com.powsybl:powsybl-cgmes-model@3.8.1 vulnerabilities

  • latest version

    6.7.2

  • latest non vulnerable version

  • first published

    6 years ago

  • latest version published

    14 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the com.powsybl:powsybl-cgmes-model package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Regular Expression Denial of Service (ReDoS)

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the listNames function. An attacker can cause significant CPU consumption and degrade server performance by supplying a crafted regular expression and influencing the set of resource names being matched.

    Note:

    This is only exploitable if an attacker can control both the regular expression input and the resource names being evaluated.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade com.powsybl:powsybl-cgmes-model to version 6.7.2 or higher.

    [,6.7.2)
    • M
    Server-side Request Forgery (SSRF)

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the com.powsybl.commons.xml.XmlReader class. An attacker can access sensitive files or internal resources by submitting specially crafted XML input.

    Note:

    This is only exploitable if untrusted users are allowed to import untrusted CGMES or XIIDM network files.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade com.powsybl:powsybl-cgmes-model to version 6.7.2 or higher.

    [,6.7.2)