hansva opened a new issue, #2250:
URL: https://github.com/apache/hop/issues/2250

   ### What needs to happen?
   
   |Package|Vulnerability ID |Severity|Installed Version|Fixed Version |PkgPath 
|Description|
   
|-------------------------------------------|-------------------|--------|-----------------|--------------------------------------------|--------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
 
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2017-15095 
|CRITICAL|2.4.0|2.7.9.2, 2.8.10, 
2.9.1|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar |A 
deserialization flaw was discovered in the jackson-databind in versions before 
2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code 
execution by sending the maliciously crafted input to the readValue method of 
the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by 
blacklisting more classes that could be used maliciously.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2018-11307 
|CRITICAL|2.4.0|2.7.9.4, 2.8.11.2, 
2.9.6|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar |An 
issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of 
Jackson default typing along with a gadget class from iBatis allows 
exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2018-14718 
|CRITICAL|2.4.0|2.6.7.2, 
2.9.7|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar 
|FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to 
execute arbitrary code by leveraging failure to block the slf4j-ext class from 
polymorphic deserialization. |
   
|com.fasterxml.jackson.core:jackson-databind|CVE-2018-7489|CRITICAL|2.4.0|2.7.9.3,
 2.8.11.1, 
2.9.5|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar 
|FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x 
before 2.9.5 allows unauthenticated remote code execution because of an 
incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable 
by sending maliciously crafted JSON input to the readValue method of the 
ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries 
are available in the classpath.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2019-14540 
|CRITICAL|2.4.0|2.9.10|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. |
   |com.fasterxml.jackson.core:jackson-databind|CVE-2019-14893 
|CRITICAL|2.4.0|2.8.11.5, 
2.9.10|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar |A 
flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 
and 2.10.0, where it would permit polymorphic deserialization of malicious 
objects using the xalan JNDI gadget when used in conjunction with polymorphic 
type handling methods such as \`enableDefaultTyping()\` or when @JsonTypeInfo 
is using \`Id.CLASS\` or \`Id.MINIMAL_CLASS\` or in any other way which 
ObjectMapper.readValue might instantiate objects from unsafe sources. An 
attacker could use this flaw to execute arbitrary code. |
   |com.fasterxml.jackson.core:jackson-databind|CVE-2019-16335 
|CRITICAL|2.4.0|2.9.10|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a 
different vulnerability than CVE-2019-14540.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2019-16942 
|CRITICAL|2.4.0|2.9.10.1|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 
through 2.9.10. When Default Typing is enabled (either globally or for a 
specific property) for an externally exposed JSON endpoint and the service has 
the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI 
service endpoint to access, it is possible to make the service execute a 
malicious payload. This issue exists because of 
org.apache.commons.dbcp.datasources.SharedPoolDataSource and 
org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. |
   |com.fasterxml.jackson.core:jackson-databind|CVE-2019-16943 
|CRITICAL|2.4.0|2.9.10.1|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 
through 2.9.10. When Default Typing is enabled (either globally or for a 
specific property) for an externally exposed JSON endpoint and the service has 
the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service 
endpoint to access, it is possible to make the service execute a malicious 
payload. This issue exists because of com.p6spy.engine.spy.P6DataSource 
mishandling. |
   |com.fasterxml.jackson.core:jackson-databind|CVE-2019-17267 
|CRITICAL|2.4.0|2.9.10|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
before 2.9.10. It is related to 
net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2019-17531 
|CRITICAL|2.4.0|2.9.10.1|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 
through 2.9.10. When Default Typing is enabled (either globally or for a 
specific property) for an externally exposed JSON endpoint and the service has 
the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker 
can provide a JNDI service to access, it is possible to make the service 
execute a malicious payload.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2019-20330 
|CRITICAL|2.4.0|2.8.11.5, 
2.9.10.2|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar 
|FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache 
blocking. |
   |org.apache.commons:commons-text|CVE-2022-42889 
|CRITICAL|1.9|1.10.0|opt/hop/hop/plugins/engines/beam/lib/commons-text-1.9.jar 
|Apache Commons Text performs variable interpolation, allowing properties to be 
dynamically evaluated and expanded. The standard format for interpolation is 
"${prefix:name}", where "prefix" is used to locate an instance of 
org.apache.commons.text.lookup.StringLookup that performs the interpolation. 
Starting with version 1.5 and continuing through 1.9, the set of default Lookup 
instances included interpolators that could result in arbitrary code execution 
or contact with remote servers. These lookups are: - "script" - execute 
expressions using the JVM script execution engine (javax.script) - "dns" - 
resolve dns records - "url" - load values from urls, including from remote 
servers Applications using the interpolation defaults in the affected versions 
may be vulnerable to remote code execution or unintentional contact with remote 
servers if untrusted configu
 ration values are used. Users are recommended to upgrade to Apache Commons 
Text 1.10.0, which disables the problematic interpolators by default. |
   |com.fasterxml.jackson.core:jackson-databind|CVE-2020-36518 |HIGH|2.11.4 
|2.12.6.1, 
2.13.2.1|opt/hop/hop/plugins/tech/parquet/lib/parquet-jackson-1.12.0.jar 
|jackson-databind before 2.13.0 allows a Java StackOverflow exception and 
denial of service via a large depth of nested objects. |
   |com.fasterxml.jackson.core:jackson-databind|CVE-2022-42003 |HIGH|2.11.4 
|2.12.7.1, 
2.13.4.1|opt/hop/hop/plugins/tech/parquet/lib/parquet-jackson-1.12.0.jar |In 
FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur 
because of a lack of a check in primitive value deserializers to avoid deep 
wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. 
Additional fix version in 2.13.4.1 and 2.12.17.1|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2022-42004 |HIGH|2.11.4 
|2.12.7.1, 
2.13.4|opt/hop/hop/plugins/tech/parquet/lib/parquet-jackson-1.12.0.jar |In 
FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because 
of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use 
of deeply nested arrays. An application is vulnerable only with certain 
customized choices for deserialization.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2022-42003 |HIGH|2.12.7 
|2.12.7.1, 
2.13.4.1|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|In
 FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur 
because of a lack of a check in primitive value deserializers to avoid deep 
wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. 
Additional fix version in 2.13.4.1 and 2.12.17.1|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2022-42003 |HIGH|2.12.7 
|2.12.7.1, 
2.13.4.1|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|In
 FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur 
because of a lack of a check in primitive value deserializers to avoid deep 
wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. 
Additional fix version in 2.13.4.1 and 2.12.17.1|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2022-42004 |HIGH|2.12.7 
|2.12.7.1, 
2.13.4|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|In 
FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because 
of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use 
of deeply nested arrays. An application is vulnerable only with certain 
customized choices for deserialization.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2022-42004 |HIGH|2.12.7 
|2.12.7.1, 
2.13.4|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|In 
FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because 
of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use 
of deeply nested arrays. An application is vulnerable only with certain 
customized choices for deserialization.|
   
|com.fasterxml.jackson.core:jackson-databind|CVE-2018-5968|HIGH|2.4.0|2.7.9.5, 
2.8.11.1, 
2.9.4|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar 
|FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows 
unauthenticated remote code execution because of an incomplete fix for the 
CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via 
two different gadgets that bypass a blacklist.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2020-10650 
|HIGH|2.4.0|2.9.10.4|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |A deserialization flaw was discovered in jackson-databind through 2.9.10.4. 
It could allow an unauthenticated user to perform code execution via ignite-jta 
or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, 
org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and 
org.quartz.utils.JNDIConnectionProvider. |
   |com.fasterxml.jackson.core:jackson-databind|CVE-2020-35490 
|HIGH|2.4.0|2.9.10.8|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction 
between serialization gadgets and typing, related to 
org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2020-35491 
|HIGH|2.4.0|2.9.10.8|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction 
between serialization gadgets and typing, related to 
org.apache.commons.dbcp2.datasources.SharedPoolDataSource. |
   |com.fasterxml.jackson.core:jackson-databind|CVE-2020-36518 
|HIGH|2.4.0|2.12.6.1, 
2.13.2.1|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar 
|jackson-databind before 2.13.0 allows a Java StackOverflow exception and 
denial of service via a large depth of nested objects. |
   |com.fasterxml.jackson.core:jackson-databind|CVE-2022-42003 
|HIGH|2.4.0|2.12.7.1, 
2.13.4.1|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar 
|In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur 
because of a lack of a check in primitive value deserializers to avoid deep 
wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. 
Additional fix version in 2.13.4.1 and 2.12.17.1|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2022-42004 
|HIGH|2.4.0|2.12.7.1, 
2.13.4|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar 
|In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur 
because of a lack of a check in BeanDeserializer._deserializeFromArray to 
prevent use of deeply nested arrays. An application is vulnerable only with 
certain customized choices for deserialization.|
   |com.fasterxml.woodstox:woodstox-core |CVE-2022-40151 |HIGH|5.3.0|5.4.0, 
6.4.0|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|Those
 using Xstream to seralize XML data may be vulnerable to Denial of Service 
attacks (DOS). If the parser is running on user supplied input, an attacker may 
supply content that causes the parser to crash by stackoverflow. This effect 
may support a denial of service attack.|
   |com.fasterxml.woodstox:woodstox-core |CVE-2022-40151 |HIGH|5.3.0|5.4.0, 
6.4.0|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|Those
 using Xstream to seralize XML data may be vulnerable to Denial of Service 
attacks (DOS). If the parser is running on user supplied input, an attacker may 
supply content that causes the parser to crash by stackoverflow. This effect 
may support a denial of service attack.|
   |com.fasterxml.woodstox:woodstox-core |CVE-2022-40152 |HIGH|5.3.0|5.4.0, 
6.4.0|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|Those
 using Woodstox to parse XML data may be vulnerable to Denial of Service 
attacks (DOS) if DTD support is enabled. If the parser is running on user 
supplied input, an attacker may supply content that causes the parser to crash 
by stackoverflow. This effect may support a denial of service attack.|
   |com.fasterxml.woodstox:woodstox-core |CVE-2022-40152 |HIGH|5.3.0|5.4.0, 
6.4.0|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|Those
 using Woodstox to parse XML data may be vulnerable to Denial of Service 
attacks (DOS) if DTD support is enabled. If the parser is running on user 
supplied input, an attacker may supply content that causes the parser to crash 
by stackoverflow. This effect may support a denial of service attack.|
   |com.google.protobuf:protobuf-java|CVE-2022-3171|HIGH|3.19.3 |3.16.3, 
3.19.6, 3.20.3, 3.21.7|opt/hop/hop/lib/core/sshlib-2.2.21.jar|A parsing issue 
with binary data in protobuf-java core and lite versions prior to 3.21.7, 
3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs 
containing multiple instances of non-repeated embedded messages with repeated 
or unknown fields causes objects to be converted back-n-forth between mutable 
and immutable forms, resulting in potentially long garbage collection pauses. 
We recommend updating to the versions mentioned above. |
   |com.google.protobuf:protobuf-java|CVE-2022-3171|HIGH|3.19.3 |3.16.3, 
3.19.6, 3.20.3, 
3.21.7|opt/hop/hop/plugins/transforms/ssh/lib/sshlib-2.2.21.jar|A parsing issue 
with binary data in protobuf-java core and lite versions prior to 3.21.7, 
3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs 
containing multiple instances of non-repeated embedded messages with repeated 
or unknown fields causes objects to be converted back-n-forth between mutable 
and immutable forms, resulting in potentially long garbage collection pauses. 
We recommend updating to the versions mentioned above. |
   |com.google.protobuf:protobuf-java|CVE-2022-3509|HIGH|3.19.3 |3.16.3, 
3.19.6, 3.20.3, 3.21.7|opt/hop/hop/lib/core/sshlib-2.2.21.jar|A parsing issue 
similar to CVE-2022-3171, but with textformat in protobuf-java core and lite 
versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of 
service attack. Inputs containing multiple instances of non-repeated embedded 
messages with repeated or unknown fields causes objects to be converted 
back-n-forth between mutable and immutable forms, resulting in potentially long 
garbage collection pauses. We recommend updating to the versions mentioned 
above.|
   |com.google.protobuf:protobuf-java|CVE-2022-3509|HIGH|3.19.3 |3.16.3, 
3.19.6, 3.20.3, 
3.21.7|opt/hop/hop/plugins/transforms/ssh/lib/sshlib-2.2.21.jar|A parsing issue 
similar to CVE-2022-3171, but with textformat in protobuf-java core and lite 
versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of 
service attack. Inputs containing multiple instances of non-repeated embedded 
messages with repeated or unknown fields causes objects to be converted 
back-n-forth between mutable and immutable forms, resulting in potentially long 
garbage collection pauses. We recommend updating to the versions mentioned 
above.|
   |com.google.protobuf:protobuf-java|CVE-2022-3510|HIGH|3.19.3 |3.16.3, 
3.19.6, 3.20.3, 3.21.7|opt/hop/hop/lib/core/sshlib-2.2.21.jar|A parsing issue 
similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java 
core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a 
denial of service attack. Inputs containing multiple instances of non-repeated 
embedded messages with repeated or unknown fields causes objects to be 
converted back-n-forth between mutable and immutable forms, resulting in 
potentially long garbage collection pauses. We recommend updating to the 
versions mentioned above. |
   |com.google.protobuf:protobuf-java|CVE-2022-3510|HIGH|3.19.3 |3.16.3, 
3.19.6, 3.20.3, 
3.21.7|opt/hop/hop/plugins/transforms/ssh/lib/sshlib-2.2.21.jar|A parsing issue 
similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java 
core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a 
denial of service attack. Inputs containing multiple instances of non-repeated 
embedded messages with repeated or unknown fields causes objects to be 
converted back-n-forth between mutable and immutable forms, resulting in 
potentially long garbage collection pauses. We recommend updating to the 
versions mentioned above. |
   |com.google.protobuf:protobuf-java|CVE-2022-3171|HIGH|3.21.1 |3.16.3, 
3.19.6, 3.20.3, 3.21.7|opt/hop/hop/lib/beam/beam-vendor-grpc-1_48_1-0.1.jar|A 
parsing issue with binary data in protobuf-java core and lite versions prior to 
3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. 
Inputs containing multiple instances of non-repeated embedded messages with 
repeated or unknown fields causes objects to be converted back-n-forth between 
mutable and immutable forms, resulting in potentially long garbage collection 
pauses. We recommend updating to the versions mentioned above. |
   |com.google.protobuf:protobuf-java|CVE-2022-3509|HIGH|3.21.1 |3.16.3, 
3.19.6, 3.20.3, 3.21.7|opt/hop/hop/lib/beam/beam-vendor-grpc-1_48_1-0.1.jar|A 
parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java 
core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a 
denial of service attack. Inputs containing multiple instances of non-repeated 
embedded messages with repeated or unknown fields causes objects to be 
converted back-n-forth between mutable and immutable forms, resulting in 
potentially long garbage collection pauses. We recommend updating to the 
versions mentioned above.|
   |com.google.protobuf:protobuf-java|CVE-2022-3510|HIGH|3.21.1 |3.16.3, 
3.19.6, 3.20.3, 3.21.7|opt/hop/hop/lib/beam/beam-vendor-grpc-1_48_1-0.1.jar|A 
parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in 
protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 
can lead to a denial of service attack. Inputs containing multiple instances of 
non-repeated embedded messages with repeated or unknown fields causes objects 
to be converted back-n-forth between mutable and immutable forms, resulting in 
potentially long garbage collection pauses. We recommend updating to the 
versions mentioned above. |
   |com.google.protobuf:protobuf-java|CVE-2022-3171|HIGH|3.7.1|3.16.3, 3.19.6, 
3.20.3, 
3.21.7|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|A 
parsing issue with binary data in protobuf-java core and lite versions prior to 
3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. 
Inputs containing multiple instances of non-repeated embedded messages with 
repeated or unknown fields causes objects to be converted back-n-forth between 
mutable and immutable forms, resulting in potentially long garbage collection 
pauses. We recommend updating to the versions mentioned above. |
   |com.google.protobuf:protobuf-java|CVE-2022-3171|HIGH|3.7.1|3.16.3, 3.19.6, 
3.20.3, 
3.21.7|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|A 
parsing issue with binary data in protobuf-java core and lite versions prior to 
3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. 
Inputs containing multiple instances of non-repeated embedded messages with 
repeated or unknown fields causes objects to be converted back-n-forth between 
mutable and immutable forms, resulting in potentially long garbage collection 
pauses. We recommend updating to the versions mentioned above. |
   |io.netty:netty-all |CVE-2022-41881 |HIGH|4.1.85.Final 
|4.1.86|opt/hop/hop/lib/beam/netty-all-4.1.85.Final.jar |Netty project is an 
event-driven asynchronous network application framework. In versions prior to 
4.1.86.Final, a StackOverflowError can be raised when parsing a malformed 
crafted message due to an infinite recursion. This issue is patched in version 
4.1.86.Final. There is no workaround, except using a custom 
HaProxyMessageDecoder. |
   |io.netty:netty-codec |CVE-2021-37136 |HIGH|4.1.66.Final 
|4.1.68|opt/hop/hop/plugins/tech/neo4j/lib/neo4j-java-driver-4.3.4.jar|The 
Bzip2 decompression decoder function doesn't allow setting size restrictions on 
the decompressed output data (which affects the allocation size used during 
decompression). All users of Bzip2Decoder are affected. The malicious input can 
trigger an OOME and so a DoS attack |
   |io.netty:netty-codec |CVE-2021-37137 |HIGH|4.1.66.Final 
|4.1.68|opt/hop/hop/plugins/tech/neo4j/lib/neo4j-java-driver-4.3.4.jar|The 
Snappy frame decoder function doesn't restrict the chunk length which may lead 
to excessive memory usage. Beside this it also may buffer reserved skippable 
chunks until the whole chunk was received which may lead to excessive memory 
usage as well. This vulnerability can be triggered by supplying malicious input 
that decompresses to a very big size (via a network stream or a file) or by 
sending a huge skippable chunk.|
   |io.netty:netty-codec-haproxy |CVE-2022-41881 |HIGH|4.1.85.Final 
|4.1.86.Final|opt/hop/hop/lib/beam/netty-codec-haproxy-4.1.85.Final.jar |Netty 
project is an event-driven asynchronous network application framework. In 
versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing 
a malformed crafted message due to an infinite recursion. This issue is patched 
in version 4.1.86.Final. There is no workaround, except using a custom 
HaProxyMessageDecoder. |
   |org.eclipse.jetty:jetty-client |CVE-2020-27216 |HIGH|9.4.28.v20200408 
|9.4.33.v20201020, 10.0.0.beta3, 
11.0.0.beta3|opt/hop/hop/lib/core/jetty-client-9.4.28.v20200408.jar|In Eclipse 
Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 
11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary 
directory is shared between all users on that system. A collocated user can 
observe the process of creating a temporary sub directory in the shared 
temporary directory and race to complete the creation of the temporary 
subdirectory. If the attacker wins the race then they will have read and write 
permission to the subdirectory used to unpack web applications, including their 
WEB-INF/lib jar files and JSP files. If any code is ever executed out of this 
temporary directory, this can lead to a local privilege escalation 
vulnerability.|
   |org.eclipse.jetty:jetty-client |CVE-2021-28165 |HIGH|9.4.28.v20200408 
|9.4.39.v20210325, 10.0.2, 
11.0.2|opt/hop/hop/lib/core/jetty-client-9.4.28.v20200408.jar|In Eclipse Jetty 
7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU 
usage can reach 100% upon receiving a large invalid TLS frame.|
   |org.eclipse.jetty:jetty-http |CVE-2021-28165 |HIGH|9.4.35.v20201120 
|9.4.39.v20210325, 10.0.2, 
11.0.2|opt/hop/hop/lib/core/jetty-http-9.4.35.v20201120.jar|In Eclipse Jetty 
7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU 
usage can reach 100% upon receiving a large invalid TLS frame.|
   |org.eclipse.jetty:jetty-io |CVE-2021-28165 |HIGH|9.4.35.v20201120 
|9.4.39.v20210325, 10.0.2, 
11.0.2|opt/hop/hop/lib/core/jetty-io-9.4.35.v20201120.jar|In Eclipse Jetty 
7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU 
usage can reach 100% upon receiving a large invalid TLS frame.|
   |org.eclipse.jetty:jetty-server |CVE-2021-28165 |HIGH|9.4.35.v20201120 
|9.4.39.v20210325, 10.0.2, 
11.0.2|opt/hop/hop/lib/core/jetty-server-9.4.35.v20201120.jar|In Eclipse Jetty 
7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU 
usage can reach 100% upon receiving a large invalid TLS frame.|
   |org.eclipse.jetty:jetty-util |CVE-2021-28165 |HIGH|9.4.35.v20201120 
|9.4.39.v20210325, 10.0.2, 
11.0.2|opt/hop/hop/lib/core/jetty-util-9.4.35.v20201120.jar|In Eclipse Jetty 
7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU 
usage can reach 100% upon receiving a large invalid TLS frame.|
   |org.yaml:snakeyaml |CVE-2022-25857 |HIGH|1.26 
|1.31|opt/hop/hop/plugins/tech/cassandra/lib/snakeyaml-1.26.jar |The package 
org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service 
(DoS) due missing to nested depth limitation for collections. |
   |com.google.guava:guava |CVE-2020-8908|LOW |14.0.1 
|30.0|opt/hop/hop/plugins/engines/beam/lib/spark-network-common_2.12-3.3.0.jar|A
 temp directory creation vulnerability exists in all versions of Guava, 
allowing an attacker with access to the machine to potentially access data in a 
temporary directory created by the Guava API 
com.google.common.io.Files.createTempDir(). By default, on unix-like systems, 
the created directory is world-readable (readable by an attacker with access to 
the system). The method in question has been marked @Deprecated in versions 
30.0 and later and should not be used. For Android developers, we recommend 
choosing a temporary directory API provided by Android, such as 
context.getCacheDir(). For other Java developers, we recommend migrating to the 
Java 7 API java.nio.file.Files.createTempDirectory() which explicitly 
configures permissions of 700, or configuring the Java runtime's java.io.tmpdir 
system property to point to a location whose permissions are ap
 propriately configured.|
   |com.google.guava:guava |CVE-2020-8908|LOW |26.0-jre 
|30.0|opt/hop/hop/lib/beam/beam-vendor-guava-26_0-jre-0.1.jar |A temp directory 
creation vulnerability exists in all versions of Guava, allowing an attacker 
with access to the machine to potentially access data in a temporary directory 
created by the Guava API com.google.common.io.Files.createTempDir(). By 
default, on unix-like systems, the created directory is world-readable 
(readable by an attacker with access to the system). The method in question has 
been marked @Deprecated in versions 30.0 and later and should not be used. For 
Android developers, we recommend choosing a temporary directory API provided by 
Android, such as context.getCacheDir(). For other Java developers, we recommend 
migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which 
explicitly configures permissions of 700, or configuring the Java runtime's 
java.io.tmpdir system property to point to a location whose permissions are 
appropriately co
 nfigured.|
   |org.apache.tika:tika-core|CVE-2022-33879 |LOW |2.3.0|1.28.4, 2.4.1 
|opt/hop/hop/plugins/transforms/tika/lib/tika-core-2.3.0.jar |The initial fixes 
in CVE-2022-30126 and CVE-2022-30973 for regexes in the 
StandardsExtractingContentHandler were insufficient, and we found a separate, 
new regex DoS in a different regex in the StandardsExtractingContentHandler. 
