sonatype-lift[bot] commented on a change in pull request #7235:
URL: https://github.com/apache/skywalking/pull/7235#discussion_r663880336



##########
File path: test/plugin/scenarios/guava-cache-scenario/pom.xml
##########
@@ -0,0 +1,77 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to You under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~     http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  ~
+  -->
+<project xmlns="http://maven.apache.org/POM/4.0.0";
+         xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+         xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 
http://maven.apache.org/xsd/maven-4.0.0.xsd";>
+    <modelVersion>4.0.0</modelVersion>
+
+    <groupId>org.apache.skywalking</groupId>
+    <artifactId>guava-cache-scenario</artifactId>
+    <version>5.0.0</version>
+    <packaging>war</packaging>
+
+    <properties>
+        <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
+        <compiler.version>1.8</compiler.version>
+
+
+        <test.framework>guava</test.framework>
+        <test.framework.version>18.0</test.framework.version>
+    </properties>
+
+    <name>skywalking-guava-cache-scenario</name>
+
+    <dependencies>
+        <dependency>
+            <groupId>javax.servlet</groupId>
+            <artifactId>javax.servlet-api</artifactId>
+            <version>3.1.0</version>
+            <scope>provided</scope>
+        </dependency>
+        <dependency>
+            <groupId>org.apache.logging.log4j</groupId>
+            <artifactId>log4j-api</artifactId>
+            <version>2.8.1</version>
+        </dependency>
+        <dependency>

Review comment:
       *Critical OSS Vulnerability:*  &nbsp;
   ### pkg:maven/com.fasterxml.jackson.core/[email protected]
   34 Critical, 3 Severe, 0 Moderate and 0 Unknown vulnerabilities have been 
found in a transitive dependency of 
pkg:maven/org.apache.logging.log4j/[email protected]
   
   
   
   <!-- Lift_Details -->
   <details>
   <summary><b>CRITICAL Vulnerabilities (34)</b></summary>
   
   <ul>
   
     ***
     <details>
       <summary>CVE-2018-14721</summary>
   
     > #### [CVE-2018-14721] FasterXML jackson-databind 2.x before 2.9.7 might 
allow remote attackers to cond...
     > FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers 
to conduct server-side request forgery (SSRF) attacks by leveraging failure to 
block the axis2-jaxws class from polymorphic deserialization.
     >
     > **CVSS Score:** 10
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-16942</summary>
   
     > #### [CVE-2019-16942] A Polymorphic Typing issue was discovered in 
FasterXML jackson-databind 2.0.0 th...
     > A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a 
specific property) for an externally exposed JSON endpoint and the service has 
the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI 
service endpoint to access, it is possible to make the service execute a 
malicious payload. This issue exists because of 
org.apache.commons.dbcp.datasources.SharedPoolDataSource and 
org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2017-15095</summary>
   
     > #### [CVE-2017-15095]  Deserialization of Untrusted Data
     > A deserialization flaw was discovered in the jackson-databind in 
versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to 
perform code execution by sending the maliciously crafted input to the 
readValue method of the ObjectMapper. This issue extends the previous flaw 
CVE-2017-7525 by blacklisting more classes that could be used maliciously.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2020-8840</summary>
   
     > #### [CVE-2020-8840] FasterXML jackson-databind 2.0.0 through 2.9.10.2 
lacks certain xbean-reflect/JN...
     > FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain 
xbean-reflect/JNDI blocking, as demonstrated by 
org.apache.xbean.propertyeditor.JndiConverter.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-16335</summary>
   
     > #### [CVE-2019-16335] A Polymorphic Typing issue was discovered in 
FasterXML jackson-databind before 2...
     > A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a 
different vulnerability than CVE-2019-14540.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2017-7525</summary>
   
     > #### [CVE-2017-7525]  Deserialization of Untrusted Data
     > A deserialization flaw was discovered in the jackson-databind, versions 
before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to 
perform code execution by sending the maliciously crafted input to the 
readValue method of the ObjectMapper.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-20330</summary>
   
     > #### [CVE-2019-20330] FasterXML jackson-databind 2.x before 2.9.10.2 
lacks certain net.sf.ehcache bloc...
     > FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain 
net.sf.ehcache blocking.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-7489</summary>
   
     > #### [CVE-2018-7489]  Incomplete Blacklist, Deserialization of Untrusted 
Data
     > FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 
2.9.x before 2.9.5 allows unauthenticated remote code execution because of an 
incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable 
by sending maliciously crafted JSON input to the readValue method of the 
ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries 
are available in the classpath.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-14893</summary>
   
     > #### [CVE-2019-14893] A flaw was discovered in FasterXML 
jackson-databind in all versions before 2.9.1...
     > A flaw was discovered in FasterXML jackson-databind in all versions 
before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of 
malicious objects using the xalan JNDI gadget when used in conjunction with 
polymorphic type handling methods such as `enableDefaultTyping()` or when 
@JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way 
which ObjectMapper.readValue might instantiate objects from unsafe sources. An 
attacker could use this flaw to execute arbitrary code.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-19361</summary>
   
     > #### [CVE-2018-19361]  Deserialization of Untrusted Data
     > FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to 
have unspecified impact by leveraging failure to block the openjpa class from 
polymorphic deserialization.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-19362</summary>
   
     > #### [CVE-2018-19362]  Deserialization of Untrusted Data
     > FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to 
have unspecified impact by leveraging failure to block the jboss-common-core 
class from polymorphic deserialization.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-14892</summary>
   
     > #### [CVE-2019-14892] A flaw was discovered in jackson-databind in 
versions before 2.9.10, 2.8.11.5 an...
     > A flaw was discovered in jackson-databind in versions before 2.9.10, 
2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a 
malicious object using commons-configuration 1 and 2 JNDI classes. An attacker 
could use this flaw to execute arbitrary code.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-17267</summary>
   
     > #### [CVE-2019-17267] A Polymorphic Typing issue was discovered in 
FasterXML jackson-databind before 2...
     > A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
before 2.9.10. It is related to 
net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-14720</summary>
   
     > #### [CVE-2018-14720]  Improper Restriction of XML External Entity 
Reference ("XXE")
     > FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to 
conduct external XML entity (XXE) attacks by leveraging failure to block 
unspecified JDK classes from polymorphic deserialization.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2020-9547</summary>
   
     > #### [CVE-2020-9547] FasterXML jackson-databind 2.x before 2.9.10.4 
mishandles the interaction betwee...
     > FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the 
interaction between serialization gadgets and typing, related to 
com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka 
ibatis-sqlmap).
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2020-9546</summary>
   
     > #### [CVE-2020-9546] FasterXML jackson-databind 2.x before 2.9.10.4 
mishandles the interaction betwee...
     > FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the 
interaction between serialization gadgets and typing, related to 
org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded 
hikari-config).
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-14718</summary>
   
     > #### [CVE-2018-14718]  Deserialization of Untrusted Data
     > FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers 
to execute arbitrary code by leveraging failure to block the slf4j-ext class 
from polymorphic deserialization.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2017-17485</summary>
   
     > #### [CVE-2017-17485]  Improper Control of Generation of Code ("Code 
Injection")
     > FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows 
unauthenticated remote code execution because of an incomplete fix for the 
CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously 
crafted JSON input to the readValue method of the ObjectMapper, bypassing a 
blacklist that is ineffective if the Spring libraries are available in the 
classpath.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-14719</summary>
   
     > #### [CVE-2018-14719]  Deserialization of Untrusted Data
     > FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers 
to execute arbitrary code by leveraging failure to block the blaze-ds-opt and 
blaze-ds-core classes from polymorphic deserialization.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-11307</summary>
   
     > #### [CVE-2018-11307] An issue was discovered in FasterXML 
jackson-databind 2.0.0 through 2.9.5. Use o...
     > An issue was discovered in FasterXML jackson-databind 2.0.0 through 
2.9.5. Use of Jackson default typing along with a gadget class from iBatis 
allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-19360</summary>
   
     > #### [CVE-2018-19360]  Deserialization of Untrusted Data
     > FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to 
have unspecified impact by leveraging failure to block the axis2-transport-jms 
class from polymorphic deserialization.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-14379</summary>
   
     > #### [CVE-2019-14379] SubTypeValidator.java in FasterXML 
jackson-databind before 2.9.9.2 mishandles de...
     > SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 
mishandles default typing when ehcache is used, leading to remote code 
execution.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-17531</summary>
   
     > #### [CVE-2019-17531] A Polymorphic Typing issue was discovered in 
FasterXML jackson-databind 2.0.0 th...
     > A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a 
specific property) for an externally exposed JSON endpoint and the service has 
the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker 
can provide a JNDI service to access, it is possible to make the service 
execute a malicious payload.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2020-9548</summary>
   
     > #### [CVE-2020-9548] FasterXML jackson-databind 2.x before 2.9.10.4 
mishandles the interaction betwee...
     > FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the 
interaction between serialization gadgets and typing, related to 
br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-16943</summary>
   
     > #### [CVE-2019-16943] A Polymorphic Typing issue was discovered in 
FasterXML jackson-databind 2.0.0 th...
     > A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a 
specific property) for an externally exposed JSON endpoint and the service has 
the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service 
endpoint to access, it is possible to make the service execute a malicious 
payload. This issue exists because of com.p6spy.engine.spy.P6DataSource 
mishandling.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-14540</summary>
   
     > #### [CVE-2019-14540] A Polymorphic Typing issue was discovered in 
FasterXML jackson-databind before 2...
     > A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2020-10969</summary>
   
     > #### [CVE-2020-10969] FasterXML jackson-databind 2.x before 2.9.10.4 
mishandles the interaction betwee...
     > FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the 
interaction between serialization gadgets and typing, related to 
javax.swing.JEditorPane.
     >
     > **CVSS Score:** 8.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2020-35491</summary>
   
     > #### [CVE-2020-35491] FasterXML jackson-databind 2.x before 2.9.10.8 
mishandles the interaction betwee...
     > FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the 
interaction between serialization gadgets and typing, related to 
org.apache.commons.dbcp2.datasources.SharedPoolDataSource.
     >
     > **CVSS Score:** 8.1
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-5968</summary>
   
     > #### [CVE-2018-5968]  Incomplete Blacklist, Deserialization of Untrusted 
Data
     > FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows 
unauthenticated remote code execution because of an incomplete fix for the 
CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via 
two different gadgets that bypass a blacklist.
     >
     > **CVSS Score:** 8.1
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2020-35490</summary>
   
     > #### [CVE-2020-35490] FasterXML jackson-databind 2.x before 2.9.10.8 
mishandles the interaction betwee...
     > FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the 
interaction between serialization gadgets and typing, related to 
org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.
     >
     > **CVSS Score:** 8.1
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-12022</summary>
   
     > #### [CVE-2018-12022]  Deserialization of Untrusted Data
     > An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 
2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a 
specific property), the service has the Jodd-db jar (for database access for 
the Jodd framework) in the classpath, and an attacker can provide an LDAP 
service to access, it is possible to make the service execute a malicious 
payload.
     >
     > **CVSS Score:** 7.5
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-12086</summary>
   
     > #### [CVE-2019-12086]  Information Exposure
     > A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
2.x before 2.9.9. When Default Typing is enabled (either globally or for a 
specific property) for an externally exposed JSON endpoint, the service has the 
mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker 
can host a crafted MySQL server reachable by the victim, an attacker can send a 
crafted JSON message that allows them to read arbitrary local files on the 
server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin 
validation.
     >
     > **CVSS Score:** 7.5
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
     </details>
   
     ***
     <details>
       <summary>CVE-2019-14439</summary>
   
     > #### [CVE-2019-14439] A Polymorphic Typing issue was discovered in 
FasterXML jackson-databind 2.x befo...
     > A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally 
or for a specific property) for an externally exposed JSON endpoint and the 
service has the logback jar in the classpath.
     >
     > **CVSS Score:** 7.5
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
     </details>
   
     ***
     <details>
       <summary>CVE-2018-12023</summary>
   
     > #### [CVE-2018-12023]  Deserialization of Untrusted Data
     > An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 
2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a 
specific property), the service has the Oracle JDBC jar in the classpath, and 
an attacker can provide an LDAP service to access, it is possible to make the 
service execute a malicious payload.
     >
     > **CVSS Score:** 7.5
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
     </details>
   
     ***
   </ul>
   
   </details>
   
   <details>
   <summary><b>SEVERE Vulnerabilities (3)</b></summary>
   
   <ul>
   
     ***
     <details>
       <summary>CVE-2018-1000873</summary>
   
     > #### [CVE-2018-1000873]  Improper Input Validation
     > Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input 
Validation vulnerability in Jackson-Modules-Java8 that can result in Causes a 
denial-of-service (DoS). This attack appear to be exploitable via The victim 
deserializes malicious input, specifically very large values in the nanoseconds 
field of a time value. This vulnerability appears to have been fixed in 2.9.8.
     >
     > **CVSS Score:** 6.5
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2019-12384</summary>
   
     > #### [CVE-2019-12384]  Deserialization of Untrusted Data
     > FasterXML jackson-databind 2.x before 2.9.9 might allow attackers to 
have a variety of impacts by leveraging failure to block the logback-core class 
from polymorphic deserialization. Depending on the classpath content, remote 
code execution may be possible.
     >
     > **CVSS Score:** 5.9
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
     </details>
   
     ***
     <details>
       <summary>CVE-2019-12814</summary>
   
     > #### [CVE-2019-12814]  Information Exposure
     > A Polymorphic Typing issue was discovered in FasterXML jackson-databind 
2.x through 2.9.9. When Default Typing is enabled (either globally or for a 
specific property) for an externally exposed JSON endpoint and the service has 
JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically 
crafted JSON message that allows them to read arbitrary local files on the 
server.
     >
     > **CVSS Score:** 5.9
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
     </details>
   
     ***
   </ul>
   
   </details>
   
   (at-me [in a reply](https://help.sonatype.com/lift) with `help` or `ignore`)

##########
File path: test/plugin/scenarios/guava-cache-scenario/pom.xml
##########
@@ -0,0 +1,77 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to You under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~     http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  ~
+  -->
+<project xmlns="http://maven.apache.org/POM/4.0.0";
+         xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+         xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 
http://maven.apache.org/xsd/maven-4.0.0.xsd";>
+    <modelVersion>4.0.0</modelVersion>
+
+    <groupId>org.apache.skywalking</groupId>
+    <artifactId>guava-cache-scenario</artifactId>
+    <version>5.0.0</version>
+    <packaging>war</packaging>
+
+    <properties>
+        <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
+        <compiler.version>1.8</compiler.version>
+
+
+        <test.framework>guava</test.framework>
+        <test.framework.version>18.0</test.framework.version>
+    </properties>
+
+    <name>skywalking-guava-cache-scenario</name>
+
+    <dependencies>
+        <dependency>
+            <groupId>javax.servlet</groupId>
+            <artifactId>javax.servlet-api</artifactId>
+            <version>3.1.0</version>
+            <scope>provided</scope>
+        </dependency>
+        <dependency>
+            <groupId>org.apache.logging.log4j</groupId>
+            <artifactId>log4j-api</artifactId>
+            <version>2.8.1</version>
+        </dependency>
+        <dependency>

Review comment:
       *Critical OSS Vulnerability:*  &nbsp;
   ### pkg:maven/org.apache.logging.log4j/[email protected]
   1 Critical, 0 Severe, 1 Moderate and 0 Unknown vulnerabilities have been 
found in a direct dependency 
   
   
   
   <!-- Lift_Details -->
   <details>
   <summary><b>CRITICAL Vulnerabilities (1)</b></summary>
   
   <ul>
   
     ***
     <details>
       <summary>CVE-2017-5645</summary>
   
     > #### [CVE-2017-5645]  Deserialization of Untrusted Data
     > In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or 
UDP socket server to receive serialized log events from another application, a 
specially crafted binary payload can be sent that, when deserialized, can 
execute arbitrary code.
     >
     > **CVSS Score:** 9.8
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
     </details>
   
     ***
   </ul>
   
   </details>
   
   <details>
   <summary><b>MODERATE Vulnerabilities (1)</b></summary>
   
   <ul>
   
     ***
     <details>
       <summary>CVE-2020-9488</summary>
   
     > #### [CVE-2020-9488] Improper validation of certificate with host 
mismatch in Apache Log4j SMTP appen...
     > Improper validation of certificate with host mismatch in Apache Log4j 
SMTP appender. This could allow an SMTPS connection to be intercepted by a 
man-in-the-middle attack which could leak any log messages sent through that 
appender.
     >
     > **CVSS Score:** 3.7
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
     </details>
   
     ***
   </ul>
   
   </details>
   
   (at-me [in a reply](https://help.sonatype.com/lift) with `help` or `ignore`)

##########
File path: test/plugin/scenarios/guava-cache-scenario/pom.xml
##########
@@ -0,0 +1,77 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to You under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~     http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  ~
+  -->
+<project xmlns="http://maven.apache.org/POM/4.0.0";
+         xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+         xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 
http://maven.apache.org/xsd/maven-4.0.0.xsd";>
+    <modelVersion>4.0.0</modelVersion>
+
+    <groupId>org.apache.skywalking</groupId>
+    <artifactId>guava-cache-scenario</artifactId>
+    <version>5.0.0</version>
+    <packaging>war</packaging>
+
+    <properties>
+        <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
+        <compiler.version>1.8</compiler.version>
+
+
+        <test.framework>guava</test.framework>
+        <test.framework.version>18.0</test.framework.version>
+    </properties>
+
+    <name>skywalking-guava-cache-scenario</name>
+
+    <dependencies>
+        <dependency>
+            <groupId>javax.servlet</groupId>
+            <artifactId>javax.servlet-api</artifactId>
+            <version>3.1.0</version>
+            <scope>provided</scope>
+        </dependency>
+        <dependency>
+            <groupId>org.apache.logging.log4j</groupId>
+            <artifactId>log4j-api</artifactId>
+            <version>2.8.1</version>
+        </dependency>
+        <dependency>

Review comment:
       *Critical OSS Vulnerability:*  &nbsp;
   ### pkg:maven/org.yaml/[email protected]
   1 Critical, 0 Severe, 0 Moderate and 0 Unknown vulnerabilities have been 
found in a transitive dependency of 
pkg:maven/org.apache.logging.log4j/[email protected]
   
   
   
   <!-- Lift_Details -->
   <details>
   <summary><b>CRITICAL Vulnerabilities (1)</b></summary>
   
   <ul>
   
     ***
     > #### [CVE-2017-18640] The Alias feature in SnakeYAML 1.18 allows entity 
expansion during a load operat...
     > The Alias feature in SnakeYAML 1.18 allows entity expansion during a 
load operation, a related issue to CVE-2003-1564.
     >
     > **CVSS Score:** 7.5
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
   
     ***
   </ul>
   
   </details>
   
   (at-me [in a reply](https://help.sonatype.com/lift) with `help` or `ignore`)

##########
File path: apm-sniffer/optional-plugins/guava-cache-plugin/pom.xml
##########
@@ -17,28 +17,34 @@
   ~
   -->
 
-<project xmlns="http://maven.apache.org/POM/4.0.0"; 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+<project xmlns="http://maven.apache.org/POM/4.0.0";
+         xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
          xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 
http://maven.apache.org/xsd/maven-4.0.0.xsd";>
     <parent>
         <groupId>org.apache.skywalking</groupId>
         <artifactId>optional-plugins</artifactId>
         <version>8.7.0-SNAPSHOT</version>
     </parent>
+
+    <artifactId>guava-cache-plugin</artifactId>
+    <name>guava-cache-plugin</name>
+    <packaging>jar</packaging>
+
     <modelVersion>4.0.0</modelVersion>
 
-    <artifactId>apm-sentinel-1.x-plugin</artifactId>
-    <name>sentinel-1.x-plugin</name>
-    <url>http://maven.apache.org</url>
     <properties>
-        <sentinel-core.version>1.7.2</sentinel-core.version>
+        <guava-client.version>23.0</guava-client.version>
     </properties>
 
     <dependencies>
+
         <dependency>
-            <groupId>com.alibaba.csp</groupId>
-            <artifactId>sentinel-core</artifactId>
-            <version>${sentinel-core.version}</version>
+            <groupId>com.google.guava</groupId>
+            <artifactId>guava</artifactId>
+            <version>${guava-client.version}</version>
             <scope>provided</scope>
         </dependency>
+
     </dependencies>
+

Review comment:
       *Severe OSS Vulnerability:*  &nbsp;
   ### pkg:maven/com.google.guava/[email protected]
   0 Critical, 1 Severe, 1 Moderate and 0 Unknown vulnerabilities have been 
found in a direct dependency 
   
   
   
   <!-- Lift_Details -->
   <details>
   <summary><b>SEVERE Vulnerabilities (1)</b></summary>
   
   <ul>
   
     ***
     <details>
       <summary>CVE-2018-10237</summary>
   
     > #### [CVE-2018-10237]  Deserialization of Untrusted Data
     > Unbounded memory allocation in Google Guava 11.0 through 24.x before 
24.1.1 allows remote attackers to conduct denial of service attacks against 
servers that depend on this library and deserialize attacker-provided data, 
because the AtomicDoubleArray class (when serialized with Java serialization) 
and the CompoundOrdering class (when serialized with GWT serialization) perform 
eager allocation without appropriate checks on what a client has sent and 
whether the data size is reasonable.
     >
     > **CVSS Score:** 5.9
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
     </details>
   
     ***
   </ul>
   
   </details>
   
   <details>
   <summary><b>MODERATE Vulnerabilities (1)</b></summary>
   
   <ul>
   
     ***
     <details>
       <summary>CVE-2020-8908</summary>
   
     > #### [CVE-2020-8908] A temp directory creation vulnerability exists in 
all versions of Guava, allowin...
     > A temp directory creation vulnerability exists in all versions of Guava, 
allowing an attacker with access to the machine to potentially access data in a 
temporary directory created by the Guava API 
com.google.common.io.Files.createTempDir(). By default, on unix-like systems, 
the created directory is world-readable (readable by an attacker with access to 
the system). The method in question has been marked @Deprecated in versions 
30.0 and later and should not be used. For Android developers, we recommend 
choosing a temporary directory API provided by Android, such as 
context.getCacheDir(). For other Java developers, we recommend migrating to the 
Java 7 API java.nio.file.Files.createTempDirectory() which explicitly 
configures permissions of 700, or configuring the Java runtime&#39;s 
java.io.tmpdir system property to point to a location whose permissions are 
appropriately configured.
     >
     > **CVSS Score:** 3.3
     >
     > **CVSS Vector:** CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
     </details>
   
     ***
   </ul>
   
   </details>
   
   (at-me [in a reply](https://help.sonatype.com/lift) with `help` or `ignore`)

##########
File path: test/plugin/scenarios/guava-cache-scenario/pom.xml
##########
@@ -0,0 +1,77 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to You under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~     http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  ~
+  -->
+<project xmlns="http://maven.apache.org/POM/4.0.0";
+         xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+         xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 
http://maven.apache.org/xsd/maven-4.0.0.xsd";>
+    <modelVersion>4.0.0</modelVersion>
+
+    <groupId>org.apache.skywalking</groupId>
+    <artifactId>guava-cache-scenario</artifactId>
+    <version>5.0.0</version>
+    <packaging>war</packaging>
+
+    <properties>
+        <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
+        <compiler.version>1.8</compiler.version>
+
+
+        <test.framework>guava</test.framework>
+        <test.framework.version>18.0</test.framework.version>
+    </properties>
+
+    <name>skywalking-guava-cache-scenario</name>
+
+    <dependencies>
+        <dependency>
+            <groupId>javax.servlet</groupId>
+            <artifactId>javax.servlet-api</artifactId>
+            <version>3.1.0</version>
+            <scope>provided</scope>
+        </dependency>
+        <dependency>
+            <groupId>org.apache.logging.log4j</groupId>
+            <artifactId>log4j-api</artifactId>
+            <version>2.8.1</version>
+        </dependency>
+        <dependency>
+            <groupId>org.apache.logging.log4j</groupId>
+            <artifactId>log4j-core</artifactId>
+            <version>2.8.1</version>
+        </dependency>
+        <dependency>

Review comment:
       *Severe OSS Vulnerability:*  &nbsp;
   ### pkg:maven/com.google.guava/[email protected]
   0 Critical, 1 Severe, 1 Moderate and 0 Unknown vulnerabilities have been 
found in a direct dependency 
   
   
   
   <!-- Lift_Details -->
   <details>
   <summary><b>SEVERE Vulnerabilities (1)</b></summary>
   
   <ul>
   
     ***
     <details>
       <summary>CVE-2018-10237</summary>
   
     > #### [CVE-2018-10237]  Deserialization of Untrusted Data
     > Unbounded memory allocation in Google Guava 11.0 through 24.x before 
24.1.1 allows remote attackers to conduct denial of service attacks against 
servers that depend on this library and deserialize attacker-provided data, 
because the AtomicDoubleArray class (when serialized with Java serialization) 
and the CompoundOrdering class (when serialized with GWT serialization) perform 
eager allocation without appropriate checks on what a client has sent and 
whether the data size is reasonable.
     >
     > **CVSS Score:** 5.9
     >
     > **CVSS Vector:** CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
     </details>
   
     ***
   </ul>
   
   </details>
   
   <details>
   <summary><b>MODERATE Vulnerabilities (1)</b></summary>
   
   <ul>
   
     ***
     <details>
       <summary>CVE-2020-8908</summary>
   
     > #### [CVE-2020-8908] A temp directory creation vulnerability exists in 
all versions of Guava, allowin...
     > A temp directory creation vulnerability exists in all versions of Guava, 
allowing an attacker with access to the machine to potentially access data in a 
temporary directory created by the Guava API 
com.google.common.io.Files.createTempDir(). By default, on unix-like systems, 
the created directory is world-readable (readable by an attacker with access to 
the system). The method in question has been marked @Deprecated in versions 
30.0 and later and should not be used. For Android developers, we recommend 
choosing a temporary directory API provided by Android, such as 
context.getCacheDir(). For other Java developers, we recommend migrating to the 
Java 7 API java.nio.file.Files.createTempDirectory() which explicitly 
configures permissions of 700, or configuring the Java runtime&#39;s 
java.io.tmpdir system property to point to a location whose permissions are 
appropriately configured.
     >
     > **CVSS Score:** 3.3
     >
     > **CVSS Vector:** CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
     </details>
   
     ***
   </ul>
   
   </details>
   
   (at-me [in a reply](https://help.sonatype.com/lift) with `help` or `ignore`)

##########
File path: test/plugin/scenarios/guava-cache-scenario/pom.xml
##########
@@ -0,0 +1,77 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to You under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~     http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  ~
+  -->
+<project xmlns="http://maven.apache.org/POM/4.0.0";
+         xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+         xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 
http://maven.apache.org/xsd/maven-4.0.0.xsd";>
+    <modelVersion>4.0.0</modelVersion>
+
+    <groupId>org.apache.skywalking</groupId>
+    <artifactId>guava-cache-scenario</artifactId>
+    <version>5.0.0</version>
+    <packaging>war</packaging>
+
+    <properties>
+        <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
+        <compiler.version>1.8</compiler.version>
+
+
+        <test.framework>guava</test.framework>
+        <test.framework.version>18.0</test.framework.version>
+    </properties>
+
+    <name>skywalking-guava-cache-scenario</name>
+
+    <dependencies>
+        <dependency>
+            <groupId>javax.servlet</groupId>
+            <artifactId>javax.servlet-api</artifactId>
+            <version>3.1.0</version>
+            <scope>provided</scope>
+        </dependency>
+        <dependency>
+            <groupId>org.apache.logging.log4j</groupId>
+            <artifactId>log4j-api</artifactId>
+            <version>2.8.1</version>
+        </dependency>
+        <dependency>

Review comment:
       *Severe OSS Vulnerability:*  &nbsp;
   ### pkg:maven/org.apache.commons/[email protected]
   0 Critical, 2 Severe, 0 Moderate and 0 Unknown vulnerabilities have been 
found in a transitive dependency of 
pkg:maven/org.apache.logging.log4j/[email protected]
   
   
   
   <!-- Lift_Details -->
   <details>
   <summary><b>SEVERE Vulnerabilities (2)</b></summary>
   
   <ul>
   
     ***
     <details>
       <summary>CVE-2018-11771</summary>
   
     > #### [CVE-2018-11771]  Resource Management Errors
     > When reading a specially crafted ZIP archive, the read method of Apache 
Commons Compress 1.7 to 1.17&#39;s ZipArchiveInputStream can fail to return the 
correct EOF indication after the end of the stream has been reached. When 
combined with a java.io.InputStreamReader this can lead to an infinite stream, 
which can be used to mount a denial of service attack against services that use 
Compress&#39; zip package.
     >
     > **CVSS Score:** 5.5
     >
     > **CVSS Vector:** CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
     </details>
   
     ***
     <details>
       <summary>CVE-2018-1324</summary>
   
     > #### [CVE-2018-1324]  Resource Management Errors
     > A specially crafted ZIP archive can be used to cause an infinite loop 
inside of Apache Commons Compress&#39; extra field parser used by the ZipFile 
and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to 
mount a denial of service attack against services that use Compress&#39; zip 
package.
     >
     > **CVSS Score:** 5.5
     >
     > **CVSS Vector:** CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
     </details>
   
     ***
   </ul>
   
   </details>
   
   (at-me [in a reply](https://help.sonatype.com/lift) with `help` or `ignore`)




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to