[ 
https://issues.apache.org/jira/browse/RANGER-5095?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Basapuram Kumar updated RANGER-5095:
------------------------------------
    Description: 
*Issue*

The current version of Ranger uses Apache Atlas 2.2.0, which transitively 
depends on Spring Framework 4.3.29.RELEASE. This specific version of the Spring 
Framework is vulnerable to CVE-2023-20863.

*Root Cause:*
The vulnerability exists due to the dependency on Apache Atlas 2.2.0, which 
includes the outdated and vulnerable version of the Spring Framework 
(4.3.29.RELEASE).

*Resolution Suggestion:*
To address CVE-2023-20863, it is recommended to upgrade Apache Atlas to version 
2.4.0, which includes an updated and secure version of the Spring 
Framework-5.3.39.

 

[CVE-2023-20863|https://nvd.nist.gov/vuln/detail/CVE-2023-20863] Description

```

In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it 
is possible for a user to provide a specially crafted SpEL expression that may 
cause a denial-of-service (DoS) condition.

```

By upgrading Atlas-2.4.0, it used *springframework-5.3.39*

After upgrading atlas to 2.4.0, here is the dependency tree, which uses *atlas* 
to *5.3.39*
{code:java}
[INFO] +- org.apache.atlas:atlas-intg:jar:2.4.0:compile
[INFO] |  +- javax.inject:javax.inject:jar:1:compile
[INFO] |  \- org.springframework:spring-context:jar:5.3.39:compile
[INFO] |     +- org.springframework:spring-aop:jar:5.3.39:compile
[INFO] |     +- org.springframework:spring-beans:jar:5.3.39:compile
[INFO] |     +- org.springframework:spring-core:jar:5.3.39:compile
[INFO] |     |  \- org.springframework:spring-jcl:jar:5.3.39:compile
[INFO] |     \- org.springframework:spring-expression:jar:5.3.39:compile {code}
 

Atlas spring framework used link is here - 
[https://github.com/apache/atlas/blob/4787b753271718d0b06cf6545f331f9a12ce1f63/pom.xml#L179C1-L180C1]

 

 

  was:
*Issue*

The current version of Ranger uses Apache Atlas 2.2.0, which transitively 
depends on Spring Framework 4.3.29.RELEASE. This specific version of the Spring 
Framework is vulnerable to CVE-2023-20863.

*Root Cause:*
The vulnerability exists due to the dependency on Apache Atlas 2.2.0, which 
includes the outdated and vulnerable version of the Spring Framework 
(4.3.29.RELEASE).

*Resolution Suggestion:*
To address CVE-2023-20863, it is recommended to upgrade Apache Atlas to version 
2.4.0, which includes an updated and secure version of the Spring 
Framework-5.3.39.

 

[CVE-2023-20863|https://nvd.nist.gov/vuln/detail/CVE-2023-20863] Description

```

In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it 
is possible for a user to provide a specially crafted SpEL expression that may 
cause a denial-of-service (DoS) condition.

```

 

 

By upgrading Atlas-2.4.0, it used *springframework-5.3.39*

After upgrading atlas to 2.4.0, here is the dependency tree, which uses atlas 
to 5.3.39

 
{code:java}
[INFO] +- org.apache.atlas:atlas-intg:jar:2.4.0:compile
[INFO] |  +- javax.inject:javax.inject:jar:1:compile
[INFO] |  \- org.springframework:spring-context:jar:5.3.39:compile
[INFO] |     +- org.springframework:spring-aop:jar:5.3.39:compile
[INFO] |     +- org.springframework:spring-beans:jar:5.3.39:compile
[INFO] |     +- org.springframework:spring-core:jar:5.3.39:compile
[INFO] |     |  \- org.springframework:spring-jcl:jar:5.3.39:compile
[INFO] |     \- org.springframework:spring-expression:jar:5.3.39:compile {code}
 

 

[https://github.com/apache/atlas/blob/4787b753271718d0b06cf6545f331f9a12ce1f63/pom.xml#L179C1-L180C1]

 

 


> Bump Atlas to 2.4.0 to fix CVE's
> --------------------------------
>
>                 Key: RANGER-5095
>                 URL: https://issues.apache.org/jira/browse/RANGER-5095
>             Project: Ranger
>          Issue Type: Improvement
>          Components: Ranger
>            Reporter: Basapuram Kumar
>            Priority: Major
>
> *Issue*
> The current version of Ranger uses Apache Atlas 2.2.0, which transitively 
> depends on Spring Framework 4.3.29.RELEASE. This specific version of the 
> Spring Framework is vulnerable to CVE-2023-20863.
> *Root Cause:*
> The vulnerability exists due to the dependency on Apache Atlas 2.2.0, which 
> includes the outdated and vulnerable version of the Spring Framework 
> (4.3.29.RELEASE).
> *Resolution Suggestion:*
> To address CVE-2023-20863, it is recommended to upgrade Apache Atlas to 
> version 2.4.0, which includes an updated and secure version of the Spring 
> Framework-5.3.39.
>  
> [CVE-2023-20863|https://nvd.nist.gov/vuln/detail/CVE-2023-20863] Description
> ```
> In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , 
> it is possible for a user to provide a specially crafted SpEL expression that 
> may cause a denial-of-service (DoS) condition.
> ```
> By upgrading Atlas-2.4.0, it used *springframework-5.3.39*
> After upgrading atlas to 2.4.0, here is the dependency tree, which uses 
> *atlas* to *5.3.39*
> {code:java}
> [INFO] +- org.apache.atlas:atlas-intg:jar:2.4.0:compile
> [INFO] |  +- javax.inject:javax.inject:jar:1:compile
> [INFO] |  \- org.springframework:spring-context:jar:5.3.39:compile
> [INFO] |     +- org.springframework:spring-aop:jar:5.3.39:compile
> [INFO] |     +- org.springframework:spring-beans:jar:5.3.39:compile
> [INFO] |     +- org.springframework:spring-core:jar:5.3.39:compile
> [INFO] |     |  \- org.springframework:spring-jcl:jar:5.3.39:compile
> [INFO] |     \- org.springframework:spring-expression:jar:5.3.39:compile 
> {code}
>  
> Atlas spring framework used link is here - 
> [https://github.com/apache/atlas/blob/4787b753271718d0b06cf6545f331f9a12ce1f63/pom.xml#L179C1-L180C1]
>  
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to