Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 7 vulnerabilities (highest severity is: 9.3) #4

Open
dev-mend-for-github.aaakk.us.kg bot opened this issue Dec 11, 2023 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend

Comments

@dev-mend-for-github.aaakk.us.kg
Copy link

dev-mend-for-github.aaakk.us.kg bot commented Dec 11, 2023

Vulnerable Library - nifi-hive3-processors-2.0.0-SNAPSHOT.jar

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (nifi-hive3-processors version) Remediation Possible**
CVE-2019-20444 Critical 9.3 netty-3.10.6.Final.jar Transitive N/A*
CVE-2022-3509 High 8.7 protobuf-java-2.5.0.jar Transitive N/A*
CVE-2021-22569 High 8.7 protobuf-java-2.5.0.jar Transitive N/A*
CVE-2018-1320 High 8.7 libthrift-0.9.3.jar Transitive N/A*
CVE-2018-10237 High 8.2 guava-19.0.jar Transitive N/A*
CVE-2022-3171 Medium 5.3 protobuf-java-2.5.0.jar Transitive N/A*
CVE-2020-8908 Medium 4.8 guava-19.0.jar Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2019-20444

Vulnerable Library - netty-3.10.6.Final.jar

The Netty project is an effort to provide an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

Library home page: http://netty.io/

Dependency Hierarchy:

  • nifi-hive3-processors-2.0.0-SNAPSHOT.jar (Root Library)
    • hive-jdbc-3.1.3.jar
      • hive-service-3.1.3.jar
        • hive-llap-server-3.1.3.jar
          • netty-3.10.6.Final.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."

Publish Date: 2020-01-29

URL: CVE-2019-20444

CVSS 4 Score Details (9.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444

Release Date: 2020-01-29

Fix Resolution: io.netty:netty-all:4.1.44.Final

CVE-2022-3509

Vulnerable Library - protobuf-java-2.5.0.jar

Protocol Buffers are a way of encoding structured data in an efficient yet extensible format.

Library home page: http://code.google.com/p/protobuf

Path to dependency file: /nifi-nar-bundles/nifi-hive-bundle/nifi-hive-test-utils/pom.xml

Path to vulnerable library: /nifi-nar-bundles/nifi-hive-bundle/nifi-hive-test-utils/pom.xml,/nifi-nar-bundles/nifi-ranger-bundle/nifi-ranger-resources/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-nar/pom.xml,/nifi-nar-bundles/nifi-standard-services/nifi-hbase_2-client-service-bundle/nifi-hbase_2-client-service/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-common/pom.xml,/nifi-nar-bundles/nifi-ranger-bundle/nifi-ranger-nar/pom.xml,/nifi-nar-bundles/nifi-ranger-bundle/nifi-ranger-plugin/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-processors-nar/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-processors/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-processors/pom.xml,/nifi-nar-bundles/nifi-atlas-bundle/nifi-atlas-nar/pom.xml,/nifi-nar-bundles/nifi-atlas-bundle/nifi-atlas-reporting-task/pom.xml,/nifi-nar-bundles/nifi-hadoop-libraries-bundle/nifi-hadoop-libraries-nar/pom.xml,/nifi-nar-bundles/nifi-standard-services/nifi-hbase_2-client-service-bundle/nifi-hbase_2-client-service-nar/pom.xml

Dependency Hierarchy:

  • nifi-hive3-processors-2.0.0-SNAPSHOT.jar (Root Library)
    • hive-jdbc-3.1.3.jar
      • hive-common-3.1.3.jar
        • hive-shims-3.1.3.jar
          • hive-shims-0.23-3.1.3.jar
            • hadoop-yarn-server-resourcemanager-3.3.6.jar
              • protobuf-java-2.5.0.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

Publish Date: 2022-11-01

URL: CVE-2022-3509

CVSS 4 Score Details (8.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3509

Release Date: 2022-12-12

Fix Resolution: com.google.protobuf:protobuf-java:3.16.3,3.19.6,3.20.3,3.21.7

CVE-2021-22569

Vulnerable Library - protobuf-java-2.5.0.jar

Protocol Buffers are a way of encoding structured data in an efficient yet extensible format.

Library home page: http://code.google.com/p/protobuf

Path to dependency file: /nifi-nar-bundles/nifi-hive-bundle/nifi-hive-test-utils/pom.xml

Path to vulnerable library: /nifi-nar-bundles/nifi-hive-bundle/nifi-hive-test-utils/pom.xml,/nifi-nar-bundles/nifi-ranger-bundle/nifi-ranger-resources/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-nar/pom.xml,/nifi-nar-bundles/nifi-standard-services/nifi-hbase_2-client-service-bundle/nifi-hbase_2-client-service/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-common/pom.xml,/nifi-nar-bundles/nifi-ranger-bundle/nifi-ranger-nar/pom.xml,/nifi-nar-bundles/nifi-ranger-bundle/nifi-ranger-plugin/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-processors-nar/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-processors/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-processors/pom.xml,/nifi-nar-bundles/nifi-atlas-bundle/nifi-atlas-nar/pom.xml,/nifi-nar-bundles/nifi-atlas-bundle/nifi-atlas-reporting-task/pom.xml,/nifi-nar-bundles/nifi-hadoop-libraries-bundle/nifi-hadoop-libraries-nar/pom.xml,/nifi-nar-bundles/nifi-standard-services/nifi-hbase_2-client-service-bundle/nifi-hbase_2-client-service-nar/pom.xml

Dependency Hierarchy:

  • nifi-hive3-processors-2.0.0-SNAPSHOT.jar (Root Library)
    • hive-jdbc-3.1.3.jar
      • hive-common-3.1.3.jar
        • hive-shims-3.1.3.jar
          • hive-shims-0.23-3.1.3.jar
            • hadoop-yarn-server-resourcemanager-3.3.6.jar
              • protobuf-java-2.5.0.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.

Publish Date: 2022-01-07

URL: CVE-2021-22569

CVSS 4 Score Details (8.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-wrvw-hg22-4m67

Release Date: 2022-01-10

Fix Resolution: com.google.protobuf:protobuf-java:3.16.1,3.18.2,3.19.2; com.google.protobuf:protobuf-kotlin:3.18.2,3.19.2; google-protobuf - 3.19.2

CVE-2018-1320

Vulnerable Library - libthrift-0.9.3.jar

Thrift is a software framework for scalable cross-language services development.

Library home page: http://thrift.apache.org

Path to dependency file: /nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-processors/pom.xml

Path to vulnerable library: /nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-processors/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive-test-utils/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-processors/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-processors-nar/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-nar/pom.xml

Dependency Hierarchy:

  • nifi-hive3-processors-2.0.0-SNAPSHOT.jar (Root Library)
    • hive-jdbc-3.1.3.jar
      • hive-common-3.1.3.jar
        • hive-shims-3.1.3.jar
          • hive-shims-common-3.1.3.jar
            • libthrift-0.9.3.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.

Publish Date: 2019-01-07

URL: CVE-2018-1320

CVSS 4 Score Details (8.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1320

Release Date: 2019-01-07

Fix Resolution: 0.12.0

CVE-2018-10237

Vulnerable Library - guava-19.0.jar

Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.

Guava has only one code dependency - javax.annotation,
per the JSR-305 spec.</p>

Library home page: https://github.com/google/guava

Path to dependency file: /nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-services-api-nar/pom.xml

Path to vulnerable library: /nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-services-api-nar/pom.xml,/nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-services-nar/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-processors/pom.xml,/nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-services-api/pom.xml,/nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-distributedmapcache-service/pom.xml,/nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-nar/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-nar/pom.xml

Dependency Hierarchy:

  • nifi-hive3-processors-2.0.0-SNAPSHOT.jar (Root Library)
    • hive-jdbc-3.1.3.jar
      • hive-common-3.1.3.jar
        • hive-shims-3.1.3.jar
          • hive-shims-common-3.1.3.jar
            • guava-19.0.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable.

Publish Date: 2018-04-26

URL: CVE-2018-10237

CVSS 4 Score Details (8.2)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-10237

Release Date: 2018-04-26

Fix Resolution: 24.1.1-jre, 24.1.1-android

CVE-2022-3171

Vulnerable Library - protobuf-java-2.5.0.jar

Protocol Buffers are a way of encoding structured data in an efficient yet extensible format.

Library home page: http://code.google.com/p/protobuf

Path to dependency file: /nifi-nar-bundles/nifi-hive-bundle/nifi-hive-test-utils/pom.xml

