
After further analysis, in this project, the main Api called is <org.apache.commons.compress.archivers.zip.ZipArchiveInputStream: int readStored(byte[],int,int)>
<org.apache.commons.compress.archivers.zip.ZipArchiveInputStream: int readStored(byte[],int,int)>
at <org.apache.commons.compress.archivers.zip.ZipArchiveInputStream: int read(byte[],int,int)> (org.apache.commons.compress.archivers.zip.ZipArchiveInputStream.java:[486]) in /.m2/repository/org/apache/commons/commons-compress/1.20/commons-compress-1.20.jar
at <org.codehaus.plexus.archiver.util.Streams: void copyFullyDontCloseOutput(java.io.InputStream,java.io.OutputStream,java.lang.String)> (org.codehaus.plexus.archiver.util.Streams.java:[139]) in /.m2/repository/org/codehaus/plexus/plexus-archiver/4.2.2/plexus-archiver-4.2.2.jar
at <org.codehaus.plexus.archiver.tar.TarArchiver: void tarFile(org.codehaus.plexus.archiver.ArchiveEntry,org.apache.commons.compress.archivers.tar.TarArchiveOutputStream,java.lang.String)> (org.codehaus.plexus.archiver.tar.TarArchiver.java:[339]) in /.m2/repository/org/codehaus/plexus/plexus-archiver/4.2.2/plexus-archiver-4.2.2.jar
at <org.codehaus.plexus.archiver.tar.TarArchiver: void execute()> (org.codehaus.plexus.archiver.tar.TarArchiver.java:[169]) in /.m2/repository/org/codehaus/plexus/plexus-archiver/4.2.2/plexus-archiver-4.2.2.jar
at <org.codehaus.plexus.archiver.AbstractArchiver: void createArchive()> (org.codehaus.plexus.archiver.AbstractArchiver.java:[1042]) in /.m2/repository/org/codehaus/plexus/plexus-archiver/4.2.2/plexus-archiver-4.2.2.jar
at <org.fusesource.hawtjni.maven.PackageJarMojo: void execute()> (org.fusesource.hawtjni.maven.PackageJarMojo.java:[135]) in /detect/unzip/hawtjni-master/hawtjni-maven-plugin/target/classes
Not sure why this is being reported, since it applies only to versions prior to 1.18RC1 and as your log shows, HawtJNI is using 1.20 that is not affected AFAICT
Hi, In hawtjni/hawtjni-maven-plugin,there is a dependency org.apache.commons:commons-compress:1.20 that calls the risk method.
CVE-2018-11771
The scope of this CVE affected version is [,1.18-RC1)
After further analysis, in this project, the main Api called is <org.apache.commons.compress.archivers.zip.ZipArchiveInputStream: int readStored(byte[],int,int)>
Risk method repair link : GitHub
CVE Bug Invocation Path--
Path Length : 7
Dependency tree--
Suggested solutions:
Update dependency version
Thank you very much.
The text was updated successfully, but these errors were encountered: