[ 
https://issues.apache.org/jira/browse/BEAM-12679?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Joel Cain updated BEAM-12679:
-----------------------------
    Description: 
Vulnerabilities are being detected by scans of images using Twistlock security 
service.

Vulnerabilities:
 1. org.apache.logging.log4j_log4j-api version 2.6.2 has 2 vulnerabilities (1 
critical)
  
 Main issue description: In Apache Log4j 2.x before 2.8.2, when using the TCP 
socket server or UDP socket server to receive serialized log events from 
another application, a specially crafted binary payload can be sent that, when 
deserialized, can execute arbitrary code.
  
 This issue is fixed in version 2.8.2
  
 2. com.fasterxml.jackson.core_jackson-databind version 2.9.8 has 49 
vulnerabilities (14 critical)
  
 Example issue description: A flaw was discovered in FasterXML jackson-databind 
in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic 
deserialization of malicious objects using the xalan JNDI gadget when used in 
conjunction with polymorphic type handling methods such as 
`enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or 
`Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might 
instantiate objects from unsafe sources. An attacker could use this flaw to 
execute arbitrary code.
  
 All issues resolved in versions after 2.9.10.4

  was:
Vulnerabilities:
1. org.apache.logging.log4j_log4j-api  version 2.6.2  has 2 vulnerabilities (1 
critical)
 
Main issue description: In Apache Log4j 2.x before 2.8.2, when using the TCP 
socket server or UDP socket server to receive serialized log events from 
another application, a specially crafted binary payload can be sent that, when 
deserialized, can execute arbitrary code.
 
This issue is fixed in version 2.8.2
 
2. com.fasterxml.jackson.core_jackson-databind  version 2.9.8  has 49 
vulnerabilities (14 critical)
 
Example issue description: A flaw was discovered in FasterXML jackson-databind 
in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic 
deserialization of malicious objects using the xalan JNDI gadget when used in 
conjunction with polymorphic type handling methods such as 
`enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or 
`Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might 
instantiate objects from unsafe sources. An attacker could use this flaw to 
execute arbitrary code.
 
All issues resolved in versions after 2.9.10.4


> Critical issues are being pulled in by 2 of Beams dependencies
> --------------------------------------------------------------
>
>                 Key: BEAM-12679
>                 URL: https://issues.apache.org/jira/browse/BEAM-12679
>             Project: Beam
>          Issue Type: Bug
>          Components: dependencies
>            Reporter: Joel Cain
>            Priority: P2
>
> Vulnerabilities are being detected by scans of images using Twistlock 
> security service.
> Vulnerabilities:
>  1. org.apache.logging.log4j_log4j-api version 2.6.2 has 2 vulnerabilities (1 
> critical)
>   
>  Main issue description: In Apache Log4j 2.x before 2.8.2, when using the TCP 
> socket server or UDP socket server to receive serialized log events from 
> another application, a specially crafted binary payload can be sent that, 
> when deserialized, can execute arbitrary code.
>   
>  This issue is fixed in version 2.8.2
>   
>  2. com.fasterxml.jackson.core_jackson-databind version 2.9.8 has 49 
> vulnerabilities (14 critical)
>   
>  Example issue description: A flaw was discovered in FasterXML 
> jackson-databind in all versions before 2.9.10 and 2.10.0, where it would 
> permit polymorphic deserialization of malicious objects using the xalan JNDI 
> gadget when used in conjunction with polymorphic type handling methods such 
> as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or 
> `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might 
> instantiate objects from unsafe sources. An attacker could use this flaw to 
> execute arbitrary code.
>   
>  All issues resolved in versions after 2.9.10.4



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to