Skip to content

javafx-media-17.0.8.jar: 1 vulnerabilities (highest severity is: 3.1) #202

@mend-bolt-for-github

Description

@mend-bolt-for-github
Vulnerable Library - javafx-media-17.0.8.jar

Library home page: https://openjdk.java.net/projects/openjfx/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (javafx-media version) Remediation Possible**
CVE-2024-20925 Low 3.1 javafx-media-17.0.8.jar Direct org.openjfx:javafx-graphics:org.openjfx:javafx-media:17.0.10,21.0.2

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-20925

Vulnerable Library - javafx-media-17.0.8.jar

Library home page: https://openjdk.java.net/projects/openjfx/

Path to dependency file: /artemis-java-template/pom.xml

Path to vulnerable library: /artemis-java-template/pom.xml

Dependency Hierarchy:

  • javafx-media-17.0.8.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u391; Oracle GraalVM Enterprise Edition: 20.3.12 and 21.3.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).

Publish Date: 2024-02-17

URL: CVE-2024-20925

CVSS 3 Score Details (3.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-47g3-mf24-6559

Release Date: 2024-02-17

Fix Resolution: org.openjfx:javafx-graphics:org.openjfx:javafx-media:17.0.10,21.0.2

Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions