False positive for CVE-2023-51074 #5963
Closed
onobc
started this conversation in
False Detection
Replies: 1 comment 1 reply
-
Hello @onobc Looks like v2.7.0 is also vulnerable - json-path/JsonPath#973 (comment) Regards, Dmitriy. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
CVE-2023-51074
Description
Trivy incorrectly detects CVE-2023-51074 for json-path version 2.7.0 when the vulnerability is not until 2.8.0.
Reproduction Steps
Steps to reproduce: 1. Create project w/ dependency on json-path 2.7.0 2. Run Trivy scan on project Report yields: com.jayway.jsonpath:json-path (json-path-2.7.0.jar) │ CVE-2023-51074 │ HIGH │ affected │ 2.7.0 │ │ json-path: stack-based buffer overflow in Criteria.parse │ │ │ │ │ │ │ │ method │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-51074
Target
Container Image
Scanner
Vulnerability
Target OS
Mac OS Monterrey
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions