Hi,

disable ossindex-maven-plugin in the parent pom, the company behind this has changed its business model to cause FUD so that people subscribe. Alternatively, replace it with this (you may have to adjust the versions):

      <plugin>
        <groupId>org.sonatype.ossindex.maven</groupId>
        <artifactId>ossindex-maven-plugin</artifactId>
        <version>3.2.0</version>
        <configuration>
          <excludeCoordinates>
            <!-- the link from ossindex "divide by zero" points to fixes that were made in 2.18.0 -->
            <exclude>
              <groupId>com.drewnoakes</groupId>
<artifactId>metadata-extractor</artifactId>
              <version>2.18.0</version>
            </exclude>
            <exclude>
              <!-- sonatype https://github.com/google/guava/issues/4011 -->
              <groupId>com.google.guava</groupId>
              <artifactId>guava</artifactId>
              <version>31.1-jre</version>
            </exclude>
            <!-- sonatype points to a sve in 1.4.199 for this ?!
            https://www.exploit-db.com/exploits/49384
https://codewhitesec.blogspot.com/2019/08/exploit-h2-database-native-libraries-jni.html
            -->
            <exclude>
              <groupId>com.h2database</groupId>
              <artifactId>h2</artifactId>
              <version>${h2.version}</version>
            </exclude>
            <exclude>
              <!-- CVE-2018-18928 does affect the java library not just the c/c++ library,
              upon further research -->
              <groupId>com.ibm.icu</groupId>
              <artifactId>icu4j</artifactId>
              <version>${icu4j.version}</version>
            </exclude>
            <exclude>
              <groupId>io.netty</groupId>
              <artifactId>netty-handler</artifactId>
              <version>${netty.version}</version>
            </exclude>
            <exclude>
              <!-- the most recent cve in sonatype for this artifact is 2.11.0,
                  not at all the version we're using...smh-->
              <groupId>xerces</groupId>
              <artifactId>xercesImpl</artifactId>
              <version>${xerces.version}</version>
            </exclude>
            <!-- no fix available as of 20220715 -->
            <dependency>
              <groupId>com.azure</groupId>
<artifactId>azure-storage-blob</artifactId>
              <version>12.18.0</version>
            </dependency>
            <!-- these are used by the nlp-module -->
            <exclude>
              <groupId>org.apache.lucene</groupId>
<artifactId>lucene-queryparser</artifactId>
              <version>4.0.0</version>
            </exclude>
            <exclude>
              <groupId>log4j</groupId>
              <artifactId>log4j</artifactId>
              <version>1.2.17</version>
            </exclude>
            <!-- this one is used in tika-example -->
            <exclude>
              <!-- sonatype: https://github.com/apache/commons-dbcp/commit/a4c5af0da1de3a7f50c72fc7edaa1f653ca276dd -->
              <groupId>commons-dbcp</groupId>
              <artifactId>commons-dbcp</artifactId>
              <version>1.4</version>
            </exclude>
            <exclude>
              <!-- CVE-2022-2191 applies to jetty 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 -->
              <groupId>org.eclipse.jetty</groupId>
              <artifactId>jetty-io</artifactId>
              <version>9.4.48.v20220622</version>
            </exclude>
          </excludeCoordinates>
          <fail>true</fail>
        </configuration>
        <executions>
          <execution>
            <id>audit-dependencies</id>
            <phase>validate</phase>
            <goals>
              <goal>audit</goal>
            </goals>
          </execution>
        </executions>
      </plugin>

Tilman

Am 19.07.2022 um 00:58 schrieb Bansal, Anshuman:
Hi Team,

I'm trying to install Tika 2.4.1 on a RHEL machine but getting below error.
Is there any easy way to skip the dependency auditing at compile time? Or a way 
to update that library to resolve the security issues? Though I tried below 
command but did not help.
mvn clean install -Dossindex.fail=false

---------------------------------------------------------Stacktrace----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
[ERROR] Failed to execute goal 
org.sonatype.ossindex.maven:ossindex-maven-plugin:3.2.0:audit 
(audit-dependencies) on project tika-fetcher-az-blob: Detected 1 vulnerable 
components:
[ERROR]   com.azure:azure-storage-blob:jar:12.17.1:compile; 
https://ossindex.sonatype.org/component/pkg:maven/com.azure/[email protected]?utm_source=ossindex-client&utm_medium=integration&utm_content=1.8.1
[ERROR]     * [CVE-2022-30187] CWE-200: Information Exposure (4.7); 
https://ossindex.sonatype.org/vulnerability/CVE-2022-30187?component-type=maven&component-name=com.azure%2Fazure-storage-blob&utm_source=ossindex-client&utm_medium=integration&utm_content=1.8.1
[ERROR]
[ERROR] Excluded coordinates:
[ERROR]   - io.netty:netty-handler:4.1.77.Final
[ERROR]
[ERROR] -> [Help 1]
[ERROR]
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e 
switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR]
[ERROR] For more information about the errors and possible solutions, please 
read the following articles:
[ERROR] [Help 1] 
http://cwiki.apache.org/confluence/display/MAVEN/MojoFailureException
[ERROR]
[ERROR] After correcting the problems, you can resume the build with the command
[ERROR]   mvn <args> -rf :tika-fetcher-az-blob



Thanks,
Anshuman

________________________________

The information contained in this message is intended only for the recipient, and may be a 
confidential attorney-client communication or may otherwise be privileged and confidential and 
protected from disclosure. If the reader of this message is not the intended recipient, or an 
employee or agent responsible for delivering this message to the intended recipient, please be 
aware that any dissemination or copying of this communication is strictly prohibited. If you 
have received this communication in error, please immediately notify us by replying to the 
message and deleting it from your computer. S&P Global Inc. reserves the right, subject to 
applicable local law, to monitor, review and process the content of any electronic message or 
information sent to or from S&P Global Inc. e-mail addresses without informing the sender 
or recipient of the message. By sending electronic message or information to S&P Global 
Inc. e-mail addresses you, as the sender, are consenting to S&P Global Inc. processing any 
of your personal data therein.


Reply via email to