These are now fixed in 1.28.4 and 2.4.1. |
   |org.apache.tika:tika-parser-image-module |CVE-2022-33879 |LOW 
|2.3.0|1.28.4, 2.4.1 
|opt/hop/hop/plugins/transforms/tika/lib/tika-parser-image-module-2.3.0.jar|The 
initial fixes in CVE-2022-30126 and CVE-2022-30973 for regexes in the 
StandardsExtractingContentHandler were insufficient, and we found a separate, 
new regex DoS in a different regex in the StandardsExtractingContentHandler. 
These are now fixed in 1.28.4 and 2.4.1. |
   |org.eclipse.jetty:jetty-http |CVE-2021-28163 |LOW |9.4.35.v20201120 
|9.4.39.v20210325, 10.0.2, 
11.0.2|opt/hop/hop/lib/core/jetty-http-9.4.35.v20201120.jar|In Eclipse Jetty 
9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user 
uses a webapps directory that is a symlink, the contents of the webapps 
directory is deployed as a static webapp, inadvertently serving the webapps 
themselves and anything else that might be in that directory.|
   |org.eclipse.jetty:jetty-http |CVE-2022-2047|LOW |9.4.35.v20201120 
|9.4.46.v20220331, 10.0.9, 11.0.10 
|opt/hop/hop/lib/core/jetty-http-9.4.35.v20201120.jar|In Eclipse Jetty versions 
9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the 
parsing of the authority segment of an http scheme URI, the Jetty HttpURI class 
improperly detects an invalid input as a hostname. This can lead to failures in 
a Proxy scenario. |
   |org.eclipse.jetty:jetty-http |CVE-2022-2047|LOW |9.4.43.v20210629 
|9.4.46.v20220331, 10.0.9, 11.0.10 
|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|In 
Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 
thru 11.0.9 versions, the parsing of the authority segment of an http scheme 
URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. 
This can lead to failures in a Proxy scenario. |
   |org.eclipse.jetty:jetty-http |CVE-2022-2047|LOW |9.4.43.v20210629 
|9.4.46.v20220331, 10.0.9, 11.0.10 
|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|In 
Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 
thru 11.0.9 versions, the parsing of the authority segment of an http scheme 
URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. 
This can lead to failures in a Proxy scenario. |
   |org.eclipse.jetty:jetty-server |CVE-2021-28163 |LOW |9.4.35.v20201120 
|9.4.39.v20210325, 10.0.2, 
11.0.2|opt/hop/hop/lib/core/jetty-server-9.4.35.v20201120.jar|In Eclipse Jetty 
9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user 
uses a webapps directory that is a symlink, the contents of the webapps 
directory is deployed as a static webapp, inadvertently serving the webapps 
themselves and anything else that might be in that directory.|
   |org.eclipse.jetty:jetty-server |CVE-2021-34428 |LOW |9.4.35.v20201120 
|9.4.40.v20210413, 10.0.3, 
11.0.3|opt/hop/hop/lib/core/jetty-server-9.4.35.v20201120.jar|For Eclipse Jetty 
versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the 
SessionListener#sessionDestroyed() method, then the session ID is not 
invalidated in the session ID manager. On deployments with clustered sessions 
and multiple contexts this can result in a session not being invalidated. This 
can result in an application used on a shared computer being left logged in.|
   |org.eclipse.jetty:jetty-util |CVE-2021-28163 |LOW |9.4.35.v20201120 
|9.4.39.v20210325, 10.0.2, 
11.0.2|opt/hop/hop/lib/core/jetty-util-9.4.35.v20201120.jar|In Eclipse Jetty 
9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user 
uses a webapps directory that is a symlink, the contents of the webapps 
directory is deployed as a static webapp, inadvertently serving the webapps 
themselves and anything else that might be in that directory.|
   |org.eclipse.jetty:jetty-webapp |CVE-2021-28163 |LOW |9.4.35.v20201120 
|9.4.39.v20210325, 10.0.2, 
11.0.2|opt/hop/hop/lib/core/jetty-webapp-9.4.35.v20201120.jar|In Eclipse Jetty 
9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user 
uses a webapps directory that is a symlink, the contents of the webapps 
directory is deployed as a static webapp, inadvertently serving the webapps 
themselves and anything else that might be in that directory.|
   |com.fasterxml.jackson.core:jackson-databind|CVE-2018-1000873 
|MEDIUM|2.4.0|2.9.8 
|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar 
|Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input 
Validation vulnerability in Jackson-Modules-Java8 that can result in Causes a 
denial-of-service (DoS). This attack appear to be exploitable via The victim 
deserializes malicious input, specifically very large values in the nanoseconds 
field of a time value. This vulnerability appears to have been fixed in 2.9.8.|
   |com.google.guava:guava |CVE-2018-10237 |MEDIUM|14.0.1 |24.1.1-jre, 
24.1.1-android|opt/hop/hop/plugins/engines/beam/lib/spark-network-common_2.12-3.3.0.jar|Unbounded
 memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows 
remote attackers to conduct denial of service attacks against servers that 
depend on this library and deserialize attacker-provided data, because the 
AtomicDoubleArray class (when serialized with Java serialization) and the 
CompoundOrdering class (when serialized with GWT serialization) perform eager 
allocation without appropriate checks on what a client has sent and whether the 
data size is reasonable. |
   |com.google.protobuf:protobuf-java|CVE-2021-22569 |MEDIUM|3.7.1|3.16.1, 
3.18.2, 
3.19.2|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|An 
issue in protobuf-java allowed the interleaving of 
com.google.protobuf.UnknownFieldSet fields in such a way that would be 
processed out of order. A small malicious payload can occupy the parser for 
several minutes by creating large numbers of short-lived objects that cause 
frequent, repeated pauses. We recommend upgrading libraries beyond the 
vulnerable versions.|
   |com.google.protobuf:protobuf-java|CVE-2021-22569 |MEDIUM|3.7.1|3.16.1, 
3.18.2, 
3.19.2|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|An 
issue in protobuf-java allowed the interleaving of 
com.google.protobuf.UnknownFieldSet fields in such a way that would be 
processed out of order. A small malicious payload can occupy the parser for 
several minutes by creating large numbers of short-lived objects that cause 
frequent, repeated pauses. We recommend upgrading libraries beyond the 
vulnerable versions.|
   |commons-net:commons-net|CVE-2021-37533 |MEDIUM|3.6|3.9.0 
