[ 
https://issues.apache.org/jira/browse/KYLIN-3605?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16633244#comment-16633244
 ] 

ASF subversion and git services commented on KYLIN-3605:
--------------------------------------------------------

Commit 55a085cffa14a0e24b2f8d716d3e4925faf3c40d in kylin's branch 
refs/heads/master from shaofengshi
[ https://gitbox.apache.org/repos/asf?p=kylin.git;h=55a085c ]

KYLIN-3605 upgrade zookeeper version to fix security issues


> Fix security issues reported by snyk.io
> ---------------------------------------
>
>                 Key: KYLIN-3605
>                 URL: https://issues.apache.org/jira/browse/KYLIN-3605
>             Project: Kylin
>          Issue Type: Improvement
>            Reporter: Shaofeng SHI
>            Assignee: Shaofeng SHI
>            Priority: Major
>             Fix For: v2.6.0
>
>
> HIGH SEVERITY
> h1. Arbitrary Code Execution
>  * Vulnerable module: commons-beanutils:commons-beanutils
>  * Introduced through: org.apache.kylin:[email protected]
> h2. Detailed paths and remediation
>  * *Introduced through*: org.apache.kylin:[email protected] 
> › org.apache.kylin:[email protected] 
> ›com.github.joshelser:[email protected] › 
> org.apache.hadoop:[email protected] › 
> commons-configuration:[email protected] › 
> commons-digester:[email protected] › 
> commons-beanutils:[email protected]
>  *Remediation:* No remediation path available.
> h2. Overview
> [{{commons-beanutils:commons-beanutils}}|http://search.maven.org/#search%7Cga%7C1%7Ca%3A%22commons-beanutils%22]
> Vulnerable versions of _Apache Commons BeanUtils_, do not suppress the class 
> property, which allows remote attackers to manipulate the {{ClassLoader}}and 
> execute arbitrary code via the class parameter, as demonstrated by the 
> passing of this parameter to the {{getClass}} method of the 
> \{{ActionForm}}object in Struts 1.
>   
>  HIGH SEVERITY
> h1. Arbitrary Command Execution
>  * Vulnerable module: org.mortbay.jetty:jetty
>  * Introduced through: org.apache.kylin:[email protected]
> h2. Detailed paths and remediation
>  * *Introduced through*: org.apache.kylin:[email protected] 
> › org.apache.kylin:[email protected] 
> ›com.github.joshelser:[email protected] › 
> org.apache.hadoop:[email protected] ›org.mortbay.jetty:[email protected]
>  *Remediation:* No remediation path available.
> h2. Overview
> [org.mortbay.jetty:jetty|https://mvnrepository.com/artifact/org.mortbay.jetty]
>  is an open-source project providing a HTTP server, HTTP client and 
> javax.servlet container.
> Affected versions of this package are vulnerable to Arbitrary Command 
> Execution. It writes backtrace data without sanitizing non-printable 
> characters, which might allow remote attackers to modify a window's title, or 
> possibly execute arbitrary commands or overwrite files, via an HTTP request 
> containing an escape sequence for a terminal emulator, related to (1) a 
> string value in the Age parameter to the default URI for the Cookie Dump 
> Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under 
> cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) 
> an alphabetic value in the Content-Length HTTP header to an arbitrary 
> application.
>  HIGH SEVERITY
> h1. Information Exposure
>  * Vulnerable module: org.apache.hadoop:hadoop-common
>  * Introduced through: org.apache.kylin:[email protected]
> h2. Detailed paths and remediation
>  * *Introduced through*: org.apache.kylin:[email protected] 
> › org.apache.kylin:[email protected] 
> ›com.github.joshelser:[email protected] › 
> org.apache.hadoop:[email protected]
>  *Remediation:* No remediation path available.
> h2. Overview
> [{{org.apache.hadoop:hadoop-common}}|https://hadoop.apache.org/] is a 
> framework that allows for the distributed processing of large data sets 
> across clusters of computers using simple programming models.
> Affected versions of the package are vulnerable to Information Exposure.
> If you use the CredentialProvider feature to encrypt passwords used in 
> NodeManager configs, it may be possible for any Container launched by that 
> NodeManager to gain access to the encryption password. The other passwords 
> themselves are not directly exposed.
>   
>  HIGH SEVERITY
> h1. Access Restriction Bypass
>  * Vulnerable module: org.springframework.security:spring-security-core
>  * Introduced through: org.apache.kylin:[email protected]
> h2. Detailed paths and remediation
>  * *Introduced through*: org.apache.kylin:[email protected] › 
> org.apache.kylin:[email protected] 
> ›org.springframework.security.extensions:[email protected]
>  › org.springframework.security:[email protected] › 
> org.springframework.security:[email protected]
>  *Remediation:* No remediation path available.
>  * *Introduced through*: org.apache.kylin:[email protected] › 
> org.apache.kylin:[email protected] 
> ›org.springframework.security.extensions:[email protected]
>  › org.springframework.security:[email protected] › 
> org.springframework.security:[email protected]
>  *Remediation:* No remediation path available.
>  * *Introduced through*: org.apache.kylin:[email protected] › 
> org.apache.kylin:[email protected] 
> ›org.springframework.security:[email protected] › 
> org.springframework.security:[email protected]
>  *Remediation:* No remediation path available.
> …and 2 more
> h2. Overview
> [org.springframework.security:spring-security-core|http://projects.spring.io/spring-framework/]
>  provides a comprehensive programming and configuration model for modern 
> Java-based enterprise applications - on any kind of deployment platform.
> Affected versions of this package are vulnerable to Access Restriction 
> Bypass. It does not consider URL path parameters when processing security 
> constraints. By adding a URL path parameter with special encodings, an 
> attacker may be able to bypass a security constraint.
>   
> HIGH SEVERITY
> h1. Arbitrary Code Execution
>  * Vulnerable module: commons-beanutils:commons-beanutils
>  * Introduced through: org.apache.kylin:[email protected]
> h2. Detailed paths and remediation
>  * 
> *Introduced through*: org.apache.kylin:[email protected] › 
> org.apache.kylin:[email protected] 
> ›org.apache.kylin:[email protected] › 
> org.apache.kylin:[email protected] › 
> org.apache.kylin:[email protected] › 
> commons-validator:[email protected] › 
> commons-beanutils:[email protected]
> *Remediation:* No remediation path available.
> h2. Overview
> [{{commons-beanutils:commons-beanutils}}|http://search.maven.org/#search%7Cga%7C1%7Ca%3A%22commons-beanutils%22]
> Vulnerable versions of _Apache Commons BeanUtils_, do not suppress the class 
> property, which allows remote attackers to manipulate the {{ClassLoader}}and 
> execute arbitrary code via the class parameter, as demonstrated by the 
> passing of this parameter to the {{getClass}} method of the 
> {{ActionForm}}object in Struts 1.
> HIGH SEVERITY
> h1. Directory Traversal
>  * Vulnerable module: org.springframework:spring-webmvc
>  * Introduced through: org.apache.kylin:[email protected]
> h2. Detailed paths and remediation
>  * 
> *Introduced through*: org.apache.kylin:[email protected] › 
> org.apache.kylin:[email protected] 
> ›org.springframework:[email protected]
> *Remediation:* No remediation path available.
> h2. Overview
> [org.springframework:spring-webmvc|https://mvnrepository.com/artifact/org.springframework/spring-webmvc]
>  Spring provides everything you need beyond the Java language to create 
> enterprise applications in a wide range of scenarios and architectures.
> Affected versions of this package are vulnerable to Directory Traversal. When 
> static resources are served from a file system on Windows (as opposed to the 
> classpath, or the ServletContext), a malicious user can send a request using 
> a specially crafted URL that can lead a directory traversal attack.
> HIGH SEVERITY
> h1. Insufficient Validation
>  * Vulnerable module: org.bouncycastle:bcprov-jdk15on
>  * Introduced through: org.apache.kylin:[email protected] and 
> org.opensaml:[email protected]
> h2. Detailed paths and remediation
>  * 
> *Introduced through*: org.apache.kylin:[email protected] › 
> org.apache.kylin:[email protected] 
> ›org.springframework.security.extensions:[email protected]
>  › org.opensaml:[email protected] ›org.opensaml:[email protected] › 
> org.opensaml:[email protected] › org.bouncycastle:[email protected]
> *Remediation:* No remediation path available.
>  * 
> *Introduced through*: org.apache.kylin:[email protected] › 
> org.opensaml:[email protected] › org.opensaml:[email protected] 
> ›org.opensaml:[email protected] › org.bouncycastle:[email protected]
> *Remediation:* No remediation path available.
> h2. Overview
> [org.bouncycastle:bcprov-jdk15on|http://bouncycastle.org/] is a Java 
> implementation of cryptographic algorithms.
> Affected versions of this package are vulnerable to Insufficient Validation. 
> The other party DH public key is not fully validated.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to