You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).
Mend Note: After conducting further research, Mend has determined that versions 1.0.1--5.3.0-beta2 of aviator are vulnerable to CVE-2021-41616.
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
mend-bolt-for-githubbot
changed the title
aviator-4.1.2.jar: 3 vulnerabilities (highest severity is: 9.8)
aviator-4.1.2.jar: 2 vulnerabilities (highest severity is: 9.8)
Jan 19, 2025
Vulnerable Library - aviator-4.1.2.jar
A lightweight,high performance expression evaluator for java
Library home page: http://code.google.com/p/aviator/
Path to dependency file: /pom.xml
Path to vulnerable library: /pom.xml
Found in HEAD commit: 1ce3ced61a3644208544cd479d64844e4ce360bf
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2021-41862
Vulnerable Library - aviator-4.1.2.jar
A lightweight,high performance expression evaluator for java
Library home page: http://code.google.com/p/aviator/
Path to dependency file: /pom.xml
Path to vulnerable library: /pom.xml
Dependency Hierarchy:
Found in HEAD commit: 1ce3ced61a3644208544cd479d64844e4ce360bf
Found in base branch: master
Vulnerability Details
AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).
Mend Note: After conducting further research, Mend has determined that versions 1.0.1--5.3.0-beta2 of aviator are vulnerable to CVE-2021-41616.
Publish Date: 2021-10-01
URL: CVE-2021-41862
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-41862
Release Date: 2021-10-01
Fix Resolution: 5.3.0
Step up your Open Source Security Game with Mend here
CVE-2014-0114
Vulnerable Library - commons-beanutils-1.9.3.jar
Apache Commons BeanUtils provides an easy-to-use but flexible wrapper around reflection and introspection.
Library home page: https://www.apache.org/
Path to dependency file: /pom.xml
Path to vulnerable library: /pom.xml
Dependency Hierarchy:
Found in HEAD commit: 1ce3ced61a3644208544cd479d64844e4ce360bf
Found in base branch: master
Vulnerability Details
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
Publish Date: 2014-04-30
URL: CVE-2014-0114
CVSS 3 Score Details (7.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
Release Date: 2014-04-30
Fix Resolution (commons-beanutils:commons-beanutils): 1.9.4
Direct dependency fix Resolution (com.googlecode.aviator:aviator): 5.1.3
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: