netty-common-4.1.114.Final vulnerability
Whitesource (Mend) Scan as of 3/2025:
CVSS 3 Score: 5.3 CVSS 2 Score 5.3
Found with: yajsw v13.13
Found in: yajsw\lib\core\commons\commons-vfs2-2.9.0.jar
CVE-2025-27553: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27553
"Relative Path Traversal vulnerability in Apache Commons VFS before 2.10.0. The FileObject API in Commons VFS has a 'resolveFile' method that takes a 'scope' parameter. Specifying 'NameScope.DESCENDENT' promises that "an exception is thrown if the resolved file is not a descendent of the base file". However, when the path contains encoded ".." characters (for example, "%2E%2E/bar.txt"), it might return file objects that are not a descendent of the base file, without throwing an exception. This issue affects Apache Commons VFS: before 2.10.0. Users are recommended to upgrade to version 2.10.0, which fixes the issue."
CVE-2025-30474: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30474
"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Commons VFS. The FtpFileObject class can throw an exception when a file is not found, revealing the original URI in its message, which may include a password. The fix is to mask the password in the exception message This issue affects Apache Commons VFS: before 2.10.0. Users are recommended to upgrade to version 2.10.0, which fixes the issue."
The fix v2.10.0 is included in yajsw v13.15. Thank you, rzo.