Casablanca SDC Security/Vulnerability Report

This table represents the known exploitable and non-exploitable vulnerabilities in third party packages used in the project.



Repository

Group

Impact Analysis

Action

Notes

Repository

Group

Impact Analysis

Action

Notes

sdc-sdc-tosca

sdc-sdc-tosca

com.fasterxml.jackson.core

False positive

the lib is part of the sdcTosca parser which is used as a library.

the parser only runs on predefined objects and will not attempt to run on an object that was not validated. the parser is protected by the application using it and the information supplied is coming from the using application.

There is no non-vulnerable version of this component.



No Action in Casablanca.



no version is available that fixes this issue.

sdc-sdc-tosca

com.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used in sdc.

No Action in Casablanca.



sdc

sdc 

catalog

org.apache.lucene

False positive

the dependency is coming from Elastic search.xercesImpl

as such the vulnerability no effecting affecting the application.

There is no non-vulnerable version of this component.

No Action for Casablanca



in Dublin, we plan to remove ES from the application so this will be removed.

sdc

onboarding

io.springfox

the dependency is part of swagger.

we will try to fix it by upgrading the version used.



the vulnerabilities are connected to cross site scripting.



we were not able to identify the location of this issue based on our review the in CLM it is located in :

openecomp-be/tools/swagger-ui/target/api-docs how ever not such thing exist in that swagger jar.

as a mitigation, we will not package the swagger in the release artifact.


SDC-1713: fix security vilation SONATYPE-2016-0065Closed





sdc

catalog + onboarding

org.codehaus.jackson

False positive,

used inside the titan client all operations coming there have passed a set of logic and serialization before coming there. this is not exposed outside to users.

No version with a fix is currently available.

1.9.2 is not directly referenced but comes from Titan DB.



No Action for Casablanca







sdc

catalog + onboarding

com.fasterxml.jackson.core

False positive

no version with a fix is currently available.

sdc serialize objects based on existing class only.

No action in Casablanca.





sdc

onboarding +

catalog

org.beanshell

False positive

The vulnerability exposes the application to remote code execution based on serializing objects with exactable code.

all versions have vulnerabilities in them. waiting for a fix in future versions.

sdc does nto use jave serilization for converting objects.





no action in Casablanca.

Waiting for a stable release.





sdc

catalog

io.netty

False positive

used as part of the automation used in sdc.

comes from the selenium-java dependency.

No action in Casablanca

will be upgraded next release

sdc

catalog + onboarding

io.netty

no information is provided in the vulneraability

No action in Casablanca



there is not enough information to provide an assessment. once more information is available will be reviewed again

sdc

catalog + onboarding

commons-beanutils

Exposes the application to remote code exaction by manipulating the class loader

all versions have vulnerabilities in them. waiting for a fix in future versions.

the issue is that the class loder can be manipulated to load addition class to execute code. can be mitigated by not allowing access to the machine where sdc is runing.

No action in Casablanca.

Update the version of the dependency as soon as security issue fixed.



sdc

catalog

org.bouncycastle

False positive

came from selenium-server

this is included and used in an automation project and does not actually deploy as part of SDC.

No action for Casablanca.







sdc

catalog

xerces

False positive

came from selenium-java

this is included and used in an automation project and does not actually deploy as part of SDC.

No action for Casablanca.





sdc

catalog

org.apache.poi

False positive

Part of the sdctool used for migration and schema creation and is not part of the be logic.

no DOS attack is possible against this.

no newer version is available.

No action in Casablanca



the dependency is no longer being actively developed.

we will consider removing this in the future.



sdc

catalog

swagger-ui

sdc has two swaggers one for external apis protected by basic authentication.

the second for our internal apis and it is exposed, as



the vulnerability is that the swagger ui is exposed to cross site scripting.



mitigation

we will close access to it in the release until it is handled.

No action for Casablanca

changing the use of the swagger requires a major change to the whole annotations we have this will not be done in Casablanca.

sdc

onboarding + catalog

org.testng

False positive

this is a testing framework used in sdc and is not part of the deployment it is used for automation and unit test execution only.

No action for Casablanca



sdc

onboarding + catalog

org.springframework

False positive,

sdc does not serve static pages using spring.

No action for Casablanca



sdc

catalog

org.mindrot

indirect referenced from titan and gremlin groovy,

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.



Mitigation,

sdc code does not directly use this. it is used internally in out DB driver. an attacker will find it hard to pass all the sdc logic to get to the driver and try to attack it.

No action for Casablanca



sdc

catalog

org.elasticsearch

False positive,

Elastic search Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API.

sdc does not configure secrets using api.

No action for Casablanca

sdc planes to remove elastic in the Dublin release which will fix this issue.

sdc

catalog

javax.mail

False positive.

JavaMail is vulnerable to Information Exposure.

the method that causes it is not used in sdc.

No action for Casablanca

will be remove next release

sdc

catalog + onboarding

jQuery

False positive.

used as part of sdc automation only not part of the deployed code.

comes from test ng

No action for Casablanca

next release we can try to upgrade the testng in the project

sdc

catalog

dom4j

False posotive

comes with titan-core, no fix is available.

not used directly in sdc.

will be fixed once sdc moves from titan to jenus graph

SDC does not store xml files in titan and as such this is a none issue as we are not using this capability and are not exposing it.

No action in Casablanca.



sdc

catalog

com.jcraft

false positive.

the vulnerability occurs on windows only. sdc is dockrised and uses alpin(linux based os).

No action in Casablanca.



sdc

catalog

stipsan

this is dependency is used by swagger and as such is part of the project.

there is not version without a vulnerability is available.

No action in Casablanca.

as a mitigation, we will disable access to the swagger.

sdc

catalog + onboarding

com.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used in sdc.

No action in Casablanca.

there is a none vulnerable version available will be addressed next release.

sdc

catalog

commons-fileupload

false positive.

came from portal sdk. not used by sdc directly.

in sdc we are not using the uploads file as part of the sdc.

No action in Casablanca.



sdc

catalog + onboarding

handlebars

comes with swagger. exposes the application to cross site scripting.

No action in Casablanca.

may be fixed by upgrading swagger

sdc

catalog

org.apache.ant

comes as part of cglib dependency used in SDC.

the method in question is not directly used in sdc.

As a mitigation, this is part of our tools package this run on deployment and shuts down it is not always available.

No action in Casablanca.



sdc

catalog

org.owasp.antisamy

false positive.

came from portal sdk. not used by sdc directly.

both issues are connected to cross site scripting and injections of html sdc does not use portal sdk in a way that can impact us.

No action in Casablanca.



sdc

catalog

org.owasp.esapi

False positive.

came from portal sdk. no used in sdc directly.







No action in Casablanca.



sdc

catalog

org.seleniumhq.selenium

False positive

used as part of the sdc ui automation. not deployed in production

the vulnerability has no info in it

No action in Casablanca.



sdc

catalog + onboarding

handlebars

is part of swagger used by the application.

to mitigate this we will remove access to swagger in the release

No action in Casablanca.



sdc-titan-cassandra this repository is used in sdc as a dependency, it was forked from an open source project that is no longer maintained. these issues are not adressed in the repo. we adress them on the consumption of the dependency in sdc.

sdc-titan-cassandra

org.codehaus.jackson

Exposes theclienttoexactionofmalicecode by a user.



sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.



No action in Casablanca.



move to JenoseGraph is being considered.



sdc-titan-cassandra

com.fasterxml.jackson.core

Exposes theclienttoexactionofmalicecode by a user.



sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.



No action in Casablanca. 



move to JenoseGraph is being considered



sdc-titan-cassandra

com.fasterxml.jackson.core

sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.

No action in Casablanca. 



move to JenoseGraph is being considered



sdc-titan-cassandra

org.codehaus.groovy

False posotive

Exposes the application to DOS attack and exactionofmalicioscodeby passing serialized objects. the client receives specific objects for serialization

sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.

to support geo-redundancy

No action in Casablanca.



move to JenoseGraph is being considered



sdc-titan-cassandra

commons-collections

sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.

No action in Casablanca.

move to JenoseGraph is being considered



sdc-titan-cassandra

ch.qos.logback

False positive,

sdc-titan-casndra is the driver usedbysdc to communicate with the graph representation stored in Cassandra. the driver used is internal to the application.



No action in Casablanca.  



move to JenoseGraph is being considered



sdc-titan-cassandra

org.hibernate

We do not use security manager and as such is not vulnerable

sdc-titan-Cassandra is the driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.

No action in Casablanca.  



move to JenoseGraph is being considered



sdc-titan-cassandra

io.netty

False positive

netty is used inside the dbdriver and a testing framework that both do not read cookies.

Used for testing and as a driver base as such they are not accepting requests andwillnotbeaffectbydos



sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.



No action in Casablanca.  



move to JenoseGraph is being considered



sdc-titan-cassandra

org.apache.httpcomponents

False positive

the client used for communication tothedbandthe vulnerability is not applicable.



No action in Casablanca.



move to JenoseGraph is being considered



sdc-titan-cassandra

com.google.guava

addressed on consumption in sdc

No action in Casablanca.



sdc-titan-cassandra

dom4j

addressed on consumption in sdc

No action in Casablanca.



sdc-titan-cassandra

org.mindrot

addressed on consumption in sdc

No action in Casablanca.



sdc-workflow-designer 

sdc-workflow-designer 

com.fasterxml.jackson.core

False positive.

No version with a fix is currently available.



work flow json marshaling to object and is not serializing java objects.

as such the vulnerability is not applicable

No Action for Casablanca







sdc-workflow-designer

org.codehaus.jackson

False positive.

No version with a fix is currently available.



work flow uses json marshaling to object and is not serializing java objects.

as such the vulnerability is not applicable.

No Action for Casablanca



sdc-workflow-designer

commons-beanutils

Exposes the application to remote code exaction by manipulating the class loader

all versions have vulnerabilities in them. waiting for a fix in future versions.

Update the version of the dependency as soon as security issue fixed.

mitigated

by that you need access to the server class loder to use.

No action in Casablanca.



sdc-workflow-designer

com.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used in workflow.

No action in Casablanca.  



sdc-workflow-designer

org.springframework

False positive,

we do not serve static pages using spring

No action in Casablanca.  



dcae-ds

while fixing the vulnerabilities an issue was identified in spring boot that does not allow us to upgrade to the latest version.

as such, we had to roll back to the original version and with it, we received back a lot of security issues. as a mitigation, the only option is to disable DCAE_DS in case the user has security concerns regarding its vulnerabilities.

this can be done by changing the helm charts to not start it. this will still allow the user to use sdc but without the monitoring studio.



sdc-dcae-d-ci 

com.fasterxml.jackson.core

False positive

this is part of the automation and is not deployed.

No action in Casablanca.

no version is available that fixes this issue.

sdc-dcae-d-ci

com.google.guava

False positive

this is part of the automation and is not deployed.

No action in Casablanca.



sdc-dcae-d-dt-be-main

ch.qos.logback

False positive,

we do not uselogbackto serialize information received from a socket.

No action in Casablanca.



sdc-dcae-d-dt-be-main

com.fasterxml.jackson.core

False positive.

No version with a fix is currently available.



DCAE-DS uses json marshaling to object and is not serializing java objects.

as such the vulnerability is not applicable.

No action in Casablanca.

no version is available that fixes this issue.

sdc-dcae-d-dt-be-main

com.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used in sdc.

No action in Casablanca.



sdc-dcae-d-dt-be-main

commons-beanutils

Exposes the application to remote code exaction by manipulating the class loader

all versions have vulnerabilities in them. waiting for a fix in future versions.

Update the version of the dependency as soon as security issue fixed.

mitigated by that you need access to the server class loader to use.

No action in Casablanca.



sdc-dcae-d-dt-be-main

org.apache.tomcat.embed

False Positive

Dcae-ds does not use tomcat it is just part of spring boot.

No action in Casablanca.



sdc-dcae-d-dt-be-main

org.apache.tomcat.embed

False Positive

Dcae-ds does not use tomcat it is just part of spring boot.



No action in Casablanca.



sdc-dcae-d-dt-be-main

org.springframework

The spring-core and spring-web modules of Spring Framework are vulnerable to a multipart content pollution vulnerability.

No action in Casablanca.



sdc-dcae-d-dt-be-main

org.springframework

False positive,

we do not use spring messaging and as such are not exposed to this issue.

No action in Casablanca.



sdc-dcae-d-dt-be-main

org.springframework

false positive as we do not use spring to serve static pages.

Spring Framework is vulnerable to Cross-Site Tracing (XST) attacks

The configuration causing this is not enabled in the application and as such we are not impacted

No action in Casablanca.



sdc-dcae-d-dt-be-main

org.springframework

the configuration causing this is not enabled in the application and as such we are not impacted

False positive the issue is vulnerable when service pages from a windows file system. this is not an issue as we are running inside a docker which os is Linux.

No action in Casablanca.



sdc-dcae-d-dt-be-property

com.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used.

No action in Casablanca.



sdc-dcae-d-fe

ch.qos.logback

False positive,

we do not use logback to serialize information received from a socket.

No action in Casablanca.



sdc-dcae-d-fe

com.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used.

No action in Casablanca.



sdc-dcae-d-fe

org.eclipse.jetty

this dependency exposes the application to HTTP Request Smuggling.

there is not mitigation available.

the dependency comes with spring boot.

the latest versions include a bug that does not allow us to upgrade this.

No action in Casablanca.



sdc-dcae-d-fe

org.eclipse.jetty

The jetty package is vulnerable to Information Disclosure via InvalidPathException message

No action in Casablanca.



sdc-dcae-d-fe

org.springframework

The spring-core and spring-web modules of Spring Framework are vulnerable to a multipart content pollution vulnerability.

No action in Casablanca.



sdc-dcae-d-fe

org.springframework

False positive,

we do not use spring messaging and as such are not exposed to this issue.

No action in Casablanca.



sdc-dcae-d-fe

org.springframework

false positive as we do not use spring to serve static pages.

Spring Framework is vulnerable to Cross-Site Tracing (XST) attacks

the configuration causing this is not enabled in the application and as such we are not impacted

No action in Casablanca.



sdc-dcae-d-fe

org.springframework

the configuration causing this is not enabled in the application and as such we are not impacted

False positive the issue is vulnerable when service pages from a windows file system. this is not an issue as we are running inside a docker which os is Linux.

No action in Casablanca.



sdc-dcae-d-dt

angular

angular exposes the application to cross site scripting vulnerability.



there is no fix available in any angular versions.

No action in Casablanca.

a UI library as far as i understand ui libraries were not part of the scan and only java artifacts were reviewed?

sdc-dcae-d-dt

bootstrap

bootstrap exposes the application to cross site scripting vulnerability.



there is no fix available in any bootstrap versions.

No action in Casablanca.

a UI library as far as i understand ui libraries were not part of the scan and only java artifacts were reviewed?

sdc-dcae-d-dt

ch.qos.logback

False positive,

we do not use logback to serialize information received from a socket.

No action in Casablanca.



sdc-dcae-d-dt

com.fasterxml.jackson.core

False positive.

No version with a fix is currently available.



DCAE-DS uses json marshaling to object and is not serializing java objects.

as such the vulnerability is not applicable.

No action in Casablanca.



sdc-dcae-d-dt

com.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overloadthe

the class whichhavethis vulnerability AtomicDoubleArray CompoundOrdering are not used.

No action in Casablanca.



sdc-dcae-d-dt

jquery

jquery exposes the application to cross-site scripting vulnerability.





No action in Casablanca.

a UI library as far as i understand ui libraries were not part of the scan and only java artifacts were reviewed?

sdc-dcae-d-dt

org.eclipse.jetty

this dependency exposes the application to HTTP Request Smuggling.

there is no mitigation available.

the dependency comes with spring boot.

the latest versions include a bug that does not allow us to upgrade this.

No action in Casablanca.



sdc-dcae-d-dt

org.eclipse.jetty

The jetty package is vulnerable to Information Disclosure via InvalidPathException message

No action in Casablanca.



sdc-dcae-d-dt

org.springframework

The spring-core and spring-web modules of Spring Framework are vulnerable to a multipart content pollution vulnerability.

No action in Casablanca.



sdc-dcae-d-dt

org.springframework

False positive,

we do not use spring messaging and as such are not exposed to this issue.

No action in Casablanca.



sdc-dcae-d-dt

org.springframework

false positive as we do not use spring to serve static pages.

Spring Framework is vulnerable to Cross-Site Tracing (XST) attacks

the configuration causing this is not enabled in the application and as such we are not impacted

No action in Casablanca.



sdc-dcae-d-dt

org.springframework

the configuration causing this is not enabled in the application and as such we are not impacted

False positive the issue is vulnerable when service pages from a windows file system. this is not an issue as we are running inside a docker which os is Linux.

No action in Casablanca.