Presence of Jars in Flink reg security

classic Classic list List threaded Threaded
3 messages Options
Reply | Threaded
Open this post in threaded view
|

Presence of Jars in Flink reg security

Prasanna kumar
Hi Flinksters,

Our repo which is a maven based java project(flink) went through SCA
scan using WhiteSource tool and following are the HIGH severity issues
reported. The target vulnerable jar is not found when we build the
dependency tree of the project.

Could any one let us know if flink uses these anywhere.

+----------------------+------------+
| Library              | Severity   |
+======================+============+
| xercesImpl-2.9.1.jar | HIGH       |
+----------------------+------------+
        - Artifact ID: xercesImpl
        - Group ID: xerces
        - Library Version: 2.9.1
        - Library Path:
/var/lib/jenkins/workspace/branch/latest/?/.m2/repository/xerces/xercesImpl/2.9.1/xercesImpl-2.9.1.jar
        - Dependency: None
        - Type: MAVEN_ARTIFACT
        - Description: XMLscanner.java in Apache Xerces2 Java Parser before
2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0
before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7
before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60
and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier,
JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and
possibly other products allows remote attackers to cause a denial of
service via vectors related to XML attribute names.
        - Suggested Fix: Upgrade to version xerces:xercesImpl:Xerces-J_2_12_0


+-----------------------+------------+
| Library               | Severity   |
+=======================+============+
| struts-core-1.3.8.jar | HIGH       |
+-----------------------+------------+
        - Artifact ID: struts-core
        - Group ID: org.apache.struts
        - Library Version: 1.3.8
        - Library Path:
/var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/apache/struts/struts-core/1.3.8/struts-core-1.3.8.jar
        - Dependency: None
        - Type: MAVEN_ARTIFACT
        - Description: ActionServlet.java in Apache Struts 1 1.x through
1.3.10 does not properly restrict the Validator configuration, which
allows remote attackers to conduct cross-site scripting (XSS) attacks
or cause a denial of service via crafted input, a related issue to
CVE-2015-0899.
        - Suggested Fix: Replace or update the following file: ActionServlet.java

+----------------------+------------+
| Library              | Severity   |
+======================+============+
| plexus-utils-3.0.jar | HIGH       |
+----------------------+------------+
        - Artifact ID: plexus-utils
        - Group ID: org.codehaus.plexus
        - Library Version: 3.0
        - Library Path:
/var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar
        - Dependency: None
        - Type: MAVEN_ARTIFACT
        - Description: Security vulnerability found in plexus-utils before
3.0.24. XML injection found in XmlWriterUtil.java.
        - Suggested Fix: Upgrade to version 3.0.24

Thanks,

Prasanna.
Reply | Threaded
Open this post in threaded view
|

Re: Presence of Jars in Flink reg security

Till Rohrmann
Hi Prasanna,

in the latest Flink version (1.13.0) I couldn't find these dependencies.
Which version of Flink are you looking at? What you could check is whether
one of these dependencies is contained in one of Flink's shaded
dependencies [1].

[1] https://github.com/apache/flink-shaded

Cheers,
Till

On Tue, May 4, 2021 at 3:00 PM Prasanna kumar <[hidden email]>
wrote:

> Hi Flinksters,
>
> Our repo which is a maven based java project(flink) went through SCA scan using WhiteSource tool and following are the HIGH severity issues reported. The target vulnerable jar is not found when we build the dependency tree of the project.
>
> Could any one let us know if flink uses these anywhere.
>
> +----------------------+------------+
> | Library              | Severity   |
> +======================+============+
> | xercesImpl-2.9.1.jar | HIGH       |
> +----------------------+------------+
> - Artifact ID: xercesImpl
> - Group ID: xerces
> - Library Version: 2.9.1
> - Library Path: /var/lib/jenkins/workspace/branch/latest/?/.m2/repository/xerces/xercesImpl/2.9.1/xercesImpl-2.9.1.jar
> - Dependency: None
> - Type: MAVEN_ARTIFACT
> - Description: XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
> - Suggested Fix: Upgrade to version xerces:xercesImpl:Xerces-J_2_12_0
>
>
> +-----------------------+------------+
> | Library               | Severity   |
> +=======================+============+
> | struts-core-1.3.8.jar | HIGH       |
> +-----------------------+------------+
> - Artifact ID: struts-core
> - Group ID: org.apache.struts
> - Library Version: 1.3.8
> - Library Path: /var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/apache/struts/struts-core/1.3.8/struts-core-1.3.8.jar
> - Dependency: None
> - Type: MAVEN_ARTIFACT
> - Description: ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899.
> - Suggested Fix: Replace or update the following file: ActionServlet.java
>
> +----------------------+------------+
> | Library              | Severity   |
> +======================+============+
> | plexus-utils-3.0.jar | HIGH       |
> +----------------------+------------+
> - Artifact ID: plexus-utils
> - Group ID: org.codehaus.plexus
> - Library Version: 3.0
> - Library Path: /var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar
> - Dependency: None
> - Type: MAVEN_ARTIFACT
> - Description: Security vulnerability found in plexus-utils before 3.0.24. XML injection found in XmlWriterUtil.java.
> - Suggested Fix: Upgrade to version 3.0.24
>
> Thanks,
>
> Prasanna.
>
>
Reply | Threaded
Open this post in threaded view
|

Re: Presence of Jars in Flink reg security

Chesnay Schepler-3
One of these (plexus-utils) is afaik used by maven, so the scanner is
potentially scanning the wrong thing. Or you are scanning all
dependencies downloaded during the build of Flink, including everything
used by various plugins of the build process & maven itself.

On 5/5/2021 11:08 AM, Till Rohrmann wrote:

> Hi Prasanna,
>
> in the latest Flink version (1.13.0) I couldn't find these dependencies.
> Which version of Flink are you looking at? What you could check is whether
> one of these dependencies is contained in one of Flink's shaded
> dependencies [1].
>
> [1] https://github.com/apache/flink-shaded
>
> Cheers,
> Till
>
> On Tue, May 4, 2021 at 3:00 PM Prasanna kumar <[hidden email]>
> wrote:
>
>> Hi Flinksters,
>>
>> Our repo which is a maven based java project(flink) went through SCA scan using WhiteSource tool and following are the HIGH severity issues reported. The target vulnerable jar is not found when we build the dependency tree of the project.
>>
>> Could any one let us know if flink uses these anywhere.
>>
>> +----------------------+------------+
>> | Library              | Severity   |
>> +======================+============+
>> | xercesImpl-2.9.1.jar | HIGH       |
>> +----------------------+------------+
>> - Artifact ID: xercesImpl
>> - Group ID: xerces
>> - Library Version: 2.9.1
>> - Library Path: /var/lib/jenkins/workspace/branch/latest/?/.m2/repository/xerces/xercesImpl/2.9.1/xercesImpl-2.9.1.jar
>> - Dependency: None
>> - Type: MAVEN_ARTIFACT
>> - Description: XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
>> - Suggested Fix: Upgrade to version xerces:xercesImpl:Xerces-J_2_12_0
>>
>>
>> +-----------------------+------------+
>> | Library               | Severity   |
>> +=======================+============+
>> | struts-core-1.3.8.jar | HIGH       |
>> +-----------------------+------------+
>> - Artifact ID: struts-core
>> - Group ID: org.apache.struts
>> - Library Version: 1.3.8
>> - Library Path: /var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/apache/struts/struts-core/1.3.8/struts-core-1.3.8.jar
>> - Dependency: None
>> - Type: MAVEN_ARTIFACT
>> - Description: ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899.
>> - Suggested Fix: Replace or update the following file: ActionServlet.java
>>
>> +----------------------+------------+
>> | Library              | Severity   |
>> +======================+============+
>> | plexus-utils-3.0.jar | HIGH       |
>> +----------------------+------------+
>> - Artifact ID: plexus-utils
>> - Group ID: org.codehaus.plexus
>> - Library Version: 3.0
>> - Library Path: /var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar
>> - Dependency: None
>> - Type: MAVEN_ARTIFACT
>> - Description: Security vulnerability found in plexus-utils before 3.0.24. XML injection found in XmlWriterUtil.java.
>> - Suggested Fix: Upgrade to version 3.0.24
>>
>> Thanks,
>>
>> Prasanna.
>>
>>