Replies: 1 comment
-
|
hello @mymichu You can read about similar case in #8463 Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
We found that CVE-2024-48510 is marked as high severity by Trivy Vulnerability Scan, with a score of 9.8. On the Aquasec homepage, it is listed as a critical severity issue. There is a mismatch in severity matching.
Desired Behavior
I would assume that any score above 9 indicates a Critical severity.
Actual Behavior
A vulnerability score of 9.8 indicates a High severity. Here is the relevant SBOM snippet.
{ "id": "CVE-2024-48510", "source": { "name": "ghsa", "url": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anuget" }, "ratings": [ { "source": { "name": "ghsa" }, "score": 9.8, "severity": "high", "method": "CVSSv31", "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "source": { "name": "nvd" }, "score": 9.8, "severity": "critical", "method": "CVSSv31", "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "cwes": [ 22 ], "description": "Directory Traversal vulnerability in DotNetZip v.1.16.0 and before allows a remote attacker to execute arbitrary code via the src/Zip.Shared/ZipEntry.Extract.cs component NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", "advisories": [ { "url": "https://avd.aquasec.com/nvd/cve-2024-48510" }, { "url": "https://gist.github.com/thomas-chauchefoin-bentley-systems/855218959116f870f08857cce2aec731" }, { "url": "https://github.com/haf/DotNetZip.Semverd" }, { "url": "https://github.com/haf/DotNetZip.Semverd/blob/e487179b33a9a0f2631eed5fb04d2c952ea5377a/src/Zip.Shared/ZipEntry.Extract.cs#L1365-L1410" }, { "url": "https://github.com/mihula/ProDotNetZip/commit/18486ad6d13742a07a6755ef6edf60d7458f1854" }, { "url": "https://github.com/mihula/ProDotNetZip/pull/21" }, { "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48510" }, { "url": "https://www.nuget.org/packages/DotNetZip" }, { "url": "https://www.nuget.org/packages/DotNetZip/" } ], "published": "2024-11-13T15:15:07+00:00", "updated": "2025-05-02T10:40:29+00:00", "affects": [ { "ref": "pkg:nuget/[email protected]", "versions": [ { "version": "1.13.3", "status": "affected" } ] } ] },Reproduction Steps
1. trivy image --scanners vuln --timeout 10m --severity HIGH,CRITICAL --exit-code 11 --quiet --format cyclonedx INTERNAL_IMAGE > vulns-filtered.cdx.jsonTarget
Container Image
Scanner
Vulnerability
Output Format
CycloneDX
Mode
Standalone
Debug Output
Operating System
macOs Sequoia
Version
Checklist
trivy clean --allBeta Was this translation helpful? Give feedback.
All reactions