Get Vulnerability Updates

Data for SBOM Document ID: 865df0f4-dafe-43fe-923c-3e56c7d88878

Key Value
Name com.github.codenotary/immudb
SPDX specVersion SPDX-2.3
Creation Info Creators: Tool: GitHub.com-Dependency-Graph
Created: 2023-11-04T11:05:54Z
Data License CC0-1.0
Document Namespace https://github.com/codenotary/immudb/dependency_graph/sbom-607bbb25c897e13e
Total Components

191

6.98 / 10

Vulnerability Severity Distribution

Critical
High
Medium
Low
None
Unknown
10.0%50.0%40.0%
CVE-2023-44487CVE-2023-44487CVE-2023-48795CVE-2023-48795CVE-2023-43804CVE-2023-43804CVE-2022-36111CVE-2022-36111CVE-2023-39325CVE-2023-39325CVE-2023-37920CVE-2023-37920CVE-2023-3978CVE-2023-3978CVE-2023-45803CVE-2023-45803CVE-2022-39199CVE-2022-39199GHSA-m425-mq9...GHSA-m425-mq94-257gCVE ID100%100%90%90%80%80%70%70%60%60%50%50%40%40%30%30%20%20%10%10%0%0%EPSS Score (%)Top 15 CVEs by EPSS Score
Download SVG
Download PNG
Download CSV
Total Vulnerabilities

10

Critical

1

High

5

Medium

4

Low

0

None

0

#
License Name

1
Apache-2.0

Structural

Average: 10.0

# Description Score Score Progress
1 provided sbom is in a supported sbom format of spdx,cyclonedx 10.0
2 provided sbom should be in supported spec version for spec:SPDX-2.3 and versions: SPDX-2.1,SPDX-2.2,SPDX-2.3 10.0
3 provided sbom should be in supported file format for spec: json and version: json,yaml,rdf,tag-value 10.0
4 provided sbom is parsable 10.0

NTIA-minimum-elements

Average: 8.6

# Description Score Score Progress
1 0/191 have supplier names 0.0
2 191/191 have names 10.0
3 189/191 have versions 9.9
4 191/191 have unique ID's 10.0
5 doc has 191 relationships 10.0
6 doc has 1 authors 10.0
7 doc has creation timestamp 2023-11-04T11:05:54Z 10.0

Semantic

Average: 3.5

# Description Score Score Progress
1 Doc Fields:true Pkg Fields:true 10.0
2 7/191 have licenses 0.4
3 0/191 have checksums 0.0

Quality

Average: 5.0

# Description Score Score Progress
1 7/191 components with valid license 0.4
2 0/191 components have primary purpose specified 0.0
3 0/191 components have deprecated licenses 10.0
4 0/191 components have restricted licenses 10.0
5 190/191 components have any lookup id 9.9
6 0/191 components have multiple lookup id 0.0
7 0/1 tools have creator and version 0.0
8 primary component found 10.0

Sharing

Average: 10.0

# Description Score Score Progress
1 doc has a sharable license free 1 :: of 1 10.0
#
ID
Description
Severity
EPSS Score
EPSS Percentile

1
CVE-2023-37920
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.
critical
0.00115
0.31223
2
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
high
0.94469
0.99995
3
CVE-2023-43804
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
high
0.00569
0.67592
4
CVE-2023-39325
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
high
0.0015
0.36639
5
CVE-2023-3978
Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
high
0.00078
0.24332
6
GHSA-m425-mq94-257g
### Impact In affected releases of gRPC-Go, it is possible for an attacker to send HTTP/2 requests, cancel them, and send subsequent requests, which is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit. ### Patches This vulnerability was addressed by #6703 and has been included in patch releases: 1.56.3, 1.57.1, 1.58.3. It is also included in the latest release, 1.59.0. Along with applying the patch, users should also ensure they are using the `grpc.MaxConcurrentStreams` server option to apply a limit to the server's resources used for any single connection. ### Workarounds None. ### References #6703
high
 
 
7
CVE-2023-48795
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
medium
0.77369
0.98914
8
CVE-2022-36111
immudb is a database with built-in cryptographic proof and verification. In versions prior to 1.4.1, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability. This issue has been patched in version 1.4.1.
medium
0.00169
0.39053
9
CVE-2023-45803
urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
medium
0.00062
0.19719
10
CVE-2022-39199
immudb is a database with built-in cryptographic proof and verification. immudb client SDKs use server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. SDK does not validate this uuid and can accept any value reported by the server. A malicious server can change the reported UUID tricking the client to treat it as a different server thus accepting a state completely irrelevant to the one previously retrieved from the server. This issue has been patched in version 1.4.1. As a workaround, when initializing an immudb client object a custom state handler can be used to store the state. Providing custom implementation that ignores the server UUID can be used to ensure that even if the server changes the UUID, client will still consider it to be the same server.
medium
0.00043
0.12557
#
Name
Version
License
Purl

1
actions:actions/checkout
 
unknown
2
actions:actions/download-artifact
 
unknown
3
actions:actions/setup-go
 
unknown
4
actions:actions/upload-artifact
 
unknown
5
actions:aws-actions/configure-aws-credentials
 
unknown
6
actions:docker/setup-qemu-action
 
unknown
7
actions:mattermost/action-mattermost-notify
 
unknown
8
actions:securego/gosec
 
unknown
9
actions:sonarsource/sonarcloud-github-action
 
unknown
10
com.github.codenotary/immudb
 
Apache-2.0