Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This table will be presented to TSC at Code Freeze milestone (M4) to the TSC.

It is recommended to first  first update to the latest version of  of the third party components available. In case the latest third party components still reports some vulnerabilities, you must provide an impact analysis as illustrated in the example below.

In the case where you have nested third party components (a third party component embedding another third party component) and there is is NO CVE number  number for the upstream third party component (meaning the third party component you are embedding), it is recommended to open a vulnerability issue on the upstream third party component.

...

The information related to Repository, Group, Artifact, Version and Problem Code are extracted from the CLM report (see the below screenshot)


Repository

Group

Impact Analysis

Action

  • aai/
model-loader
  • aai/babel
  • aai/sparky-be
  • aai/data-router
  • aai/router-core
  • aai/aai-resources
  • aai/aai-traversal
  • aai/event-client
  • aai/gizmo
    • champ
    org.apache.hadoop

     False positive. The ONAP system only use Janus on Casandra, so the hadoop libraries are never touched

    Image AddedAAI-1887[champ] [security] Hadoop vulnerabilitySUBMITTED

    aai/champ

    • aai/search-data-service
  • aai/aai-common
  • aai/validation
    com.fasterxml.jackson.core

    False Positive.

    The exploit primarily is about enabling polymorphic type handling with the object mapper and writing class specifics into the JSON object.  There are two ways of doing this:


    1. ObjectMapper.enableDefaultTyping()
    2. @JsonTypeInfo for marshalling / unmarshalling an object


    By default the ObjectMapper does not enableDefaultTyping, the

    code base

    search service is not using either approach, so the possibility of the exploit vector does not apply.


    • aai/
    event
    • search-data-
    client
    • service
    com.
    fasterxml
    google.
    jackson.core

    DMaaP client dependency:

    From Dmaap Security/Vulnerability - Beijing: The application is vulnerable by using this component, when default typing is enabled. Message Router do not use the default typing, so using the jackson-databind will not make message router vulnerable

    guavaA dependency of a child dependency, json-schema-validator. Even the latest version of json-schema-validator does not have the required fix version for the above components.
    • aai/search-data-service
    com.googlecode.libphonenumberA dependency of a child dependency, json-schema-validator. Even the latest version of json-schema-validator does not have the required fix version for the above components. AAI is not vulnerable to this issue in the dependency, it does not use the component in the way described.
    • aai/search-data-service

    javax.mail

    A dependency of a child dependency, json-schema-validator. Even the latest version of json-schema-validator does not have the required fix version for the above components. AAI is not vulnerable to this issue in the dependency, it does not use the component in the way described.
    • aai/search-data-service
    org.springframework.security 

    Inherited from spring boot, will be fixed in the Casablanca Maintenance Release. Search data service is not vulnerable to the exploit vectors because it does not perform the functions outlined in the report.

    Image AddedAAI-1895[search-data-service] Update springboot to 1.5.17 in search-data-serviceOPEN

    • aai/resources
    • aai/traversal
    • aai/champ
    • aai/gizmo
    • aai/search-data-service
    • aai/data-router
    • aai/sparky-be
    • aai/graphadmin
    • aai/cacher
    • aai/aai-common
    org.springframeworkWill update in maintenance release when upgrading to latest spring boot. False positive. AAI is not serving static resources through the ResourceHttpRequestHandler.

    Image AddedAAI-1888Security: Springboot 1.5.15 has new nexusIQ critical exceptionsOPEN

    • aai/resources
    • aai/traversal
    • aai/champ
    • aai/gizmo
    • aai/search-data-service
    • aai/data-router
    • aai/sparky-be
    • aai/graphadmin
    • aai/cacher

    org.apache.tomcat.embed

    AAI is not vulnerable because tomcat is not used in these repos, jetty is the application server. This is a child dependency of springframework, JIRA ticket in next column will address it for the Casablanca Maintenance Release by updating to the latest spring boot.

    Image AddedAAI-1888Security: Springboot 1.5.15 has new nexusIQ critical exceptionsOPEN

    • aai/model-loader
    • aai/babel
    • aai/sparky-be
    • aai/data-router
    • aai/aai-resources
    • aai/aai-traversal
    • aai/event-client
    • aai/gizmo
    • aai/champ
    • aai/validation
    com.fasterxml.jackson.core
    • aai/aai-resouces
    • aai/aai-traversal
    • aai/champ
    • aai/aai-common
    org.codehaus.jackson

    False Positive.

    The exploit primarily is about enabling polymorphic type handling with the object mapper and writing class specifics into the JSON object.  There are two ways of doing this:


    1. ObjectMapper.enableDefaultTyping()
    2. @JsonTypeInfo for marshalling / unmarshalling an object


    By default the ObjectMapper does not enableDefaultTyping, the

    resources

    code

    bases are

    base is not using either approach, so the possibility of the exploit vector does not apply.


    • aai/event-client
    com.fasterxml.jackson.core

    DMaaP client dependency: 

    [INFO] +- org.onap.dmaap.messagerouter.dmaapclient:dmaapClient:jar:1.1.5:compile
    [INFO] |  +- com.fasterxml.jackson.core:jackson-core:jar:2.8.11:compile
    [INFO] |  +- com.fasterxml.jackson.core:jackson-databind:jar:2.8.11.1:compile

    From Dmaap Security/Vulnerability - Beijing: The application is vulnerable by using this component, when default typing is enabled. Message Router do not use the default typing, so using the jackson-databind will not make message router vulnerable



    • aai/event-client
    com.rabbitmq

    False positive. Event client in ONAP only uses DMaaP so the rabbitmq dependencies are never used.

    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI-1905

    • aai/esr-server
    com.fasterxml.jackson.core

    False Positive

    Explanation:

    This vulnerability issue only exists if com.fasterxml.jackson.databind.ObjectMapper.setDefaultTyping() is called before it is used for deserialization.

    esr-server doesn't invoke this method, esr-server use new Gson().fromJson(String json, Obj.class)

    and new

    and new Gson().toJson(obj)

    to deserialization

    to deserialization and serialization.

    https://github.com/FasterXML/jackson-docs/wiki/JacksonPolymorphicDeserialization

    In esr-server, Gson is used to deserialization and serialization:

    https://gerrit.onap.org/r/gitweb?p=aai/esr-server.git;a=blob;f=esr-mgr/src/main/java/org/onap/aai/esr/wrapper/EmsManagerWrapper.java;h=588baad96c7942e83e0670784bbf423505c7b194;hb=HEAD

    https://gerrit.onap.org/r/gitweb?p=aai/esr-server.git;a=blob;f=esr-mgr/src/main/java/org/onap/aai/esr/wrapper/ThirdpartySdncWrapper.java;h=874205920c156f12df0bc591638a24e3f5575c76;hb=HEAD

    https://gerrit.onap.org/r/gitweb?p=aai/esr-server.git;a=blob;f=esr-mgr/src/main/java/org/onap/aai/esr/wrapper/VimManagerWrapper.java;h=fe44536cecb3f9ae9eaa3d99ff7b2d52511e2d52;hb=HEAD

    https://gerrit.onap.org/r/gitweb?p=aai/esr-server.git;a=blob;f=esr-mgr/src/main/java/org/onap/aai/esr/wrapper/VnfmManagerWrapper.java;h=8c7c5d39ceadff5e17f9c6d26d5540be49ada070;hb=HEAD

    https://gerrit.onap.org/r/gitweb?p=aai/esr-server.git;a=blob;f=esr-mgr/src/main/java/org/onap/aai/esr/util/ExtsysUtil.java;h=3bd01772356055e9711705b8518d55f1678b5179;hb=HEAD


    • aai/
    champ
    • esr-server
     com.smoketurner.dropwizard
    commons-httpclient

    False

    positive. This is imported by hadoop which is used for hbase configs; in Beijing, AAI is configured with Janus on cassandra so it will not be accessing these classes. In Casablanca, Champ will serve as a multi-purpose data broker so we will look to upgrade the hadoop libraries to the most current versions.aai/search-data-servicecom.google.guava

    A dependency of a child dependency, json-schema-validator. Even the latest version of json-schema-validator does not have the required fix version for the above components.

    aai/search-data-servicecode.libphonumberA dependency of a child dependency, json-schema-validator. Even the latest version of json-schema-validator does not have the required fix version for the above components.aai/search-data-service

    javax.mail

    A dependency of a child dependency, json-schema-validator. Even the latest version of json-schema-validator does not have the required fix version for the above components.

    aai/data-router

    org.apache.cxf

    This artifact is a child dependency for data-router which comes from camel-cxf:2.22.1, and 2.22.1 is the latest version available for camel-cxf.

    • aai/aai-common
    • aai/traversal
    • aai/graphadmin
    org.codehaus.groovyThis dependency is a child dependency of org.apache.tinkerpop:gremlin-groovy which is required for traversals. We tried a later version but it is not compatible with the graphdb.
    • aai/aai-common
    • aai/resources
    • aai/traversal
    • aai/graphadmin
    com.google.guavaThis dependency is a child dependency of Cassandra which is required for the graphdb; newer versions of Cassandra do not upgrade to a non-vulnerable version of this depedency.

    aai/aai-resources

    aai/cacher

    aai/aai-common

    org.apache.activemqThis vulnerability is dependent on XalanXPathEvaluator.java using an insecure or absent document parser. AAI does not use this function, so it does not apply to AAIaai/esr-server com.smoketurner.dropwizard

    Can the security team show the AAI/ESR team how this component is showing up the dependencies? If you look at the dependency tree it's not called out, so we are not sure how to proceed: https://jenkins.onap.org/job/aai-esr-server-maven-clm-master/12/consoleFull

    From Pawel: "as it is related to - jackson-databind is vulnerable to Remote Code Execution (RCE). Please simply add this line into your analysis."

    Positive.

    The exploit primarily is about enabling polymorphic type handling with the object mapper and writing class specifics into the JSON object.  There are two ways of doing this:


    1. ObjectMapper.enableDefaultTyping()
    2. @JsonTypeInfo for marshalling / unmarshalling an object


    By default the ObjectMapper does not enableDefaultTyping, the code base is not using either approach, so the possibility of the exploit vector does not apply.


    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI-1970

    • aai/esr-server
    com.smoketurner.dropwizard

    Bo Lv (ESR SME) please comment if ear-server is vulnerable to CVE-2018-110987 (rabbitmq)


    • aai/esr-gui
    org.apache.tomcat

    ESR GUI is vulnerable. Implementors should secure the system to prevent exploits.

    We will replace tomcat in the Casablanca Maintenance Release with a version that is not vulnerable.

    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI-1967

    • aai/esr-gui
    jquery

    ESR GUI is vulnerable. Implementors should secure the system to prevent exploits.

    We will replace jquery in the Casablanca Maintenance Release with a version that is not vulnerable.

    aai/champorg.apache.hadoop

    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI-

    1887 False positive. The ONAP system only use Janus on Casandra, so the hadoop libraries are never touched.
    • aai/resources
    • aai/traversal
    • aai/champ
    • aai/gizmo
    • aai/search-data-service
    • aai/data-router
    • aai/sparky-be
    • aai/graphadmin
    • aai/cacher

    1968

    • aai/esr-gui
    bootstrap

    ESR GUI is vulnerable. Implementors should secure the system to prevent exploits.

    We will replace bootstrap in the Casablanca Maintenance Release with a version that is not vulnerable.

    org.springframework.boot (child dependency has tomcat embed)

    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI-

    1888 AAI is not vulnerable because tomcat is not used.

    1969

    • aai/
    aai-commonorg.spring-web
    • data-router

    com.att.aft

    Update to 3.1.200-oss for Casablanca Maintenance Release. data-router does not the hazel cast component so we are not vulnerable in the meantime.

    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI-

    1900Will update in maintenance release. False positive. AAI is not serving static resources through the ResourceHttpRequestHandler,aai/spike

    1938

    • aai/champ
    com.fasterxml.jackson.core

    False Positive.

    The exploit primarily is about enabling polymorphic type handling with the object mapper and writing class specifics into the JSON object.  There are two ways of doing this:


    1. ObjectMapper.enableDefaultTyping()
    2. @JsonTypeInfo for marshalling / unmarshalling an object


    By default the ObjectMapper does not enableDefaultTyping, the code base is not using either approach, so the possibility of the exploit vector does not apply.


    • aai/champ
    org.codehaus.jackson

    False Positive.

    The exploit primarily is about enabling polymorphic type handling with the object mapper and writing class specifics into the JSON object.  There are two ways of doing this:


    1. ObjectMapper.enableDefaultTyping()
    2. @JsonTypeInfo for marshalling / unmarshalling an object


    By default the ObjectMapper does not enableDefaultTyping, the resources code bases are not using either approach, so the possibility of the exploit vector does not apply.



    • aai/champ
    commons-httpclient

    False positive. This is imported by hadoop which is used for hbase configs; in Beijing, AAI is configured with Janus on cassandra so it will not be accessing these classes. In Casablanca, Champ will serve as a multi-purpose data broker so we will look to upgrade the hadoop libraries to the most current versions.




    • aai/cacher
    org.apache.activemq

    Will update in Casablanca Maintenance Release.

    Issue is a false positive.

    This vulnerability is dependent on XalanXPathEvaluator.java using an insecure or absent document parser. AAI is not using this class.

    org.spring-web

    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI-

    1902Will update in maintenance release. False postiive. Spike does not use an annotated controller to return an org.springframework.core.io.Resourceaai/chameleoncommons-fileupload

    1934

    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI-

    1903Chameleon is not official part of the release and not included with the demo.

    1935

    • aai/cacher
    org.apache.activemq

    Will update in Casablanca Maintenance Release.

    Application is vulnerable to the vulnerability, users should secure the system so users cannot snoop network traffic between cacher and the other end of the queue; an old version of aai-common has the import, and cacher should move to the latest, 1.3.2 (see JIRA tickets)

    aai/chameleoncommons-codec


    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI-

    1904Chameleon is not official part of the release and not included with the demo.

    1936

    • aai/aai-resources
    • aai/aai-traversal
    • aai/
    event-client
    • aai-common
    org.apache.activemq

    Will update in Casablanca Maintenance Release.

    Issue is a false positive. 

    This vulnerability is dependent on XalanXPathEvaluator.java using an insecure or absent document parser. AAI is not using this class.

    com.rabbitmq

    Jira
    serverONAP JIRA
    columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
    serverId425b2b0a-557c-3c0c-b515-579789cceedb
    keyAAI

    -1905False positive. Event client in ONAP only uses DMaaP so the rabbitmq dependencies are never used

    -1931

    • aai/aai-resouces
    • aai/aai-traversal
    • aai/champ
    org.codehaus.jackson

    False Positive.

    The exploit primarily is about enabling polymorphic type handling with the object mapper and writing class specifics into the JSON object.  There are two ways of doing this:


    1. ObjectMapper.enableDefaultTyping()
    2. @JsonTypeInfo for marshalling / unmarshalling an object


    By default the ObjectMapper does not enableDefaultTyping, the resources code bases are not using either approach, so the possibility of the exploit vector does not apply.



    • aai/aai-esr-gui
    org.webjars.npm bootstrapFalse positive. The data-target attribute in bootstrap.js interprets encoded HTML entities as standard HTML entities when data-target is based on user supplied input. data-target attribute is not usedHelpdesk ticket 54851
    • aai/aai-esr-gui
    org.webjars.npm bootstrapFalse positive. The show()function in the tooltip.js file allows HTML and scripts in the data-container tooltip attribute values in the DOM elements without proper sanitization. The show() function is not used
    • aai/aai-common
    • aai/resources
    • aai/traversal
    • aai/graphadmin
    com.google.guavaThis dependency is a child dependency of Cassandra which is required for the graphdb; newer versions of Cassandra do not upgrade to a non-vulnerable version of this depedency. Guava is vulnerable to Denial of Service (DoS) when untrusted input is supplied to the AtomicDoubleArray and CompoundOrdering classes - AAI doesn't depend on guava to do this anywhere. Non-vulnerable versions of guava are not backward compatible with the version used by Cassandra
    • aai/aai-common
    com.fasterxml.jackson.core

    False Positive.

    The exploit primarily is about enabling polymorphic type handling with the object mapper and writing class specifics into the JSON object.  There are two ways of doing this:


    1. ObjectMapper.enableDefaultTyping()
    2. @JsonTypeInfo for marshalling / unmarshalling an object


    By default the ObjectMapper does not enableDefaultTyping, the code base is not using either approach, so the possibility of the exploit vector does not apply.


    • aai/aai-common
    org.codehaus.jackson

    False Positive.

    The exploit primarily is about enabling polymorphic type handling with the object mapper and writing class specifics into the JSON object.  There are two ways of doing this:


    1. ObjectMapper.enableDefaultTyping()
    2. @JsonTypeInfo for marshalling / unmarshalling an object


    By default the ObjectMapper does not enableDefaultTyping, the code base is not using either approach, so the possibility of the exploit vector does not apply.