You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /android/NavigationExamples/app/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom
Path to dependency file: /android/NavigationExamples/app/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom
A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.
An HTTP+HTTP/2 client for Android and Java applications
Library home page: https://github.com/square/okhttp
Path to dependency file: /android/NavigationExamples/app/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom
Found in HEAD commit: 52370342f9aebd709335d435a59a513ad610b044
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - okhttp-3.14.7.jar
An HTTP+HTTP/2 client for Android and Java applications
Library home page: https://github.com/square/okhttp
Path to dependency file: /android/NavigationExamples/app/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.squareup.okhttp3/okhttp/3.14.7/ed28a0b50927ee2cd9f2e0eb571f3165a6b3ac56/okhttp-3.14.7.pom
Dependency Hierarchy:
Found in HEAD commit: 52370342f9aebd709335d435a59a513ad610b044
Found in base branch: main
Vulnerability Details
A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.
Publish Date: 2023-09-27
URL: CVE-2023-0833
CVSS 3 Score Details (4.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: square/okhttp#6738
Release Date: 2023-09-27
Fix Resolution: 4.9.2
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: