org.apache.commons:commons-compress@1.22 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.commons:commons-compress package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Allocation of Resources Without Limits or Throttling

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to an OutOfMemoryError during the handling of a broken Pack200 file.

How to fix Allocation of Resources Without Limits or Throttling?

Upgrade org.apache.commons:commons-compress to version 1.26.0 or higher.

[1.21,1.26.0)
  • H
Infinite loop

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Infinite loop due to the improper handling of certain inputs during the parsing of dump files. An attacker can cause the application to enter an infinite loop by supplying crafted inputs.

How to fix Infinite loop?

Upgrade org.apache.commons:commons-compress to version 1.26.0 or higher.

[1.3,1.26.0)
  • M
Improper Input Validation

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Improper Input Validation when parsing TAR files. An attacker can manipulate file modification times headers, leading to a denial of service issue via CPU consumption.

Note: This is only exploitable if applications are using the CompressorStreamFactory class (with auto-detection of file types), TarArchiveInputStream, and TarFile classes to parse TAR files.

How to fix Improper Input Validation?

Upgrade org.apache.commons:commons-compress to version 1.24.0 or higher.

[1.22,1.24.0)