Lucene search

K
githubGitHub Advisory DatabaseGHSA-353M-JH2M-72V4
HistoryJul 28, 2023 - 3:30 p.m.

Code injection in stanford-parser

2023-07-2815:30:23
CWE-94
GitHub Advisory Database
github.com
9
code injection
vulnerability
software
exploitation
argument

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.2%

stanford-parser v3.9.2 and below was discovered to contain a code injection vulnerability in the component edu.stanford.nlp.io.getBZip2PipedInputStream. This vulnerability is exploited via passing an unchecked argument.

Affected configurations

Vulners
Node
edu.stanford.nlp\stanfordMatchparser
VendorProductVersionCPE
edu.stanford.nlp\stanfordparsercpe:2.3:a:edu.stanford.nlp\:stanford:parser:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.2%

Related for GHSA-353M-JH2M-72V4