...
Repository | Group | Impact Analysis | Action | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
dmaap-messagerouter-msgrtr | com.fasterxml.jackson.core | There is no non vulnerable version of this component(jackson-databind-2.8.11.1).This vulnerability issue only exists if com.fasterxml.jackson.databind.ObjectMapper.setDefaultTyping() is called before it is used for deserialization. DMaaP MR don't use the default typing. False Positive | No action required. Requesting an exception for all the issues reported due to this component https://jira.onap.org/browse/DMAAP-784 | ||||||||
dmaap-messagerouter-msgrtr | javax.mail | Message-Id in the email contains the user name and host name of the java process that triggered the email This component is coming from the Cambria library and all of its versions are vulnerable. As of today non of the Message Router clients use the email generating functionality of the Message Router. False Positive | No action required. Requesting an exception
| ||||||||
dmaap-messagerouter-messageservice | com.fasterxml.jackson.core | There is no non vulnerable version of this component(jackson-databind-2.8.11.1).This vulnerability issue only exists if com.fasterxml.jackson.databind.ObjectMapper.setDefaultTyping() is called before it is used for deserialization. DMaaP MR don't use the default typing. False Positive | No action required. Requesting an exception for all the issues reported due to this component | ||||||||
dmaap-messagerouter-messageservice | javax.mail | Message-Id in the email contains the user name and host name of the java process that triggered the email This component is coming from the Cambria library and all of its versions are vulnerable. As of today non of the Message Router clients use the email generating functionality of the Message Router. False Positive | No action required. Requesting an exception
| ||||||||
dmaap-messagerouter-dmaapclient | com.fasterxml.jackson.core | There is no non vulnerable version of this component(jackson-databind-2.8.11.1).This vulnerability issue only exists if com.fasterxml.jackson.databind.ObjectMapper.setDefaultTyping() is called before it is used for deserialization. DMaaP MR don't use the default typing. False Positive | No action required. Requesting an exception for all the issues reported due to this component | ||||||||
dmaap-messagerouter-dmaapclient | com.att.nsa : dmaapClient | Component com.att.nsa:dmaapClient was not used in the project dmaap-messagerouter-dmaapclient. these issues are due to issues in CLM Scan False Positive | Created a LF ticket #54030,54268 . LF Help desk updated that they don't know why the scan reported these vulnerabilities |
Note:
1) dmaap-messagerouter-docker and dmaap-buscontroller projects are created for releasing the docker images. Vulnerabilities reported in these projects are duplicate of dmaap-messagerouter-messageservice and dmaap-dbcapi
2) Jenkins job for the project dmaap-buscontroller-docker was removed , but it is still showing in the report.