temporal-sdk-core-api-0.1.0: 3 vulnerabilities (highest severity is: 9.1)
Vulnerable Library - temporal-sdk-core-api-0.1.0
Path to dependency file: /bridge/Cargo.toml
Path to vulnerable library: /bridge/Cargo.toml
Found in HEAD commit: [63b662559cd583d424ccbd121f96a1194e1fa2eb](https://github.com/temporalio/sdk-ruby/commit/63b662559cd583d424ccbd121f96a1194e1fa2eb)
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (temporal-sdk-core-api version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| WS-2023-0045 | 9.1 | remove_dir_all-0.5.3.crate | Transitive | N/A* | ❌ | |
| CVE-2018-16875 | 7.5 | webpki-0.22.0.crate | Transitive | N/A* | ❌ | |
| CVE-2023-26964 | 7.5 | hyper-0.14.23.crate | Transitive | N/A* | ❌ |
_For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
_*In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2023-0045
Vulnerable Library - remove_dir_all-0.5.3.crate
A safe, reliable implementation of remove_dir_all for Windows
Library home page: [https://crates.io/api/v1/crates/remove_dir_all/0.5.3/download](https://crates.io/api/v1/crates/remove_dir_all/0.5.3/download)
Path to dependency file: /bridge/Cargo.toml
Path to vulnerable library: /bridge/Cargo.toml
Dependency Hierarchy:
- temporal-sdk-core-api-0.1.0 (Root Library)
- temporal-client-0.1.0
- temporal-sdk-core-protos-0.1.0
- prost-wkt-types-0.4.0.crate
- prost-build-0.11.6.crate
- tempfile-3.3.0.crate
- :x: remove_dir_all-0.5.3.crate (Vulnerable Library)
- tempfile-3.3.0.crate
- prost-build-0.11.6.crate
- prost-wkt-types-0.4.0.crate
- temporal-sdk-core-protos-0.1.0
- temporal-client-0.1.0
Found in HEAD commit: [63b662559cd583d424ccbd121f96a1194e1fa2eb](https://github.com/temporalio/sdk-ruby/commit/63b662559cd583d424ccbd121f96a1194e1fa2eb)
Found in base branch: main
Vulnerability Details
The remove_dir_all crate is a Rust library that offers additional features over the Rust standard library fs::remove_dir_all function. It suffers the same class of failure as the code it was layering over: TOCTOU race conditions, with the ability to cause arbitrary paths to be deleted by substituting a symlink for a path after the type of the path was checked.
Publish Date: 2023-02-24
URL: [WS-2023-0045](https://github.com/XAMPPRocky/remove_dir_all/commit/7247a8b6ee59fc99bbb69ca6b3ca4bfd8c809ead)
CVSS 3 Score Details (9.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: [https://github.com/advisories/GHSA-mc8h-8q98-g5hr](https://github.com/advisories/GHSA-mc8h-8q98-g5hr)
Release Date: 2023-02-24
Fix Resolution: remove_dir_all - 0.8.0
CVE-2018-16875
Vulnerable Library - webpki-0.22.0.crate
Web PKI X.509 Certificate Verification.
Library home page: [https://crates.io/api/v1/crates/webpki/0.22.0/download](https://crates.io/api/v1/crates/webpki/0.22.0/download)
Path to dependency file: /bridge/Cargo.toml
Path to vulnerable library: /bridge/Cargo.toml
Dependency Hierarchy:
- temporal-sdk-core-api-0.1.0 (Root Library)
- temporal-client-0.1.0
- temporal-sdk-core-protos-0.1.0
- tonic-0.8.2.crate
- tokio-rustls-0.23.4.crate
- rustls-0.20.7.crate
- :x: webpki-0.22.0.crate (Vulnerable Library)
- rustls-0.20.7.crate
- tokio-rustls-0.23.4.crate
- tonic-0.8.2.crate
- temporal-sdk-core-protos-0.1.0
- temporal-client-0.1.0
Found in HEAD commit: [63b662559cd583d424ccbd121f96a1194e1fa2eb](https://github.com/temporalio/sdk-ruby/commit/63b662559cd583d424ccbd121f96a1194e1fa2eb)
Found in base branch: main
Vulnerability Details
The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
Publish Date: 2018-12-14
URL: [CVE-2018-16875](https://www.mend.io/vulnerability-database/CVE-2018-16875)
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: [https://github.com/advisories/GHSA-fh2r-99q2-6mmg](https://github.com/advisories/GHSA-fh2r-99q2-6mmg)
Release Date: 2018-12-14
Fix Resolution: golang 1.10.6,golang 1.11.3, webpki - 0.22.2, rustls-webpki - 0.100.2,0.101.4
CVE-2023-26964
Vulnerable Library - hyper-0.14.23.crate
A fast and correct HTTP library.
Library home page: [https://crates.io/api/v1/crates/hyper/0.14.23/download](https://crates.io/api/v1/crates/hyper/0.14.23/download)
Path to dependency file: /bridge/Cargo.toml
Path to vulnerable library: /bridge/Cargo.toml
Dependency Hierarchy:
- temporal-sdk-core-api-0.1.0 (Root Library)
- temporal-client-0.1.0
- temporal-sdk-core-protos-0.1.0
- tonic-0.8.2.crate
- :x: hyper-0.14.23.crate (Vulnerable Library)
- tonic-0.8.2.crate
- temporal-sdk-core-protos-0.1.0
- temporal-client-0.1.0
Found in HEAD commit: [63b662559cd583d424ccbd121f96a1194e1fa2eb](https://github.com/temporalio/sdk-ruby/commit/63b662559cd583d424ccbd121f96a1194e1fa2eb)
Found in base branch: main
Vulnerability Details
An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).
Publish Date: 2023-04-11
URL: [CVE-2023-26964](https://www.mend.io/vulnerability-database/CVE-2023-26964)
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: [https://github.com/advisories/GHSA-f8vr-r385-rh5r](https://github.com/advisories/GHSA-f8vr-r385-rh5r)
Release Date: 2023-04-11
Fix Resolution: h2 - 0.3.17