Casablanca CLAMP Security/Vulnerability Report

This table represents the known exploitable and non-exploitable vulnerabilities in third party packages used in the project



Repository

Group

Impact Analysis

Action

Repository

Group

Impact Analysis

Action

clamp

com.fasterxml.jackson.core

From NexusIQ:

"jackson-databind is vulnerable to Remote Code Execution (RCE). The createBeanDeserializer() function in the BeanDeserializerFactory class allows untrusted Java objects to be deserialized. A remote attacker can exploit this by uploading a malicious serialized object that will result in RCE if the application attempts to deserialize it."



CLAMP-236: Replace Jackson by another JSON libraryClosed

clamp

angular

It impacts our UI as angular is the skeleton technology used in the code.

Anyway we have mitigated the issue by setting the angular version to 1.3.2 with the least amount of security issue reported by Nexus IQ (for Release 1.XX)

Analyze how to migrate the UI to a recent angular version (> 4.X)

CLAMP-223: replace "angular.js" and move to "React" for security issuesClosed

clamp 

bootstrap

It impacts our UI as bootstrap (one of the latest version, 4.1.1) is used in clamp code.

We could be impacted by the possible Cross-Site Scripting (XSS) reported by Nexus IQ

bootstrap library 4.1.3 CLAMP is using, doesn't present a vulnerability anymore

CLAMP-237: Delete or Replace Bootstrap library in UIClosed