Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03OHdyLTJwNjQtaHB3as4AA_7s
Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader
Uncontrolled Resource Consumption vulnerability in Apache Commons IO.
The org.apache.commons.io.input.XmlStreamReader
class may excessively consume CPU resources when processing maliciously crafted input.
This issue affects Apache Commons IO: from 2.0 before 2.14.0.
Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.
Permalink: https://github.com/advisories/GHSA-78wr-2p64-hpwjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03OHdyLTJwNjQtaHB3as4AA_7s
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 months ago
Updated: about 2 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-78wr-2p64-hpwj, CVE-2024-47554
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-47554
- https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1
- https://github.com/advisories/GHSA-78wr-2p64-hpwj
Affected Packages
maven:commons-io:commons-io
Dependent packages: 21,919Dependent repositories: 245,203
Downloads:
Affected Version Ranges: >= 2.0, < 2.14.0
Fixed in: 2.14.0
All affected versions: 2.0.1, 2.8.0, 2.9.0, 2.10.0, 2.11.0, 2.12.0, 2.13.0
All unaffected versions: 1.3.1, 1.3.2, 2.14.0, 2.15.0, 2.15.1, 2.16.0, 2.16.1, 2.17.0