[ 
https://issues.apache.org/jira/browse/CASSANDRA-14612?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17419287#comment-17419287
 ] 

Albert Butler commented on CASSANDRA-14612:
-------------------------------------------

Please...do not exclude "commons-collections-3.2.1.jar: CVE-2017-15708"   I 
have leveraged that vulnerability "in testing" to proove the point to my 
superiors that is servious flaw.   There is a wel crafted exploit that publicly 
available here : [https://github.com/frohoff/ysoserial]  That exploit that and 
many otherdeserialization jars. .  It only took me one hour to download that 
exploit code, injects a reverse shel payload into it, and target the system we 
wer working on. I reformtted the hard drive. to proove a point.  Almost got 
fired by my boss, but the customer "a bank" was VERY appreciative of our 
due-diligence.  FYI other jars that that exploit works against are :

$ java -jar ysoserial.jar Y SO SERIAL? Usage: java -jar ysoserial.jar [payload] 
'[command]' Available payload types: Payload Authors Dependencies ------- 
------- ------------ AspectJWeaver @Jang aspectjweaver:1.9.2, 
commons-collections:3.2.2 BeanShell1 @pwntester, @cschneider4711 bsh:2.0b5 C3P0 
@mbechler c3p0:0.9.5.2, mchange-commons-java:0.2.11 Click1 @artsploit 
click-nodeps:2.3.0, javax.servlet-api:3.1.0 Clojure @JackOfMostTrades 
clojure:1.8.0 CommonsBeanutils1 @frohoff commons-beanutils:1.9.2, 
commons-collections:3.1, commons-logging:1.2 CommonsCollections1 @frohoff 
commons-collections:3.1 CommonsCollections2 @frohoff commons-collections4:4.0 
CommonsCollections3 @frohoff commons-collections:3.1 CommonsCollections4 
@frohoff commons-collections4:4.0 CommonsCollections5 @matthias_kaiser, 
@jasinner commons-collections:3.1 CommonsCollections6 @matthias_kaiser 
commons-collections:3.1 CommonsCollections7 @scristalli, @hanyrax, 
@EdoardoVignati commons-collections:3.1 FileUpload1 @mbechler 
commons-fileupload:1.3.1, commons-io:2.4 Groovy1 @frohoff groovy:2.3.9 
Hibernate1 @mbechler Hibernate2 @mbechler JBossInterceptors1 @matthias_kaiser 
javassist:3.12.1.GA, jboss-interceptor-core:2.0.0.Final, cdi-api:1.0-SP1, 
javax.interceptor-api:3.1, jboss-interceptor-spi:2.0.0.Final, slf4j-api:1.7.21 
JRMPClient @mbechler JRMPListener @mbechler JSON1 @mbechler 
json-lib:jar:jdk15:2.4, spring-aop:4.1.4.RELEASE, aopalliance:1.0, 
commons-logging:1.2, commons-lang:2.6, ezmorph:1.0.6, commons-beanutils:1.9.2, 
spring-core:4.1.4.RELEASE, commons-collections:3.1 JavassistWeld1 
@matthias_kaiser javassist:3.12.1.GA, weld-core:1.1.33.Final, cdi-api:1.0-SP1, 
javax.interceptor-api:3.1, jboss-interceptor-spi:2.0.0.Final, slf4j-api:1.7.21 
Jdk7u21 @frohoff Jython1 @pwntester, @cschneider4711 jython-standalone:2.5.2 
MozillaRhino1 @matthias_kaiser js:1.7R2 MozillaRhino2 @_tint0 js:1.7R2 Myfaces1 
@mbechler Myfaces2 @mbechler ROME @mbechler rome:1.0 Spring1 @frohoff 
spring-core:4.1.4.RELEASE, spring-beans:4.1.4.RELEASE Spring2 @mbechler 
spring-core:4.1.4.RELEASE, spring-aop:4.1.4.RELEASE, aopalliance:1.0, 
commons-logging:1.2 URLDNS @gebl Vaadin1 @kai_ullrich vaadin-server:7.7.14, 
vaadin-shared:7.7.14 Wicket1 @jacob-baines wicket-util:6.23.0, slf4j-api:1.6.4

> Please add OWASP Dependency Check to the build (pom.xml)
> --------------------------------------------------------
>
>                 Key: CASSANDRA-14612
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-14612
>             Project: Cassandra
>          Issue Type: New Feature
>          Components: Build
>         Environment: All development, build, test, environments.
>            Reporter: Albert Baker
>            Assignee: Stefan Miklosovic
>            Priority: Normal
>              Labels: build, easyfix, security
>             Fix For: 3.11.x, 4.x
>
>   Original Estimate: 1h
>  Remaining Estimate: 1h
>
> Please add OWASP Dependency Check to the build (pom.xml). OWASP DC makes an 
> outbound REST call to MITRE Common Vulnerabilities & Exposures (CVE) to 
> perform a lookup for each dependant .jar to list any/all known 
> vulnerabilities for each jar. This step is needed because a manual MITRE CVE 
> lookup/check on the main component does not include checking for 
> vulnerabilities in components or in dependant libraries.
> OWASP Dependency check : 
> https://www.owasp.org/index.php/OWASP_Dependency_Check has plug-ins for most 
> Java build/make types (ant, maven, ivy, gradle).
> Also, add the appropriate command to the nightly build to generate a report 
> of all known vulnerabilities in any/all third party libraries/dependencies 
> that get pulled in. example : mvn -Powasp -Dtest=false -DfailIfNoTests=false 
> clean aggregate
> Generating this report nightly/weekly will help inform the project's 
> development team if any dependant libraries have a reported known 
> vulnerailities. Project teams that keep up with removing vulnerabilities on a 
> weekly basis will help protect businesses that rely on these open source 
> componets.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to