github.com/CycloneDX/sbom-utility@v0.16.0/test/trim/trim-cdx-1-4-sample-vex.json (about) 1 { 2 "bomFormat": "CycloneDX", 3 "specVersion": "1.4", 4 "version": 1, 5 "vulnerabilities": [ 6 { 7 "id": "CVE-2020-25649", 8 "cwes": [611], 9 "created": "2020-12-03T00:00:00.000Z", 10 "published": "2020-12-03T00:00:00.000Z", 11 "updated": "2023-02-02T00:00:00.000Z", 12 "description": "com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.\n\nAffected versions of this package are vulnerable to XML External Entity (XXE) Injection. A flaw was found in FasterXML Jackson Databind, where it does not have entity expansion secured properly in the DOMDeserializer class. The highest threat from this vulnerability is data integrity.", 13 "detail": "XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.\n\nAttacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.", 14 "recommendation": "Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.7, 2.10.5.1 or higher.", 15 "source": { 16 "name": "NVD", 17 "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25649" 18 }, 19 "references": [ 20 { 21 "id": "1887664", 22 "source": { 23 "name": "Red Hat, Inc.", 24 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887664" 25 } 26 }, 27 { 28 "id": "SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302", 29 "source": { 30 "name": "SNYK", 31 "url": "https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302" 32 } 33 } 34 ], 35 "ratings": [ 36 { 37 "source": { 38 "name": "NVD", 39 "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N&version=3.1" 40 }, 41 "score": 7.5, 42 "severity": "high", 43 "method": "CVSSv31", 44 "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" 45 }, 46 { 47 "source": { 48 "name": "SNYK", 49 "url": "https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302" 50 }, 51 "score": 8.2, 52 "severity": "high", 53 "method": "CVSSv31", 54 "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" 55 }, 56 { 57 "source": { 58 "name": "Acme Inc", 59 "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/CR:X/IR:X/AR:X/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:N/MI:N/MA:N&version=3.1" 60 }, 61 "score": 0.0, 62 "severity": "none", 63 "method": "CVSSv31", 64 "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/CR:X/IR:X/AR:X/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:N/MI:N/MA:N" 65 } 66 ], 67 "advisories": [ 68 { 69 "title": "GitHub Commit", 70 "url": "https://github.com/FasterXML/jackson-databind/commit/612f971b78c60202e9cd75a299050c8f2d724a59" 71 }, 72 { 73 "title": "GitHub Issue", 74 "url": "https://github.com/FasterXML/jackson-databind/issues/2589" 75 }, 76 { 77 "title": "RedHat Bugzilla Bug", 78 "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887664" 79 } 80 ], 81 "credits": { 82 "individuals": [ 83 { 84 "name": "Bartosz Baranowski" 85 } 86 ] 87 }, 88 "analysis": { 89 "state": "not_affected", 90 "justification": "code_not_reachable", 91 "response": ["will_not_fix", "update"], 92 "detail": "Automated dataflow analysis and manual code review indicates that the vulnerable code is not reachable, either directly or indirectly." 93 }, 94 "affects": [ 95 { 96 "ref": "urn:cdx:3e671687-395b-41f5-a30f-a58921a69b79/1#pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.10.0?type=jar" 97 } 98 ] 99 }, 100 { 101 "id": "CVE-2022-42003", 102 "cwes": [502], 103 "description": "In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. Additional fix version in 2.13.4.1 and 2.12.17.1", 104 "detail": "", 105 "recommendation": "", 106 "created": "2022-10-02T00:00:00.000Z", 107 "published": "2022-10-02T00:00:00.000Z", 108 "updated": "2022-10-02T00:00:00.000Z", 109 "source": { 110 "name": "NVD", 111 "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" 112 }, 113 "ratings": [ 114 { 115 "source": { 116 "name": "NVD", 117 "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-42003&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST" 118 }, 119 "score": 7.5, 120 "severity": "high", 121 "method": "CVSSv31", 122 "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" 123 } 124 ], 125 "references": [ 126 { 127 "id": "51020", 128 "source": { 129 "name": "oss-fuzz", 130 "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51020" 131 } 132 } 133 ], 134 "advisories": [ 135 { 136 "title": "GitHub Issue", 137 "url": "https://github.com/FasterXML/jackson-databind/issues/3590" 138 }, 139 { 140 "title": "GitHub Commit", 141 "url": "https://github.com/FasterXML/jackson-databind/commit/d78d00ee7b5245b93103fef3187f70543d67ca33" 142 } 143 ] 144 }, 145 { 146 "id": "CVE-2022-42004", 147 "cwes": [502], 148 "description": "In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.", 149 "detail": "", 150 "recommendation": "", 151 "created": "2022-10-02T00:00:00.000Z", 152 "published": "2022-10-02T00:00:00.000Z", 153 "updated": "2022-10-02T00:00:00.000Z", 154 "source": { 155 "name": "NVD", 156 "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004" 157 }, 158 "ratings": [ 159 { 160 "source": { 161 "name": "NVD", 162 "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-42004&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST" 163 }, 164 "score": 7.5, 165 "severity": "high", 166 "method": "CVSSv31", 167 "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" 168 } 169 ], 170 "references": [ 171 { 172 "id": "50490", 173 "source": { 174 "name": "oss-fuzz", 175 "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50490" 176 } 177 } 178 ], 179 "advisories": [ 180 { 181 "title": "GitHub Issue", 182 "url": "https://github.com/FasterXML/jackson-databind/issues/3582" 183 }, 184 { 185 "title": "GitHub Commit", 186 "url": "https://github.com/FasterXML/jackson-databind/commit/063183589218fec19a9293ed2f17ec53ea80ba88" 187 } 188 ] 189 } 190 ] 191 }