Updates Copied from - R4 DCAE Security/Vulnerability - Full Content; updatesas of 2/14
This template is intended to be used to document the outcome of the impact analysis related to the known vulnerability reported by Nexus-IQ (CLM tab in Jenkins). Nexus-IQ can identify the known vulnerabilities contained in the third party components embedded within ONAP deliverables.
...
Repository | Group | Artifact | Version | Impact Analysis | Action | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
dcaegen2-analytics-pnda | ru.yandex.qatools.camelot | camelot-kafka : jar | 2.4.4 | Description from CVE The camel-xstream component in Apache Camel before 2.15.5 and 2.16.x before 2.16.1 allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request. Explanation Apache Camel is vulnerable to Remote Code Execution (RCE) due to unsafe deserialization of java objects using the No non-vulnerable version available | Request Exception | ||||||||||
dcaegen2-analytics-pnda | ru.yandex.qatools.camelot | camelot-kafka : jar | 2.4.4 | Description from CVE Apache Camel 2.20.0 to 2.20.3 and 2.21.0 Core is vulnerable to XXE in XSD validation processor. Explanation The Apache Camel package is vulnerable to XML eXternal Entity (XXE) Injection. The No non-vulnerable version available | Request Exception | ||||||||||
dcaegen2-analytics-pnda | ru.yandex.qatools.camelot | camelot-kafka : jar | 2.4.4 | Description from CVE Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters. Explanation Netty is vulnerable to Information Disclosure. Multiple methods in multiple files improperly validate cookie names and values. This allows the presence of single-quote and double-quote characters to break tokenization. A remote attacker can exploit this vulnerability by inducing a victim to send a crafted request containing quote characters in any parameter value that sets a cookie. If that tainted cookie gets reflected in the response, the attacker can then use Cross-Site Scripting (XSS) to potentially retrieve the entire cookie header, despite the presence of an | if using netty, update to >= 3.9.8.Final, >= 3.10.3.Final or >= 4.1.0.Beta5 if using Play Framework, update to >= 2.3.9
| ||||||||||
dcaegen2-analytics-pnda | ru.yandex.qatools.camelot | camelot-kafka : jar | 2.4.4 | Description from CVE Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later. | if using zookeeper, upgrade to >= 3.4.10, >= 3.5.3
| ||||||||||
dcaegen2-analytics-pnda | ru.yandex.qatools.camelot | camelot-kafka : jar | 2.4.4 | Description from CVE Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE. Explanation Apache Camel's Validation Component is vulnerable to Server Side Request Forgery(SSRF). The No non-vulnerable version available | Request Exception | ||||||||||
dcaegen2-analytics-pnda | ru.yandex.qatools.camelot | camelot-kafka : jar | 2.4.4 | Description from CVE No authentication/authorization is enforced when a server attempts to join a quorum in Apache ZooKeeper before 3.4.10, and 3.5.0-alpha through 3.5.3-beta. As a result an arbitrary end point could join the cluster and begin propagating counterfeit changes to the leader. Explanation Apache Zookeeper is vulnerable to Insufficient Authorization. The | Request Exception | ||||||||||
dcaegen2-analytics-pnda | ru.yandex.qatools.camelot | camelot-kafka : jar | 2.4.4 | Description from CVE WebSocket08FrameDecoder in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames. Explanation Due to a flaw in the WebSocket08FrameDecoder implementation, Netty is prone to denial of service (DoS) attacks. An out-of-memory error occurs in the WebSocket08FrameDecoder implementation while processing a TextWebSocketFrame that is followed by a long stream of ContinuationWebSocketFrames. | Request Exception | ||||||||||
dcaegen2-analytics-pnda | ru.yandex.qatools.camelot | camelot-kafka : jar | 2.4.4 | Description from CVE In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authenticated Kafka users may perform action reserved for the Broker via a manually created fetch request interfering with data replication, resulting in data loss. Explanation Apache Kafka is vulnerable to Information Exposure. The | Request Exception | ||||||||||
onap-dcaegen2-analytics-tca-gen2 | com.fasterxml.jackson.core | jackson-databind | 2.9.6 | Description from CVE FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization. Explanation
| Request Exception | ||||||||||
onap-dcaegen2-analytics-tca-gen2 | com.fasterxml.jackson.core | jackson-databind | 2.9.6 | Description from CVE FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization. Explanation
| Request Exception | ||||||||||
onap-dcaegen2-analytics-tca-gen2 | com.fasterxml.jackson.core | jackson-databind | 2.9.6 | Description from CVE FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. Explanation
| Request Exception | ||||||||||
onap-dcaegen2-analytics-tca-gen2 | com.fasterxml.jackson.core | jackson-databind | 2.9.6 | Description from CVE FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization. Explanation
| Request Exception | ||||||||||
onap-dcaegen2-analytics-tca-gen2 | com.fasterxml.jackson.core | jackson-databind | 2.9.6 | Explanation
| Request Exception | ||||||||||
onap-dcaegen2-analytics-tca-gen2 | com.fasterxml.jackson.datatype | jackson-datatype-jsr310 | 2.9.6 | Description from CVE Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Databind that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8. Explanation The FasterXML | Request Exception | ||||||||||
onap-dcaegen2-analytics-tca-gen2 | org.springframework : spring-web : 5.0.9.RELEASE | Description from CVE Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable. Explanation The Spring Framework is vulnerable to Denial of Service (DoS). The | Upgrade to >=5.0.10.RELEASE and <=5.0.12.RELEASE
| ||||||||||||
onap-dcaegen2-analytics-tca-gen2 | io.undertow : undertow-core : 1.4.25.Final | Description from CVE In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own. | Request Exception | ||||||||||||
onap-dcaegen2-analytics-tca-gen2 | io.undertow : undertow-core : 1.4.25.Final | Description from CVE Get requests in JBoss Enterprise Application Platform (EAP) 7 disclose internal IP addresses to remote attackers. Explanation The | Request Exception | ||||||||||||
onap-dcaegen2-analytics-tca-gen2 | io.undertow : undertow-core : 1.4.25.Final | Description from CVE An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests. Explanation The | Request Exception | ||||||||||||
dcaegen2-analytics-tca | c3p0 : c3p0 : 0.9.1.1 | c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization. Impacted method/class not used. | Request Exception | ||||||||||||
dcaegen2-analytics-tca | com.fasterxml.jackson.core : jackson-databind : 2.4.4 | Workaround: Do not use the default typing. Instead you will need to implement your own.
| Request Exception | ||||||||||||
dcaegen2-analytics-tca | com.fasterxml.jackson.core : jackson-core : 2.4.4 | The application is vulnerable by using this component when
| Request Exception | ||||||||||||
dcaegen2-analytics-tca | commons-codec : commons-codec : 1.6 | Apache Commons Codec - Base32 would decode some invalid Base32 encoded string into arbitrary value | Upgrade to 1.10
| ||||||||||||
dcaegen2-analytics-tca | com.google.guava : guava : 13.0.1 | The application is vulnerable by using this component if it uses Java deserialization or GWT-RPC to deserialize untrusted data. | Upgrade to 23.6.1-jre if impacted
| ||||||||||||
dcaegen2-collectors-datafile | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialized. Note: Spring Security has provided their own fix for this vulnerability (CVE-2017-4995). If this component is being used as part of Spring Security, then you are not vulnerable if you are running Spring Security 4.2.3.RELEASE or greater for 4.x or Spring Security 5.0.0.M2 or greater for 5.x. | Request Exception | ||||||||||||
dcaegen2-collectors-datafile | com.fasterxml.jackson.core:jackson-databind:2.97 | Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2-collectors-datafile | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialization. Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2-collectors-datafile | com.fasterxml.jackson.datatype:jackson-datatype-jsr310:2.9.7 | The FasterXML The application is vulnerable by using the | Request Exception | ||||||||||||
dcaegen2-collectors-datafile | org.springframework : spring-web : 5.1.0.RELEASE | The Spring Framework is vulnerable to Denial of Service (DoS). The toResourceRegions() and parseRanges() methods in the HttpRange class process range requests with a large number of extensive ranges which can overlap causing additional resource consumption | Upgrade to 5.1.2.RELEASE if impacted
| ||||||||||||
dcaegen2-collectors-datafile | com.jcraft : jsch : 0.1.53 | Directory traversal vulnerability in JCraft JSch before 0.1.54 on Windows, when the mode is ChannelSftp.OVERWRITE, allows remote SFTP servers to write to arbitrary files via a ..\ (dot dot backslash) in a response to a recursive GET command. | Upgrade to 0.1.54 if impacted
| ||||||||||||
dcaegen2/collector/hv-ves | com.fasterxml.jackson.core : jackson-databind : 2.9.6 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialized. Note: Spring Security has provided their own fix for this vulnerability (CVE-2017-4995). If this component is being used as part of Spring Security, then you are not vulnerable if you are running Spring Security 4.2.3.RELEASE or greater for 4.x or Spring Security 5.0.0.M2 or greater for 5.x. Workaround: Do not use the default typing. Instead you will need to implement your own.
| Request Exception | ||||||||||||
dcaegen2/collector/hv-ves | com.fasterxml.jackson.datatype:jackson-datatype-jsr310:2.9.4 | The FasterXML jackson-datatype-jsr310 package contains a Denial of Service (DoS) vulnerability. The deserialize() method in the DurationDeserializer class and the _fromDecimal() method in the InstantDeserializer class allow arbitrarily large BigDecimal initialization values. | Request Exception | ||||||||||||
dcaegen2/collector/hv-ves | com.google.guava : guava : 19.0 | Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class The application is vulnerable by using this component if it uses Java deserialization or GWT-RPC to deserialize untrusted data. | Upgrade to 23.6.1-jre
| ||||||||||||
dcaegen2-collectors-restconf | org.apache.tomcat.embed : tomcat-embed-core : 8.0.36 | The ResourceLinkFactory class of Apache Tomcat is vulnerable to Authorization Bypass. The addResourceLink() and removeResourceLink()methods of the NamingContextListener` class allows the ability to modify unauthorized resource links on global JNDI resources not linked to the web application. | Upgrade to 8.5.35
| ||||||||||||
dcaegen2-collectors-restconf | com.fasterxml.jackson.core : jackson-databind : 2.8.11 | Do not use the default typing. Instead you will need to implement your own.
| Request Exception | ||||||||||||
dcaegen2-collectors-restconf | org.apache.tomcat : tomcat-catalina : 8.0.36 | Apache Tomcat is vulnerable to Insufficient Authorization. The forwardToLoginPage() ,forwardToErrorPage() methods of FormAuthenticator class, the invoke() method of StandardHostValve class, and the asyncDispatch() method of CoyoteAdapter class allows malicious requests to be processed as it does not use the appropriate facade object when running an untrusted application under a SecurityManage | Upgrade to 8.5.35
| ||||||||||||
dcaegen2-collectors-restconf | org.apache.httpcomponents : httpclient : 4.5 | The Apache httpcomponents component is vulnerable to Directory Traversal. The normalizePath() function in the URIBuilder class allows directory traversal characters such as ../ . | Upgrade to 4.5.3
| ||||||||||||
dcaegen2-collectors-ves | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialized. Note: Spring Security has provided their own fix for this vulnerability (CVE-2017-4995). If this component is being used as part of Spring Security, then you are not vulnerable if you are running Spring Security 4.2.3.RELEASE or greater for 4.x or Spring Security 5.0.0.M2 or greater for 5.x. | Request Exception | ||||||||||||
dcaegen2-collectors-ves | com.fasterxml.jackson.core:jackson-databind:2.97 | Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2-collectors-ves | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialization. Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2-collectors-ves | com.fasterxml.jackson.datatype:jackson-datatype-jsr310:2.9.7 | The FasterXML The application is vulnerable by using the | Request Exception | ||||||||||||
dcaegen2-collectors-ves | org.springframework.security : spring-security-web : 5.1.1.RELEASE | The Not applicable; as the specified method is not invoked | Request exception | ||||||||||||
dcaegen2-collectors-ves | com.googlecode.libphonenumber : libphonenumber : 6.2 | sonatype-2015-0090 - libphonenumber - A Cross Site Scripting vulnerability was found which is exploitable by manipulating the inputs Not applicable | Request exception | ||||||||||||
dcaegen2-collectors-ves | javax.mail : mailapi : 1.4.3 | JavaMail is vulnerable to Information Exposure. The Not applicable; as the specified method is not invoked | Request exception | ||||||||||||
dcaegen2/platform/inventory-api | com.fasterxml.jackson.core : jackson-databind : 2.8.7 | A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, Workaround: Do not use the default typing. Instead you will need to implement your own.
| Request Exception | ||||||||||||
dcaegen2/platform/inventory-api | com.fasterxml.jackson.datatype : jackson-datatype-jsr310 : 2.8.7 | The FasterXML The application is vulnerable by using the | Request Exception | ||||||||||||
onap-dcaegen2-services-pm-mapper | io.undertow : undertow-core : 2.0.16.Final | Description from CVE Get requests in JBoss Enterprise Application Platform (EAP) 7 disclose internal IP addresses to remote attackers. Explanation The undertow-core package is vulnerable to Information Exposure. The getHostAndPort() method in the HttpServerExchange class exposes an internal IP address via the Location header during a 302 redirect if the host header field is not set. A remote attacker can exploit this issue by submitting a GET request that results in a 302 redirect response. The attacker can leverage this vulnerability to exfiltrate an internal IP address that can potentially be used for further attacks. | No non-vulnerable version available; to be assessed if risk noted is valid or if dependency can be removed
| ||||||||||||
onap-dcaegen2-services-pm-mapper | io.undertow : undertow-core : 2.0.16.Final | Description from CVE An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests. Explanation The undertow package is vulnerable to Denial-of-Service (DoS). The processWrite() method in the HttpResponseConduit Java class file does not restrict the buffer allocation size. An attacker can exploit this vulnerability by crafting a request that consists of a large header size and sending it to the server. The request, once processed, would exceed the allocated buffer size resulting in an application crash or unintended behavior. | No non-vulnerable version available; to be assessed if risk noted is valid or if dependency can be removed.
| ||||||||||||
onap-dcaegen2-services-pm-mapper | org.jboss.gwt.elemento : elemento-testsuite-standalone : 0.9 | Description from CVE Get requests in JBoss Enterprise Application Platform (EAP) 7 disclose internal IP addresses to remote attackers. Explanation The undertow-core package is vulnerable to Information Exposure. The getHostAndPort() method in the HttpServerExchange class exposes an internal IP address via the Location header during a 302 redirect if the host header field is not set. A remote attacker can exploit this issue by submitting a GET request that results in a 302 redirect response. The attacker can leverage this vulnerability to exfiltrate an internal IP address that can potentially be used for further attacks. | No non-vulnerable version available; to be assessed if risk noted is valid or if dependency can be removed.
| ||||||||||||
onap-dcaegen2-services-pm-mapper | org.jboss.gwt.elemento : elemento-testsuite-standalone : 0. | Description from CVE An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests. Explanation The undertow package is vulnerable to Denial-of-Service (DoS). The processWrite() method in the HttpResponseConduit Java class file does not restrict the buffer allocation size. An attacker can exploit this vulnerability by crafting a request that consists of a large header size and sending it to the server. The request, once processed, would exceed the allocated buffer size resulting in an application crash or unintended behavior. | No non-vulnerable version available; to be assessed if risk noted is valid or if dependency can be removed.
| ||||||||||||
onap-dcaegen2-platform-cdapbroker | nothing | ||||||||||||||
onap-dcaegen2-platform-cli | nothing | ||||||||||||||
onap-dcaegen2-platform-deployment-handler | nothing | ||||||||||||||
dcaegen2-platform-servicechange-handler | org.json : json : 20131018 | Found a License in the 'Use Restrictions' License Threat Group Likely false positive identified in the tool | Request Exception | ||||||||||||
onap-dcaegen2-platform-plugins | nothing | ||||||||||||||
onap-dcaegen2-platform-policy-handler | nothing | ||||||||||||||
onap-dcaegen2-platform-servicechange-handler | nothing | ||||||||||||||
onap-dcaegen2-services-heartbeat | nothing | ||||||||||||||
dcaegen2/services/mapper | com.fasterxml.jackson.core : jackson-databind : 2.9.6 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialized. Note: Spring Security has provided their own fix for this vulnerability (CVE-2017-4995). If this component is being used as part of Spring Security, then you are not vulnerable if you are running Spring Security 4.2.3.RELEASE or greater for 4.x or Spring Security 5.0.0.M2 or greater for 5.x. Workaround: Do not use the default typing. Instead you will need to implement your own.
