You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "XuCongying (Jira)" <ji...@apache.org> on 2020/03/03 09:07:00 UTC

[jira] [Updated] (AMBARI-25490) CVEs in the dependencies are in the execution path of your project

     [ https://issues.apache.org/jira/browse/AMBARI-25490?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

XuCongying updated AMBARI-25490:
--------------------------------
    Attachment: apache-ambari_CVE-report.md

> CVEs in the dependencies are in the execution path of your project
> ------------------------------------------------------------------
>
>                 Key: AMBARI-25490
>                 URL: https://issues.apache.org/jira/browse/AMBARI-25490
>             Project: Ambari
>          Issue Type: Bug
>            Reporter: XuCongying
>            Priority: Major
>         Attachments: apache-ambari_CVE-report.md
>
>
> Hello, Your project uses some dependencies with CVEs. I found that the buggy methods of the CVEs are in the program execution path of your project, which makes your project at risk. I have suggested some version updates. Here is the details:
>  # *Vulnerable Dependency:* org.apache.hadoop : hadoop-common : 2.7.2
>  * *Call Chain to Buggy Methods:*
>  ** *Some files in your project call the library method org.apache.hadoop.util.ToolRunner.run(org.apache.hadoop.conf.Configuration,org.apache.hadoop.util.Tool,java.lang.String[]), which can reach the buggy method of [CVE-2017-15713|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15713].*
>  *** Files in your project:  ambari-server/src/main/java/org/apache/ambari/server/credentialapi/CredentialUtil.java
>  *** One of the possible call chain:
> org.apache.hadoop.util.ToolRunner.run(org.apache.hadoop.conf.Configuration,org.apache.hadoop.util.Tool,java.lang.String[])
> org.apache.hadoop.util.GenericOptionsParser.<init>(org.apache.hadoop.conf.Configuration,java.lang.String[])
> org.apache.hadoop.util.GenericOptionsParser.<init>(org.apache.hadoop.conf.Configuration,org.apache.commons.cli.Options,java.lang.String[])
> org.apache.hadoop.util.GenericOptionsParser.parseGeneralOptions(org.apache.commons.cli.Options,org.apache.hadoop.conf.Configuration,java.lang.String[])
> org.apache.hadoop.util.GenericOptionsParser.processGeneralOptions(org.apache.hadoop.conf.Configuration,org.apache.commons.cli.CommandLine)
> org.apache.hadoop.util.GenericOptionsParser.getLibJars(org.apache.hadoop.conf.Configuration)
> org.apache.hadoop.conf.Configuration.get(java.lang.String)
> org.apache.hadoop.conf.Configuration.substituteVars(java.lang.String) [buggy method]
>  ** *Update suggestion:* version 3.2.1 3.2.1 is a safe version without CVEs. From 2.7.2 to 3.2.1, 3 of the APIs (called by 6 times in your project) were modified.
>  ## *Vulnerable Dependency:* org.apache.hadoop : hadoop-common : 2.2.0
>  ** *Call Chain to Buggy Methods:*
>  *** *Some files in your project call the library method org.apache.hadoop.conf.Configuration.get(java.lang.String), which can reach the buggy method of [CVE-2017-15713|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15713].*
>  **** Files in your project:  contrib/ambari-scom/metrics-sink/src/main/java/org/apache/hadoop/metrics2/sink/SqlSink.java
>  **** One of the possible call chain:
> org.apache.hadoop.conf.Configuration.get(java.lang.String)
> org.apache.hadoop.conf.Configuration.substituteVars(java.lang.String) [buggy method]
>  *** *Update suggestion:* version 3.2.1 3.2.1 is a safe version without CVEs. From 2.2.0 to 3.2.1, 1 of the APIs (called by 2 times in your project) was modified.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)