-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerabilities in dependencies #70
Comments
On the welcome page CVE, this project does not use WebMVC (it uses Webflux) or the Spring Boot welcome page support. On the spring-web CVE, we are not using HTTP invoker. See spring-projects/spring-framework#24434 for more details. There is no direct usage of SnakeYAML in prometheus-rsocket-proxy code, so the usage is only what Spring Boot supports. I will defer to their answer on this as captured in comments in spring-projects/spring-boot#33457. To summarize, SnakeYAML is only being used by Spring Boot in prometheus-rsocket-proxy to load I do wish security scanners were better at detecting vulnerability beyond a simple check whether an artifact is present or not. Let me know if the above does not address all of the concerns. |
Hi again! Thank you for your prompt reply :)
We share the same feeling... but unfortunately, at the moment, one still needs to assess this with developers.
Yes, that was neat! Thanks again 😁 |
Apologies if this should be on a new issue altogether but seeing as it relates to new CVEs affecting
@jonatan-ivanov Could you confirm if the proxy is affected by these vulns and share any update plans to address them if necessary? Thanks in advance! |
@jonatan-ivanov I notice that snappy-java 1.1.10.1 fixes the CVEs |
@FraPazGal this is a closed issue, should this either be re-opened or a new issue created for those CVEs? |
@FraPazGal Thanks for the heads-up! We are already using the fixed versions on
I don't think this is a good idea: The previous report did not need any actions (the issue is still invalid) so we closed the issue. This is clearly a new one and it does need actions (and the opened issue would be valid). What should we do when we fix this? Close this unrelated issue again? :) What should we do with the Also, if you open a new issue, it will ask you to read the security policy.
I'm not sure I get this, what kind of impact assessment are you looking for?
I can confirm that these versions of these dependencies are in the proxy but exploitability is a different question I think since for that an attacker need to hijack the connection and inject their own payload or the user need to connect to untrusted sources. @corneil Yepp, we are using it on |
fyi: 1.5.2 is out with the upgraded dependencies. |
Hi! I have recently downloaded the latest release of Prometheus-Rsocket-Proxy (1.5.1) and analysed it with Trivy (a security and vulnerability scanner). The result shows several vulnerabilities:
Do you have any information/statement about these CVEs related to your product? Is your software actually affected by them? If so, are you planning to address these vulnerabilities in an upcoming release?
Thanks in advance!
The text was updated successfully, but these errors were encountered: