Mayank Kunwar created TEZ-4573: ---------------------------------- Summary: Upgrade momentjs to 2.29.4 due to CVE-2022-24785, CVE-2022-31129 and CVE-2017-18214 Key: TEZ-4573 URL: https://issues.apache.org/jira/browse/TEZ-4573 Project: Apache Tez Issue Type: Task Reporter: Mayank Kunwar
Upgrade momentjs to 2.29.4 due to CVE-2022-24785, CVE-2022-31129 and CVE-2017-18214 CVE-2022-24785 - A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. CVSSv3 Score:- 6.5(Medium) [https://nvd.nist.gov/vuln/detail/CVE-2023-45857] CVE-2022-31129 - Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. CVSSv3 Score:- 7.5(High) [https://nvd.nist.gov/vuln/detail/CVE-2022-31129] CVE-2017-18214 - The moment module before 2.19.3 for Node.js is prone to a regular expression denial of service via a crafted date string, a different vulnerability than CVE-2016-4055. CVSSv3 Score:- 7.5(High) [https://nvd.nist.gov/vuln/detail/CVE-2017-18214] Affected Path:- [https://github.infra.cloudera.com/cdh/tez/blob/CDH-7.1.7.3000/tez-ui/src/main/webapp/yarn.lock#:~:text=%22moment%40%3E%3D%202.6.0,resolved%20%22https%3A//registry] -- This message was sent by Atlassian Jira (v8.20.10#820010)