Hi Flinksters,

Our repo which is a maven based java project(flink) went through SCA
scan using WhiteSource tool and following are the HIGH severity issues
reported. The target vulnerable jar is not found when we build the
dependency tree of the project.

Could any one let us know if flink uses these anywhere.

+----------------------+------------+
| Library              | Severity   |
+======================+============+
| xercesImpl-2.9.1.jar | HIGH       |
+----------------------+------------+
        - Artifact ID: xercesImpl
        - Group ID: xerces
        - Library Version: 2.9.1
        - Library Path:
/var/lib/jenkins/workspace/branch/latest/?/.m2/repository/xerces/xercesImpl/2.9.1/xercesImpl-2.9.1.jar
        - Dependency: None
        - Type: MAVEN_ARTIFACT
        - Description: XMLscanner.java in Apache Xerces2 Java Parser before
2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0
before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7
before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60
and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier,
JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and
possibly other products allows remote attackers to cause a denial of
service via vectors related to XML attribute names.
        - Suggested Fix: Upgrade to version xerces:xercesImpl:Xerces-J_2_12_0


+-----------------------+------------+
| Library               | Severity   |
+=======================+============+
| struts-core-1.3.8.jar | HIGH       |
+-----------------------+------------+
        - Artifact ID: struts-core
        - Group ID: org.apache.struts
        - Library Version: 1.3.8
        - Library Path:
/var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/apache/struts/struts-core/1.3.8/struts-core-1.3.8.jar
        - Dependency: None
        - Type: MAVEN_ARTIFACT
        - Description: ActionServlet.java in Apache Struts 1 1.x through
1.3.10 does not properly restrict the Validator configuration, which
allows remote attackers to conduct cross-site scripting (XSS) attacks
or cause a denial of service via crafted input, a related issue to
CVE-2015-0899.
        - Suggested Fix: Replace or update the following file: 
ActionServlet.java

+----------------------+------------+
| Library              | Severity   |
+======================+============+
| plexus-utils-3.0.jar | HIGH       |
+----------------------+------------+
        - Artifact ID: plexus-utils
        - Group ID: org.codehaus.plexus
        - Library Version: 3.0
        - Library Path:
/var/lib/jenkins/workspace/branchlatest/?/.m2/repository/org/codehaus/plexus/plexus-utils/3.0/plexus-utils-3.0.jar
        - Dependency: None
        - Type: MAVEN_ARTIFACT
        - Description: Security vulnerability found in plexus-utils before
3.0.24. XML injection found in XmlWriterUtil.java.
        - Suggested Fix: Upgrade to version 3.0.24

Thanks,

Prasanna.

Reply via email to