Lucene search

K
amazonAmazonALAS2-2023-2165
HistoryJul 20, 2023 - 5:29 p.m.

Important: apache-ivy

2023-07-2017:29:00
alas.aws.amazon.com
3

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.3 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

52.9%

Issue Overview:

When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied โ€œpatternโ€ that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain โ€œโ€ฆ/โ€ sequences - which are valid characters for Ivy coordinates in general - it is possible the artifacts are stored outside of Ivyโ€™s local cache or repository or can overwrite different artifacts inside of the local cache. In order to exploit this vulnerability an attacker needs collaboration by the remote repository as Ivy will issue http requests containing โ€œโ€ฆโ€ sequences and a โ€œnormalโ€ repository will not interpret them as part of the artifact coordinates. Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1. (CVE-2022-37866)

Affected Packages:

apache-ivy

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update apache-ivy to update your system.

New Packages:

noarch:  
ย ย ย  apache-ivy-2.3.0-4.amzn2.0.1.noarch  
ย ย ย  apache-ivy-javadoc-2.3.0-4.amzn2.0.1.noarch  
  
src:  
ย ย ย  apache-ivy-2.3.0-4.amzn2.0.1.src  

Additional References

Red Hat: CVE-2022-37866

Mitre: CVE-2022-37866

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.3 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

52.9%