Hi Flinksters, Our repo which is a maven based java project(flink) went through SCA scan using WhiteSource tool and following are the HIGH severity issues reported. The target vulnerable jar is not found when we build the dependency tree of the project. Could any one let us know if flink uses these anywhere. +----------------------+------------+ | Library | Severity | +======================+============+ | xercesImpl-2.9.1.jar | HIGH | +----------------------+------------+ - Artifact ID: xercesImpl - Group ID: xerces - Library Version: 2.9.1 - Library Path: /var/lib/jenkins/workspace/branch/latest/?/.m2/repository/xerces/xercesImpl/2.9.1/xercesImpl-2.9.1.jar - Dependency: None - Type: MAVEN_ARTIFACT - Description: XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names. - Suggested Fix: Upgrade to version xerces:xercesImpl:Xerces-J_2_12_0+-----------------------+------------+ | Library | Severity | +=======================+============+ | struts-core-1.3.8.jar | HIGH | +-----------------------+------------+ - Artifact ID: struts-core - Group ID: org.apache.struts - Library Version: 1.3.8 - Library Path: /var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/apache/struts/struts-core/1.3.8/struts-core-1.3.8.jar - Dependency: None - Type: MAVEN_ARTIFACT - Description: ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899. - Suggested Fix: Replace or update the following file: ActionServlet.java+----------------------+------------+ | Library | Severity | +======================+============+ | plexus-utils-3.0.jar | HIGH | +----------------------+------------+ - Artifact ID: plexus-utils - Group ID: org.codehaus.plexus - Library Version: 3.0 - Library Path: /var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar - Dependency: None - Type: MAVEN_ARTIFACT - Description: Security vulnerability found in plexus-utils before 3.0.24. XML injection found in XmlWriterUtil.java. - Suggested Fix: Upgrade to version 3.0.24Thanks,Prasanna. |
Hi Prasanna, in the latest Flink version (1.13.0) I couldn't find these dependencies. Which version of Flink are you looking at? What you could check is whether one of these dependencies is contained in one of Flink's shaded dependencies [1]. Cheers, Till On Tue, May 4, 2021 at 3:00 PM Prasanna kumar <[hidden email]> wrote:
|
One of these (plexus-utils) is afaik used by maven, so the scanner is
potentially scanning the wrong thing. Or you are scanning all dependencies downloaded during the build of Flink, including everything used by various plugins of the build process & maven itself. On 5/5/2021 11:08 AM, Till Rohrmann wrote: > Hi Prasanna, > > in the latest Flink version (1.13.0) I couldn't find these dependencies. > Which version of Flink are you looking at? What you could check is whether > one of these dependencies is contained in one of Flink's shaded > dependencies [1]. > > [1] https://github.com/apache/flink-shaded > > Cheers, > Till > > On Tue, May 4, 2021 at 3:00 PM Prasanna kumar <[hidden email]> > wrote: > >> Hi Flinksters, >> >> Our repo which is a maven based java project(flink) went through SCA scan using WhiteSource tool and following are the HIGH severity issues reported. The target vulnerable jar is not found when we build the dependency tree of the project. >> >> Could any one let us know if flink uses these anywhere. >> >> +----------------------+------------+ >> | Library | Severity | >> +======================+============+ >> | xercesImpl-2.9.1.jar | HIGH | >> +----------------------+------------+ >> - Artifact ID: xercesImpl >> - Group ID: xerces >> - Library Version: 2.9.1 >> - Library Path: /var/lib/jenkins/workspace/branch/latest/?/.m2/repository/xerces/xercesImpl/2.9.1/xercesImpl-2.9.1.jar >> - Dependency: None >> - Type: MAVEN_ARTIFACT >> - Description: XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names. >> - Suggested Fix: Upgrade to version xerces:xercesImpl:Xerces-J_2_12_0 >> >> >> +-----------------------+------------+ >> | Library | Severity | >> +=======================+============+ >> | struts-core-1.3.8.jar | HIGH | >> +-----------------------+------------+ >> - Artifact ID: struts-core >> - Group ID: org.apache.struts >> - Library Version: 1.3.8 >> - Library Path: /var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/apache/struts/struts-core/1.3.8/struts-core-1.3.8.jar >> - Dependency: None >> - Type: MAVEN_ARTIFACT >> - Description: ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899. >> - Suggested Fix: Replace or update the following file: ActionServlet.java >> >> +----------------------+------------+ >> | Library | Severity | >> +======================+============+ >> | plexus-utils-3.0.jar | HIGH | >> +----------------------+------------+ >> - Artifact ID: plexus-utils >> - Group ID: org.codehaus.plexus >> - Library Version: 3.0 >> - Library Path: /var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar >> - Dependency: None >> - Type: MAVEN_ARTIFACT >> - Description: Security vulnerability found in plexus-utils before 3.0.24. XML injection found in XmlWriterUtil.java. >> - Suggested Fix: Upgrade to version 3.0.24 >> >> Thanks, >> >> Prasanna. >> >> |
Free forum by Nabble | Edit this page |