Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issues with public CVEs (Security vuln report) #1799

Closed
3 tasks done
vivekm2017 opened this issue Mar 22, 2019 · 3 comments
Closed
3 tasks done

Issues with public CVEs (Security vuln report) #1799

vivekm2017 opened this issue Mar 22, 2019 · 3 comments

Comments

@vivekm2017
Copy link

vivekm2017 commented Mar 22, 2019

Required Information

Component governance has reported 5 issues with POM dependency on com.fasterxml.jackson.core:jackson-databind:

"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization."

  • AEM Version, including Service Packs, Cumulative Fix Packs, etc: 6.3.3.2
  • ACS AEM Commons Version: 4.0.0
  • Reproducible on Latest? yes

Expected Behavior

Upgrade dependency for com.fasterxml.jackson.core to version 2.9.8 in bundle POM.

Actual Behavior

com.fasterxml.jackson.core version 2.8.4 is included.

Steps to Reproduce

Run the component compliance CVE on any project using ACS AEM commons 4.0.0 as dependency.

Links

[1] FasterXML/jackson-databind#2097

@justinedelson
Copy link
Contributor

justinedelson commented Mar 22, 2019

This issue is invalid. These are provided-scope dependencies. The version referenced in the POM is not (necessarily) the version used at runtime. Note that we do scan for reported vulnerabilities in embedded (compile-scope) dependencies.

@vivekm2017
Copy link
Author

vivekm2017 commented Mar 22, 2019

@justinedelson It does not make sense to me that POMs refer to old versions which has security threats. It's not always safe to assume that runtime version will be different. Is there any issue if we change dependency to latest version? @kaushalmall Can you help here? Microsoft team has concerns with CVEs report and been pushing on to fix it.

@justinedelson
Copy link
Contributor

@vivekm2017 those are the versions available in AEM 6.3 (or at least should be -- an interesting enhancement to #1797 could be to detect the cases where the lower bound can be raised). So changing the versions would break compatibility with AEM 6.3.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants