-
Notifications
You must be signed in to change notification settings - Fork 66
Open
Description
I need help with security vulnerabilities . We ran scan with Aqua Sec SaaS offering on the latest Image on Docker : https://hub.docker.com/r/jboss/kie-server-showcase/tags?page=1&ordering=last_updated and below are the detailed finding for Security vulnerabilities.
- CVE-2016-2141 : JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors. Installed Resource jgroups 3.6.14.Final.
- CVE-2019-10158 : A flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling. Installed Resource
infinispan-core 9.4.18.Final. - CVE-2018-1000134 : UnboundID LDAP SDK version from commit 801111d8b5c732266a5dbd4b3bb0b6c7b94d7afb up to commit 8471904a02438c03965d21367890276bc25fa5a6, where the issue was reported and fixed contains an Incorrect Access Control vulnerability in process function in SimpleBindRequest class doesn't check for empty password when running in synchronous mode. commit with applied fix pingidentity/ldapsdk@8471904#diff-f6cb23b459be1ec17df1da33760087fd that can result in Ability to impersonate any valid user. This attack appear to be exploitable via Providing valid username and empty password against servers that do not do additional validation as per https://tools.ietf.org/html/rfc4513#section-5.1.1. This vulnerability appears to have been fixed in after commit 8471904a02438c03965d21367890276bc25fa5a6.
Installed Resource
unboundid-ldapsdk 3.2.0
Published by NVD
2018-03-16
4.CVE-2019-20445 : HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header. Installed Resource netty 3.10.6.Final. - CVE-2018-8088 : org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. Installed Resource slf4j-ext 1.7.22.jbossorg-1
- CVE-2017-12629 : Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr. Installed Resourcelucene-core 6.6.1
7.CVE-2019-20444: HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold.".Installed Resource
netty 3.10.6.Final. This applicable to lucene core, lucene-queryparser 6.6.1 and
Any direction to mitigate them or mitigate in next release will be help ful.
Metadata
Metadata
Assignees
Labels
No labels