Path to vulnerable library: /nifi-nar-bundles/nifi-hive-bundle/nifi-hive-test-utils/pom.xml,/nifi-nar-bundles/nifi-ranger-bundle/nifi-ranger-resources/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-nar/pom.xml,/nifi-nar-bundles/nifi-standard-services/nifi-hbase_2-client-service-bundle/nifi-hbase_2-client-service/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-common/pom.xml,/nifi-nar-bundles/nifi-ranger-bundle/nifi-ranger-nar/pom.xml,/nifi-nar-bundles/nifi-ranger-bundle/nifi-ranger-plugin/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-processors-nar/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-processors/pom.xml,/nifi-nar-bundles/nifi-iceberg-bundle/nifi-iceberg-processors/pom.xml,/nifi-nar-bundles/nifi-atlas-bundle/nifi-atlas-nar/pom.xml,/nifi-nar-bundles/nifi-atlas-bundle/nifi-atlas-reporting-task/pom.xml,/nifi-nar-bundles/nifi-hadoop-libraries-bundle/nifi-hadoop-libraries-nar/pom.xml,/nifi-nar-bundles/nifi-standard-services/nifi-hbase_2-client-service-bundle/nifi-hbase_2-client-service-nar/pom.xml

Dependency Hierarchy:

  • nifi-hive3-processors-2.0.0-SNAPSHOT.jar (Root Library)
    • hive-jdbc-3.1.3.jar
      • hive-common-3.1.3.jar
        • hive-shims-3.1.3.jar
          • hive-shims-0.23-3.1.3.jar
            • hadoop-yarn-server-resourcemanager-3.3.6.jar
              • protobuf-java-2.5.0.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

Publish Date: 2022-10-12

URL: CVE-2022-3171

CVSS 4 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Adjacent
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-h4h5-3hr4-j3g2

Release Date: 2022-10-12

Fix Resolution: com.google.protobuf:protobuf-java:3.16.3,3.19.6,3.20.3,3.21.7;com.google.protobuf:protobuf-javalite:3.16.3,3.19.6,3.20.3,3.21.7;com.google.protobuf:protobuf-kotlin:3.19.6,3.20.3,3.21.7;com.google.protobuf:protobuf-kotlin-lite:3.19.6,3.20.3,3.21.7;google-protobuf - 3.19.6,3.20.3,3.21.7

CVE-2020-8908

Vulnerable Library - guava-19.0.jar

Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.

Guava has only one code dependency - javax.annotation,
per the JSR-305 spec.</p>

Library home page: https://github.com/google/guava

Path to dependency file: /nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-services-api-nar/pom.xml

Path to vulnerable library: /nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-services-api-nar/pom.xml,/nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-services-nar/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-processors/pom.xml,/nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-services-api/pom.xml,/nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-distributedmapcache-service/pom.xml,/nifi-nar-bundles/nifi-cassandra-bundle/nifi-cassandra-nar/pom.xml,/nifi-nar-bundles/nifi-hive-bundle/nifi-hive3-nar/pom.xml

Dependency Hierarchy:

  • nifi-hive3-processors-2.0.0-SNAPSHOT.jar (Root Library)
    • hive-jdbc-3.1.3.jar
      • hive-common-3.1.3.jar
        • hive-shims-3.1.3.jar
          • hive-shims-common-3.1.3.jar
            • guava-19.0.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured.

Publish Date: 2020-12-10

URL: CVE-2020-8908

CVSS 4 Score Details (4.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908

Release Date: 2020-12-10

Fix Resolution: v30.0

@dev-mend-for-github.aaakk.us.kg dev-mend-for-github.aaakk.us.kg bot added the Mend: dependency security vulnerability Security vulnerability detected by Mend label Dec 11, 2023
@dev-mend-for-github.aaakk.us.kg dev-mend-for-github.aaakk.us.kg bot changed the title nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 1 vulnerabilities (highest severity is: 9.1) nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 1 vulnerabilities (highest severity is: 9.3) Apr 4, 2024
@dev-mend-for-github.aaakk.us.kg dev-mend-for-github.aaakk.us.kg bot changed the title nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 1 vulnerabilities (highest severity is: 9.3) nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 8 vulnerabilities (highest severity is: 9.3) Jan 12, 2025
@dev-mend-for-github.aaakk.us.kg dev-mend-for-github.aaakk.us.kg bot changed the title nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 8 vulnerabilities (highest severity is: 9.3) nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 7 vulnerabilities (highest severity is: 9.3) Jan 12, 2025
@dev-mend-for-github.aaakk.us.kg dev-mend-for-github.aaakk.us.kg bot changed the title nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 7 vulnerabilities (highest severity is: 9.3) nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 6 vulnerabilities (highest severity is: 9.3) Jan 16, 2025
@dev-mend-for-github.aaakk.us.kg dev-mend-for-github.aaakk.us.kg bot changed the title nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 6 vulnerabilities (highest severity is: 9.3) nifi-hive3-processors-2.0.0-SNAPSHOT.jar: 7 vulnerabilities (highest severity is: 9.3) Jan 20, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend
Projects
None yet
Development

No branches or pull requests

0 participants