|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|[Prior to 
Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response 
by default. A malicious server can redirect the Commons Net code to use a 
different host, but the user has to connect to the malicious server in the 
first place. This may lead to leakage of information about services running on 
the private network of the client. The default in version 3.9.0 is now false to 
ignore such hosts, as cURL does. See 
https://issues.apache.org/jira/browse/NET-711.](https://issues.apache.org/jira/browse/NET-711)
 |
   |commons-net:commons-net|CVE-2021-37533 |MEDIUM|3.6|3.9.0 
|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|[Prior to 
Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response 
by default. A malicious server can redirect the Commons Net code to use a 
different host, but the user has to connect to the malicious server in the 
first place. This may lead to leakage of information about services running on 
the private network of the client. The default in version 3.9.0 is now false to 
ignore such hosts, as cURL does. See 
https://issues.apache.org/jira/browse/NET-711.](https://issues.apache.org/jira/browse/NET-711)
 |
   |commons-net:commons-net|CVE-2021-37533 |MEDIUM|3.8.0|3.9.0 
|opt/hop/hop/lib/core/commons-net-3.8.0.jar|[Prior to Apache Commons Net 3.9.0, 
Net's FTP client trusts the host from PASV response by default. A malicious 
server can redirect the Commons Net code to use a different host, but the user 
has to connect to the malicious server in the first place. This may lead to 
leakage of information about services running on the private network of the 
client. The default in version 3.9.0 is now false to ignore such hosts, as cURL 
does. See 
https://issues.apache.org/jira/browse/NET-711.](https://issues.apache.org/jira/browse/NET-711)
 |
   |io.netty:netty |CVE-2021-21409 |MEDIUM|3.10.6.Final 
|4.1.61|opt/hop/hop/lib/beam/netty-3.10.6.Final.jar |Netty is an open-source, 
asynchronous event-driven network application framework for rapid development 
of maintainable high performance protocol servers & clients. In Netty 
(io.netty:netty-codec-http2) before version 4.1.61.Final there is a 
vulnerability that enables request smuggling. The content-length header is not 
correctly validated if the request only uses a single Http2HeaderFrame with the 
endStream set to to true. This could lead to request smuggling if the request 
is proxied to a remote peer and translated to HTTP/1.1. This is a followup of 
GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This 
was fixed as part of 4.1.61.Final. |
   |io.netty:netty |CVE-2022-24823 |MEDIUM|3.10.6.Final 
|4.1.77.Final|opt/hop/hop/lib/beam/netty-3.10.6.Final.jar |Netty is an 
open-source, asynchronous event-driven network application framework. The 
package \`io.netty:netty-codec-http\` prior to version 4.1.77.Final contains an 
insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used 
local information disclosure can occur via the local system temporary directory 
if temporary storing uploads on the disk is enabled. This only impacts 
applications running on Java version 6 and lower. Additionally, this 
vulnerability impacts code running on Unix-like systems, and very old versions 
of Mac OSX and Windows as they all share the system temporary directory between 
all users. Version 4.1.77.Final contains a patch for this vulnerability. As a 
workaround, specify one's own \`java.io.tmpdir\` when starting the JVM or use 
DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that 
is only readable by the cu
 rrent user.|
   |io.netty:netty-codec |CVE-2022-24823 |MEDIUM|4.1.66.Final 
|4.1.77.Final|opt/hop/hop/plugins/tech/neo4j/lib/neo4j-java-driver-4.3.4.jar|Netty
 is an open-source, asynchronous event-driven network application framework. 
The package \`io.netty:netty-codec-http\` prior to version 4.1.77.Final 
contains an insufficient fix for CVE-2021-21290. When Netty's multipart 
decoders are used local information disclosure can occur via the local system 
temporary directory if temporary storing uploads on the disk is enabled. This 
only impacts applications running on Java version 6 and lower. Additionally, 
this vulnerability impacts code running on Unix-like systems, and very old 
versions of Mac OSX and Windows as they all share the system temporary 
directory between all users. Version 4.1.77.Final contains a patch for this 
vulnerability. As a workaround, specify one's own \`java.io.tmpdir\` when 
starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the 
directory to something that is
  only readable by the current user.|
   |io.netty:netty-codec-http|CVE-2022-41915 |MEDIUM|4.1.77.Final 
|4.1.86|opt/hop/hop/lib/beam/beam-vendor-grpc-1_48_1-0.1.jar|Netty project is 
an event-driven asynchronous network application framework. Starting in version 
4.1.83.Final and prior to 4.1.86.Final, when calling \`DefaultHttpHeadesr.set\` 
with an \_iterator \_ of values, header value validation was not performed, 
allowing malicious header values in the iterator to perform HTTP Response 
Splitting. This issue has been patched in version 4.1.86.Final. Integrators can 
work around the issue by changing the \`DefaultHttpHeaders.set(CharSequence, 
Iterator<?>)\` call, into a \`remove()\` call, and call \`add()\` in a loop 
over the iterator of values.|
   |io.netty:netty-codec-http|CVE-2022-41915 |MEDIUM|4.1.85.Final 
|4.1.86|opt/hop/hop/lib/beam/netty-codec-http-4.1.85.Final.jar|Netty project is 
an event-driven asynchronous network application framework. Starting in version 
4.1.83.Final and prior to 4.1.86.Final, when calling \`DefaultHttpHeadesr.set\` 
with an \_iterator \_ of values, header value validation was not performed, 
allowing malicious header values in the iterator to perform HTTP Response 
Splitting. This issue has been patched in version 4.1.86.Final. Integrators can 
work around the issue by changing the \`DefaultHttpHeaders.set(CharSequence, 
Iterator<?>)\` call, into a \`remove()\` call, and call \`add()\` in a loop 
over the iterator of values.|
   |io.netty:netty-handler |CVE-2022-24823 |MEDIUM|4.1.66.Final 
|4.1.77.Final|opt/hop/hop/plugins/tech/neo4j/lib/neo4j-java-driver-4.3.4.jar|Netty
 is an open-source, asynchronous event-driven network application framework. 
The package \`io.netty:netty-codec-http\` prior to version 4.1.77.Final 
contains an insufficient fix for CVE-2021-21290. When Netty's multipart 
decoders are used local information disclosure can occur via the local system 
temporary directory if temporary storing uploads on the disk is enabled. This 
only impacts applications running on Java version 6 and lower. Additionally, 
this vulnerability impacts code running on Unix-like systems, and very old 
versions of Mac OSX and Windows as they all share the system temporary 
directory between all users. Version 4.1.77.Final contains a patch for this 
vulnerability. As a workaround, specify one's own \`java.io.tmpdir\` when 
starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the 
directory to something that 
 is only readable by the current user.|
   |org.apache.tika:tika-core|CVE-2022-30126 |MEDIUM|2.3.0|1.28.3, 2.4.0 
|opt/hop/hop/plugins/transforms/tika/lib/tika-core-2.3.0.jar |In Apache Tika, a 
regular expression in our StandardsText class, used by the 
StandardsExtractingContentHandler could lead to a denial of service caused by 
backtracking on a specially crafted file. This only affects users who are 
running the StandardsExtractingContentHandler, which is a non-standard handler. 
This is fixed in 1.28.2 and 2.4.0|
   |org.apache.tika:tika-parser-image-module |CVE-2022-25169 
|MEDIUM|2.3.0|1.28.2, 2.4.0 
|opt/hop/hop/plugins/transforms/tika/lib/tika-parser-image-module-2.3.0.jar|The 
BPG parser in versions of Apache Tika before 1.28.2 and 2.4.0 may allocate an 
unreasonable amount of memory on carefully crafted files. |
   |org.eclipse.jetty:jetty-client |CVE-2020-27223 |MEDIUM|9.4.28.v20200408 
|9.4.37.v20210219, 10.0.1, 
11.0.1|opt/hop/hop/lib/core/jetty-client-9.4.28.v20200408.jar|In Eclipse Jetty 
9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty 
handles a request containing multiple Accept headers with a large number of 
“quality” (i.e. q) parameters, the server may enter a denial of service (DoS) 
state due to high CPU usage processing those quality values, resulting in 
minutes of CPU time exhausted processing those quality values.|
   |org.eclipse.jetty:jetty-http |CVE-2020-27223 |MEDIUM|9.4.35.v20201120 
|9.4.37.v20210219, 10.0.1, 
11.0.1|opt/hop/hop/lib/core/jetty-http-9.4.35.v20201120.jar|In Eclipse Jetty 
9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty 
handles a request containing multiple Accept headers with a large number of 
“quality” (i.e. q) parameters, the server may enter a denial of service (DoS) 
state due to high CPU usage processing those quality values, resulting in 
minutes of CPU time exhausted processing those quality values.|
   |org.eclipse.jetty:jetty-server |CVE-2020-27223 |MEDIUM|9.4.35.v20201120 
|9.4.37.v20210219, 10.0.1, 
11.0.1|opt/hop/hop/lib/core/jetty-server-9.4.35.v20201120.jar|In Eclipse Jetty 
9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty 
handles a request containing multiple Accept headers with a large number of 
“quality” (i.e. q) parameters, the server may enter a denial of service (DoS) 
state due to high CPU usage processing those quality values, resulting in 
minutes of CPU time exhausted processing those quality values.|
   |org.eclipse.jetty:jetty-servlets |CVE-2021-28169 |MEDIUM|9.4.35.v20201120 
|9.4.41, 10.0.3, 
11.0.3|opt/hop/hop/lib/core/jetty-servlets-9.4.35.v20201120.jar|For Eclipse 
Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to 
the ConcatServlet with a doubly encoded path to access protected resources 
within the WEB-INF directory. For example a request to 
\`/concat?/%2557EB-INF/web.xml\` can retrieve the web.xml file. This can reveal 
sensitive information regarding the implementation of a web application. |
   |org.eclipse.jetty:jetty-util |CVE-2020-27223 |MEDIUM|9.4.35.v20201120 
|9.4.37.v20210219, 10.0.1, 
11.0.1|opt/hop/hop/lib/core/jetty-util-9.4.35.v20201120.jar|In Eclipse Jetty 
9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty 
handles a request containing multiple Accept headers with a large number of 
“quality” (i.e. q) parameters, the server may enter a denial of service (DoS) 
state due to high CPU usage processing those quality values, resulting in 
minutes of CPU time exhausted processing those quality values.|
   |org.yaml:snakeyaml |CVE-2022-38749 |MEDIUM|1.26 
|1.31|opt/hop/hop/plugins/tech/cassandra/lib/snakeyaml-1.26.jar |Using 
snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service 
attacks (DOS). If the parser is running on user supplied input, an attacker may 
supply content that causes the parser to crash by stackoverflow. |
   |org.yaml:snakeyaml |CVE-2022-38750 |MEDIUM|1.26 
|1.31|opt/hop/hop/plugins/tech/cassandra/lib/snakeyaml-1.26.jar |Using 
snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service 
attacks (DOS). If the parser is running on user supplied input, an attacker may 
supply content that causes the parser to crash by stackoverflow. |
   |org.yaml:snakeyaml |CVE-2022-38751 |MEDIUM|1.26 
|1.31|opt/hop/hop/plugins/tech/cassandra/lib/snakeyaml-1.26.jar |Using 
snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service 
attacks (DOS). If the parser is running on user supplied input, an attacker may 
supply content that causes the parser to crash by stackoverflow. |
   |org.yaml:snakeyaml |CVE-2022-38752 |MEDIUM|1.26 
|1.32|opt/hop/hop/plugins/tech/cassandra/lib/snakeyaml-1.26.jar |Using 
snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service 
attacks (DOS). If the parser is running on user supplied input, an attacker may 
supply content that causes the parser to crash by stack-overflow.|
   |org.yaml:snakeyaml |CVE-2022-41854 |MEDIUM|1.26 
|1.32|opt/hop/hop/plugins/tech/cassandra/lib/snakeyaml-1.26.jar |Those using 
Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service 
attacks (DOS). If the parser is running on user supplied input, an attacker may 
supply content that causes the parser to crash by stack overflow. This effect 
may support a denial of service attack.|
   |com.fasterxml.jackson.core:jackson-databind|GHSA-rpr3-cw39-3pxh|UNKNOWN 
|2.4.0|2.9.10.4|opt/hop/hop/plugins/engines/beam/lib/htrace-core-3.1.0-incubating.jar
 |The com.fasterxml.jackson.core:jackson-databind library before versions 
2.9.10.4 is vulnerable to an Unsafe Deserialization vulnerability when handling 
interactions related to the class \`ignite-jta\`. |
   |com.google.protobuf:protobuf-java|GHSA-h4h5-3hr4-j3g2|UNKNOWN |3.19.3 
|3.20.3, 3.21.7, 3.16.3, 3.19.6|opt/hop/hop/lib/core/sshlib-2.2.21.jar|Improper 
Neutralization in com.google.protobuf:protobuf-kotlin-lite.|
   |com.google.protobuf:protobuf-java|GHSA-h4h5-3hr4-j3g2|UNKNOWN |3.19.3 
|3.20.3, 3.21.7, 3.16.3, 
3.19.6|opt/hop/hop/plugins/transforms/ssh/lib/sshlib-2.2.21.jar|Improper 
Neutralization in com.google.protobuf:protobuf-kotlin-lite.|
   |com.google.protobuf:protobuf-java|GHSA-h4h5-3hr4-j3g2|UNKNOWN |3.21.1 
|3.20.3, 3.21.7, 3.16.3, 
3.19.6|opt/hop/hop/lib/beam/beam-vendor-grpc-1_48_1-0.1.jar|Improper 
Neutralization in com.google.protobuf:protobuf-kotlin-lite.|
   |com.google.protobuf:protobuf-java|GHSA-h4h5-3hr4-j3g2|UNKNOWN 
|3.7.1|3.20.3, 3.21.7, 3.16.3, 
3.19.6|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|Improper
 Neutralization in com.google.protobuf:protobuf-kotlin-lite.|
   |com.google.protobuf:protobuf-java|GHSA-h4h5-3hr4-j3g2|UNKNOWN 
|3.7.1|3.20.3, 3.21.7, 3.16.3, 
3.19.6|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|Improper
 Neutralization in com.google.protobuf:protobuf-kotlin-lite.|
   |com.google.protobuf:protobuf-java|GHSA-wrvw-hg22-4m67|UNKNOWN 
|3.7.1|3.16.1, 3.18.2, 
3.19.2|opt/hop/hop/plugins/engines/beam/lib/hadoop-client-runtime-3.3.4.jar|\## 
Summary A potential Denial of Service issue in protobuf-java was discovered in 
the parsing procedure for binary data. Reporter: 
[OSS-Fuzz](https://github.com/google/oss-fuzz) Affected versions: All versions 
of Java Protobufs (including Kotlin and JRuby) prior to the versions listed 
below. Protobuf "javalite" users (typically Android) are not affected. ## 
Severity 
[CVE-2021-22569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22569) 
\*\*High\*\* - CVSS Score: 7.5, An implementation weakness in how unknown 
fields are parsed in Java. A small (~800 KB) malicious payload can occupy the 
parser for several minutes by creating large numbers of short-lived objects 
that cause frequent, repeated GC pauses. ## Proof of Concept For reproduction 
details, please refer to the oss-fuzz issue that identifies the specific inpu
 ts that exercise this parsing weakness. ## Remediation and Mitigation Please 
update to the latest available versions of the following packages: - 
protobuf-java (3.16.1, 3.18.2, 3.19.2) - protobuf-kotlin (3.18.2, 3.19.2) - 
google-protobuf [JRuby gem only] (3.19.2)|
   |com.google.protobuf:protobuf-java|GHSA-wrvw-hg22-4m67|UNKNOWN 
|3.7.1|3.16.1, 3.18.2, 
3.19.2|opt/hop/hop/plugins/tech/parquet/lib/hadoop-client-runtime-3.3.4.jar|\## 
Summary A potential Denial of Service issue in protobuf-java was discovered in 
the parsing procedure for binary data. Reporter: 
[OSS-Fuzz](https://github.com/google/oss-fuzz) Affected versions: All versions 
of Java Protobufs (including Kotlin and JRuby) prior to the versions listed 
below. Protobuf "javalite" users (typically Android) are not affected. ## 
Severity 
[CVE-2021-22569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22569) 
\*\*High\*\* - CVSS Score: 7.5, An implementation weakness in how unknown 
fields are parsed in Java. A small (~800 KB) malicious payload can occupy the 
parser for several minutes by creating large numbers of short-lived objects 
that cause frequent, repeated GC pauses. ## Proof of Concept For reproduction 
details, please refer to the oss-fuzz issue that identifies the specific inpu
 ts that exercise this parsing weakness. ## Remediation and Mitigation Please 
update to the latest available versions of the following packages: - 
protobuf-java (3.16.1, 3.18.2, 3.19.2) - protobuf-kotlin (3.18.2, 3.19.2) - 
google-protobuf [JRuby gem only] (3.19.2)|
   
   ### Issue Priority
   
   Priority: 2
   
   ### Issue Component
   
   Component: Other


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to