| Upgrade to 2.9.7 for consistency
| ||||||||||||
dcaegen2/services/mapper | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialized. Note: Spring Security has provided their own fix for this vulnerability (CVE-2017-4995). If this component is being used as part of Spring Security, then you are not vulnerable if you are running Spring Security 4.2.3.RELEASE or greater for 4.x or Spring Security 5.0.0.M2 or greater for 5.x. | Request Exception | ||||||||||||
dcaegen2/services/mapper | com.fasterxml.jackson.core:jackson-databind:2.97 | Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2/services/mapper | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialization. Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2/services/mapper | com.fasterxml.jackson.datatype:jackson-datatype-jsr310:2.9.7 | The FasterXML The application is vulnerable by using the | Request Exception | ||||||||||||
dcaegen2/services/mapper | dom4j : dom4j : 1.6.1 | dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection | No non-vulnerable version available. Request Exception | ||||||||||||
dcaegen2/services/mapper | org.apache.ant : ant : 1.9.4 | Apache Ant is vulnerable to Path Traversal. The extractFile() method in the Expand class, which is responsible for extracting compressed archive files, allows archives to contain files with path traversal characters (like ../ ) in the name. If the application extracts an archive that is provided via user input, or if an attacker has access to modify existing archives on the filesystem, this vulnerability can be exploited to reveal the structure and possibly contents of other directories on the filesystem.DetectionThe application is vulnerable by using this component when | No non-vulnerable version available. Request Exception | ||||||||||||
dcaegen2/services/mapper | xerces : xercesImpl : 2.12.0 | Apache Xerces-J is vulnerable to a Denial of Service (DoS) attack. The Detection The application is vulnerable by using this component if you are running any of the following versions of Java:
| No non-vulnerable version available. Request Exception | ||||||||||||
dcaegen2/services/mapper | commons-fileupload : commons-fileupload : 1.3.3 | Apache Commons FileUpload contains a resource leak which may lead to a Denial of Service (DoS) attack. The FileItemIteratorImpl() method in the FileUploadBase class does not close a file input stream on encountering an exception; this means that the application maintains an open reference to the file in question indefinitely, as the stream is continuously waiting to read more data. An attacker can exploit this vulnerability by sending a large number of requests specifically crafted to trigger this exception, causing the application to maintain a large number of open streams. Eventually, these streams will consume all available processing or memory resources and render the application unresponsive. | No non-vulnerable version available. Request Exception | ||||||||||||
dcaegen2/services/prh | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialized. Note: Spring Security has provided their own fix for this vulnerability (CVE-2017-4995). If this component is being used as part of Spring Security, then you are not vulnerable if you are running Spring Security 4.2.3.RELEASE or greater for 4.x or Spring Security 5.0.0.M2 or greater for 5.x. | Request Exception | ||||||||||||
dcaegen2/services/prh | com.fasterxml.jackson.core:jackson-databind:2.97 | Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2/services/prh | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialization. Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2/services/prh | com.fasterxml.jackson.datatype:jackson-datatype-jsr310:2.9.7 | The FasterXML The application is vulnerable by using the | Request Exception | ||||||||||||
dcaegen2/services/sdk | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialized. Note: Spring Security has provided their own fix for this vulnerability (CVE-2017-4995). If this component is being used as part of Spring Security, then you are not vulnerable if you are running Spring Security 4.2.3.RELEASE or greater for 4.x or Spring Security 5.0.0.M2 or greater for 5.x. | Request Exception | ||||||||||||
dcaegen2/services/sdk | com.fasterxml.jackson.core:jackson-databind:2.97 | Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2/services/sdk | com.fasterxml.jackson.core:jackson-databind:2.97 | The application is vulnerable by using this component, when default typing is enabled and passing in untrusted data to be deserialization. Workaround: Do not use the default typing. Instead you will need to implement your own. | Request Exception | ||||||||||||
dcaegen2/services/sdk | com.fasterxml.jackson.datatype:jackson-datatype-jsr310:2.9.7 | The FasterXML The application is vulnerable by using the | Request Exception | ||||||||||||
Sample of CLM Report
...
JIRA Link
In the JIRA ticket, you will explain findings and action plan
Add the Label "Security"
...
False Positive
Add the explanation why you believe it is a false positive
...