[ 
https://issues.apache.org/jira/browse/THRIFT-5293?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17211060#comment-17211060
 ] 

Max commented on THRIFT-5293:
-----------------------------

Hi.

First: see [https://www.apache.org/security/]. Public Jira is not appropriate 
to report security issues in Apache Thrift.

Second: just because a tool tells you there's an issue, does not mean anything. 
You are expected to analyze each and every detection yourself (maybe with help 
of IT security department at your company) and use your own judgment.

Third: as a matter of courtesy and goodwill, I'll do part of your job for you. 
Let's go one by one.

*CVE-2016-5397*: _The Apache Thrift Go client library exposed the potential 
during code generation for command injection due to using an external 
formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 
0.10.0._

Current Thrift version is 0.13.0. You have to update to at least 0.10.0 if this 
issue affects you. This issue affects you if all of the following holds true: 
you use Golang code generated by Thrift <= 0.9.3; your IDL files are not 
trusted; your threat model includes malicious developers crafting IDL files to 
exploit the vulnerability, for e.g. gaining access to CI systems.

*CVE-2018-11798*: _The Apache Thrift Node.js static web server in versions 
0.9.2 through 0.11.0 have been determined to contain a security vulnerability 
in which a remote user has the ability to access files outside the set 
webservers docroot path._

Current Thrift version is 0.13.0. You have to update to at least 0.11.0 if this 
issue affects you. This issue affects you if all of the following holds true: 
you use Node.js servers generated by Thrift [0.9.2..0.11.0] which are 
accessible across a trust boundary.

*CVE-2018-1320*: _Apache Thrift Java client library versions 0.5.0 through 
0.11.0 can bypass SASL negotiation isComplete validation in the 
org.apache.thrift.transport.TSaslTransport class. An assert used to determine 
if the SASL handshake had successfully completed could be disabled in 
production settings making the validation incomplete._

Current Thrift version is 0.13.0. You have to update to at least 0.12.0 if this 
issue affects you. This issue affects you if all of the following holds true: 
you use Java clients generated by Thrift [0.5.0..0.11.0] which utilize 
TSaslTransport to connect to servers across a trust boundary.

*CVE-2019-0205*: _In Apache Thrift all versions up to and including 0.12.0, a 
server or client may run into an endless loop when feed with specific input 
data. Because the issue had already been partially fixed in version 0.11.0, 
depending on the installed version it affects only certain language bindings._

Current Thrift version is 0.13.0. You have to update to 0.13.0 if this issue 
affects you.

*CVE-2019-0210*: _In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go 
using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid 
input data._


Current Thrift version is 0.13.0. You have to update to 0.13.0 if this issue 
affects you.
----
Just to make it clear: your responsibility does not end with posting a 
detection screenshot to the bug tracker. You're supposed to do your own 
research (nvd.nist.gov has plenty of links detailing each issue). Nobody from 
Apache has any obligation to do this research for you.

In summary: all the issues have been fixed in the latest Thrift version, and 
besides that there's barely anything Apache can do to help you. Update to the 
latest version if the issues affect your systems.

> Blackduck shows the security vulnerabilities in libfb303:0.9.3
> --------------------------------------------------------------
>
>                 Key: THRIFT-5293
>                 URL: https://issues.apache.org/jira/browse/THRIFT-5293
>             Project: Thrift
>          Issue Type: Bug
>          Components: Java - Library
>    Affects Versions: 0.9.3
>            Reporter: suraj misra
>            Priority: Critical
>         Attachments: Security_vulnerabilities.JPG
>
>
> Blackduck shows the security vulnerabilities in libfb303:0.9.3 
> !Security_vulnerabilities.JPG!



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to