You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mend-bolt-for-githubbot
changed the title
CVE-2022-32511 (High) detected in jmespath-1.4.0.gem
CVE-2022-32511 (Critical) detected in jmespath-1.4.0.gem
Dec 26, 2023
CVE-2022-32511 - Critical Severity Vulnerability
Vulnerable Library - jmespath-1.4.0.gem
Implements JMESPath for Ruby
Library home page: https://rubygems.org/gems/jmespath-1.4.0.gem
Path to dependency file: /android/Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/jmespath-1.4.0.gem,/home/wss-scanner/.gem/ruby/2.7.0/cache/jmespath-1.4.0.gem
Dependency Hierarchy:
Found in HEAD commit: 5797233d8cdf8daf703b671306e48df2d1fd4cbd
Found in base branch: develop
Vulnerability Details
jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a situation where JSON.parse is preferable.
Publish Date: 2022-06-06
URL: CVE-2022-32511
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-5c5f-7vfq-3732
Release Date: 2022-06-06
Fix Resolution: jmespath - 1.6.1
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: