File: suppressions.xml

package info (click to toggle)
libowasp-esapi-java 2.4.0.0-2.1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 12,000 kB
  • sloc: java: 35,401; xml: 1,630; sh: 373; makefile: 2
file content (122 lines) | stat: -rw-r--r-- 6,001 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
<?xml version="1.0" encoding="UTF-8"?>
<!-- OWASP Dependency Check suppression file for ESAPI. -->
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
    <suppress>
        <notes><![CDATA[
            This suppresses CVE-2019-17571 for the log4j-1.2.17.jar dependency. ESAPI does
            not use it in a manner that makes it exploitable and ESAPI is unable to
            eliminate the dependency completely because our our deprecation policy. That specific
            CVE is the Java deserialization CVE reported in Log4J 1's SocketServer class which ESAPI
            doesn't use.

            For further details, please see:
                https://nvd.nist.gov/vuln/detail/CVE-2019-17571,
                ESAPI GitHub Issue #538 (https://github.com/ESAPI/esapi-java-legacy/issues/538),
                and the ESAPI security advisory #2, "documentation/ESAPI-security-bulletin2.pdf", which
                provides a detailed analysis of this issue in ESAPI.
        ]]></notes>
        <gav regex="true">^log4j:log4j:1\.2\.17$</gav>
        <cpe>cpe:/a:apache:log4j</cpe>
        <cve>CVE-2019-17571</cve>
    </suppress>
    <suppress>
        <notes><![CDATA[
            This suppresses CVE-2020-9488 for the log4j-1.2.17.jar dependency. ESAPI does
            not use it in a manner that makes it exploitable and ESAPI is unable to
            eliminate the dependency completely because our our deprecation policy. That specific
            CVE is the Java deserialization CVE reported in Log4J 1's SocketServer class which ESAPI
            doesn't use.

            For further details, please see:
                https://nvd.nist.gov/vuln/detail/CVE-2020-9488,
                ESAPI GitHub Issue #534 (https://github.com/ESAPI/esapi-java-legacy/issues/534),
                and the ESAPI security advisory #4, "documentation/ESAPI-security-bulletin4.pdf", which
                provides a detailed analysis of this issue in ESAPI.
        ]]></notes>
        <gav regex="true">^log4j:log4j:1\.2\.17$</gav>
        <cpe>cpe:/a:apache:log4j</cpe>
        <cve>CVE-2020-9488</cve>
    </suppress>
    <suppress>
        <notes><![CDATA[
            This suppresses CVE-2021-4104 for the log4j-1.2.17.jar dependency. ESAPI's
            default configuration uses ConsoleAppender rather than JMSAppender and
            thus does not use Log4J 1 in a manner that makes it exploitable. ESAPI is unable to
            eliminate the dependency completely because our our deprecation policy.

            For further details, please see:
                https://nvd.nist.gov/vuln/detail/CVE-2021-4104 and
                the ESAPI security advisory #6, "documentation/ESAPI-security-bulletin6.pdf", which
                provides a detailed analysis of this issue in ESAPI.
        ]]></notes>
        <gav regex="true">^log4j:log4j:1\.2\.17$</gav>
        <cpe>cpe:/a:apache:log4j</cpe>
        <cve>CVE-2021-4104</cve>
    </suppress>
    <suppress>
        <notes><![CDATA[
            This suppresses CVE-2022-23305 for the log4j-1.2.17.jar dependency. ESAPI's
            default configuration uses ConsoleAppender rather than JDBCAppender and
            thus does not use Log4J 1 in a manner that makes it exploitable. ESAPI is unable to
            eliminate the dependency completely because our our deprecation policy.

            For further details, please see:
                https://nvd.nist.gov/vuln/detail/CVE-2022-23305 and
                the ESAPI security advisory #7, "documentation/ESAPI-security-bulletin7.pdf", which
                provides a detailed analysis of this issue in ESAPI.
        ]]></notes>
        <gav regex="true">^log4j:log4j:1\.2\.17$</gav>
        <cpe>cpe:/a:apache:log4j</cpe>
        <cve>CVE-2022-23305</cve>
    </suppress>
<!--
java-8 Integration - content required for successful owasp dependency-check execution
MISSING Security Bulletin content!

    <suppress>
        <notes><![CDATA[
            This suppresses CVE-2022-23307 for the log4j-1.2.17.jar dependency. ESAPI's
            default configuration uses ConsoleAppender rather than Chainsaw and
            thus does not use Log4J 1 in a manner that makes it exploitable. ESAPI is unable to
            eliminate the dependency completely because our our deprecation policy.

            For further details, please see:
                https://nvd.nist.gov/vuln/detail/CVE-2022-23307 and

-> NEEDS BULLETIN REFERENCE

        ]]></notes>
        <gav regex="true">^log4j:log4j:1\.2\.17$</gav>
        <cpe>cpe:/a:apache:log4j</cpe>
        <cve>CVE-2022-23307</cve>
    </suppress>
    <suppress>
        <notes><![CDATA[
            This suppresses CVE-2022-23302 for the log4j-1.2.17.jar dependency. ESAPI's
            default configuration uses ConsoleAppender rather than JMSAppender and
            thus does not use Log4J 1 in a manner that makes it exploitable. ESAPI is unable to
            eliminate the dependency completely because our our deprecation policy.
            By virtue of not using a JMSAppender, the exploitable nature of the JMSSink implementation
            referenced by this CVE is also mitigated.

            For further details, please see:
                https://nvd.nist.gov/vuln/detail/CVE-2022-23302
-> NEEDS BULLETIN REFERENCE

        ]]></notes>
        <gav regex="true">^log4j:log4j:1\.2\.17$</gav>
        <cpe>cpe:/a:apache:log4j</cpe>
        <cve>CVE-2022-23302</cve>
    </suppress>
-->
    <suppress>
        <notes><![CDATA[
            ESAPI does not use this jar directly. It is a transitive dependency of AntiSamy and (as per Dave Wichers on
            the AntiSamy team), it does not impact AntiSamy, and therefore does not impact ESAPI.

             file name: batik-i18n-1.14.jar
        ]]></notes>
        <packageUrl regex="true">^pkg:maven/org\.apache\.xmlgraphics/batik\-i18n@.*$</packageUrl>
        <cve>CVE-2020-7791</cve>
    </suppress>
</suppressions>