Description
Vulnerable Library - microsoft.entityframeworkcore.design.8.0.8.nupkg
Path to dependency file: /DotNetWebhookCodeSnippets/DotnetWebhookCodeSnippets.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.extensions.caching.memory/8.0.0/microsoft.extensions.caching.memory.8.0.0.nupkg
Found in HEAD commit: 3edaf92a0a3aa3d7441e08d996d889594d4650f6
Vulnerabilities
CVE | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (microsoft.entityframeworkcore.design.8.0.8.nupkg version) | Remediation Possible** | Reachability | |
---|---|---|---|---|---|---|---|---|---|
CVE-2024-43485 | 7.5 | Unproven | 3.4% | system.text.json.8.0.4.nupkg | Transitive | N/A* | ❌ | ||
CVE-2024-43483 | 7.5 | Unproven | 11.900001% | microsoft.extensions.caching.memory.8.0.0.nupkg | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-43485
Vulnerable Library - system.text.json.8.0.4.nupkg
Provides high-performance and low-allocating types that serialize objects to JavaScript Object Notation (JSON) text and deserialize JSON text to objects, with UTF-8 support built-in. Also provides types to read and write JSON text encoded as UTF-8, and to create an in-memory document object model (DOM), that is read-only, for random access of the JSON elements within a structured view of the data.
The System.Text.Json library is built-in as part of the shared framework in .NET Runtime. The package can be installed when you need to use it in other target frameworks.
Library home page: https://api.nuget.org/packages/system.text.json.8.0.4.nupkg
Path to dependency file: /DotNetCliCodeSnippets/DotnetCliCodeSnippets.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.text.json/8.0.4/system.text.json.8.0.4.nupkg
Dependency Hierarchy:
- microsoft.entityframeworkcore.design.8.0.8.nupkg (Root Library)
- microsoft.extensions.dependencymodel.8.0.1.nupkg
- ❌ system.text.json.8.0.4.nupkg (Vulnerable Library)
- microsoft.extensions.dependencymodel.8.0.1.nupkg
Found in HEAD commit: 3edaf92a0a3aa3d7441e08d996d889594d4650f6
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
DotnetCliCodeSnippets.Meetings.CreateInstantRoom (Application)
-> Vonage.Meetings.CreateRoom.CreateRoomRequest (Extension)
-> Vonage.Common.Serialization.EnumDescriptionJsonConverter (Extension)
-> System.Text.Json.Utf8JsonWriter (Extension)
...
-> System.Text.Json.Serialization.Metadata.JsonTypeInfo (Extension)
-> System.Text.Json.Serialization.Metadata.JsonMetadataServices (Extension)
-> ❌ System.Text.Json.Serialization.Converters.ConcurrentQueueOfTConverter (Vulnerable Component)
Vulnerability Details
.NET and Visual Studio Denial of Service Vulnerability
Publish Date: 2024-10-08
URL: CVE-2024-43485
Threat Assessment
Exploit Maturity: Unproven
EPSS: 3.4%
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-8g4q-xg66-9fp4
Release Date: 2024-10-08
Fix Resolution: System.Text.Json - 6.0.10,8.0.5
CVE-2024-43483
Vulnerable Library - microsoft.extensions.caching.memory.8.0.0.nupkg
In-memory cache implementation of Microsoft.Extensions.Caching.Memory.IMemoryCache.
Library home page: https://api.nuget.org/packages/microsoft.extensions.caching.memory.8.0.0.nupkg
Path to dependency file: /DotNetWebhookCodeSnippets/DotnetWebhookCodeSnippets.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.extensions.caching.memory/8.0.0/microsoft.extensions.caching.memory.8.0.0.nupkg
Dependency Hierarchy:
- microsoft.entityframeworkcore.design.8.0.8.nupkg (Root Library)
- microsoft.entityframeworkcore.relational.8.0.8.nupkg
- microsoft.entityframeworkcore.8.0.8.nupkg
- ❌ microsoft.extensions.caching.memory.8.0.0.nupkg (Vulnerable Library)
- microsoft.entityframeworkcore.8.0.8.nupkg
- microsoft.entityframeworkcore.relational.8.0.8.nupkg
Found in HEAD commit: 3edaf92a0a3aa3d7441e08d996d889594d4650f6
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
DotnetCliCodeSnippets.Conversation.Member.CreateMember (Application)
-> Vonage.Conversations.ConversationsClient (Extension)
-> Vonage.Common.Client.VonageHttpClientConfiguration (Extension)
-> ❌ System.Runtime.CompilerServices.NullableAttribute (Vulnerable Component)
Vulnerability Details
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
Publish Date: 2024-10-08
URL: CVE-2024-43483
Threat Assessment
Exploit Maturity: Unproven
EPSS: 11.900001%
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-qj66-m88j-hmgj
Release Date: 2024-10-08
Fix Resolution: System.IO.Packaging - 6.0.1,8.0.1,9.0.0-rc.2.24473.5, Microsoft.Extensions.Caching.Memory - 6.0.2,8.0.1,9.0.0-rc.2.24473.5, System.Security.Cryptography.Cose - 8.0.1,9.0.0-rc.2.24473.5