This table represents the known exploitable and non-exploitable vulnerabilities in third party packages used in the project.


RepositoryGroupImpact AnalysisAction
sdc-sdc-toscacom.fasterxml.jackson.core

False positive

the lib is part of the sdcTosca parser which is used as a library.

the parser only runs on predefined objects and will not attempt to run on an object that was not validated. the parser is protected by the application using it and the information supplied is coming from the using application.

There is no non-vulnerable version of this component.


No Action in Dublin.

SDC-2262 - Getting issue details... STATUS

sdc-sdc-toscacom.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used in sdc.

No Action in Dublin.

sdc 

catalog

org.apache.lucene

False positive

the dependency is coming from Elastic search.xercesImpl

as such the vulnerability no effecting affecting the application.

There is no non-vulnerable version of this component.

No Action for Dublin

SDC-2265 - Getting issue details... STATUS

sdc

onboarding

io.springfox

the dependency is part of swagger.

we will try to fix it by upgrading the version used.


the vulnerabilities are connected to cross site scripting.


we were not able to identify the location of this issue based on our review the in CLM it is located in :

openecomp-be/tools/swagger-ui/target/api-docs how ever not such thing exist in that swagger jar.

as a mitigation, we will not package the swagger in the release artifact.

SDC-2261 - Getting issue details... STATUS

sdc

catalog + onboarding

org.codehaus.jackson

False positive,

used inside the titan client all operations coming there have passed a set of logic and serialization before coming there. this is not exposed outside to users.

No version with a fix is currently available.

1.9.2 is not directly referenced but comes from Titan DB.


No Action for Dublin



sdc

catalog + onboarding

com.fasterxml.jackson.core

False positive

no version with a fix is currently available.

sdc serialize objects based on existing class only.

No action in Dublin.


sdc

onboarding +

catalog

org.beanshell

False positive

CVE-2016-2510 the vulnerability exposes the application to remote code execution based on serializing objects with exactable code.

all versions have vulnerabilities in them. waiting for a fix in future versions.

sdc does nto use jave serilization for converting objects.



Waiting for a stable release.

SDC-2266 - Getting issue details... STATUS

sdc

catalog
io.netty

False positive

used as part of the automation used in sdc.

comes from the selenium-java dependency.

No action in Dublin

sdc

catalog + onboarding
io.nettySONATYPE-2017-0356: The software does not validate, or incorrectly validates, a certificate.No action in Dublin

SDC-2263 - Getting issue details... STATUS

sdc

catalog + onboarding

commons-beanutils

CVE-2014-0114 expose the application to remote code exaction by manipulating the class loader

all versions have vulnerabilities in them. waiting for a fix in future versions.

the issue is that the class loder can be manipulated to load addition class to execute code. can be mitigated by not allowing access to the machine where sdc is runing.

No action in Dublin.

Update the version of the dependency as soon as security issue fixed.

SDC-2269 - Getting issue details... STATUS

sdc

catalog

org.bouncycastle

False positive

came from selenium-server

this is included and used in an automation project and does not actually deploy as part of SDC.

No action for Dublin.



sdc

catalog

xerces

False positive

came from selenium-java

this is included and used in an automation project and does not actually deploy as part of SDC.

No action for Dublin.


sdc

catalog

org.apache.poi

False positive

Part of the sdctool used for migration and schema creation and is not part of the be logic.

no DOS attack is possible against this.

no newer version is available.

No action in Dublin


the dependency is no longer being actively developed.

we will consider removing this in the future.

SDC-2270 - Getting issue details... STATUS

sdc

catalog

swagger-ui

sdc has two swaggers one for external apis protected by basic authentication.

the second for our internal apis and it is exposed, as


the vulnerability is that the swagger ui is exposed to cross site scripting.


mitigation

we will close access to it in the release until it is handled.

No action for Dublin

changing the use of the swagger requires a major change to the whole annotations we have this will not be done in Dublin.

SDC-2261 - Getting issue details... STATUS

sdc

onboarding + catalog

org.testng

False positive

this is a testing framework used in sdc and is not part of the deployment it is used for automation and unit test execution only.

No action for Dublin

sdc

onboarding + catalog

org.springframework

False positive,

sdc does not serve static pages using spring.

No action for Dublin

sdc

catalog

org.mindrot

indirect referenced from titan and gremlin groovy,

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.


Mitigation,

sdc code does not directly use this. it is used internally in out DB driver. an attacker will find it hard to pass all the sdc logic to get to the driver and try to attack it.

No action for Dublin

sdc

catalog

org.elasticsearch

False positive,

Elastic search Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API.

sdc does not configure secrets using api.

No action for Dublin

Removing elastic in the next release which will fix this issue.

SDC-2267 - Getting issue details... STATUS

sdc

catalog

javax.mail

False positive.

JavaMail is vulnerable to Information Exposure.

the method that causes it is not used in sdc.

No action for Dublin, will be remove next release

sdc

catalog + onboarding

jQuery

False positive.

used as part of sdc automation only not part of the deployed code.

comes from test ng

No action for Dublin

next release we can try to upgrade the testing in the project

sdc

catalog

dom4j

False positive

comes with titan-core, no fix is available.

not used directly in sdc.

will be fixed once sdc moves from titan to jenus graph

SDC does not store xml files in titan and as such this is a none issue as we are not using this capability and are not exposing it.

No action in Dublin.

sdc

catalog

com.jcraft

false positive.

the vulnerability occurs on windows only. sdc is dockrised and uses alpin(linux based os).

No action in Dublin.

sdc

catalog

stipsan/uikit

this is dependency is used by swagger and as such is part of the project.

there is not version without a vulnerability is available.

No action in Dublin.

as a mitigation, we will disable access to the swagger.

SDC-2261 - Getting issue details... STATUS

sdc

catalog + onboarding

com.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used in sdc.

No action in Dublin.

there is a no vulnerable version available will be addressed next release.

sdc

catalog

commons-fileupload

false positive.

came from portal sdk. not used by sdc directly.

in sdc we are not using the uploads file as part of the sdc.

No action in Dublin.

PORTAL-528 - Getting issue details... STATUS

sdc

catalog + onboarding

handlebars

comes with swagger. exposes the application to cross site scripting.

No action in Dublin.

may be fixed by upgrading swagger

SDC-2261 - Getting issue details... STATUS

sdc

catalog

org.apache.ant

comes as part of cglib dependency used in SDC.

the method in question is not directly used in sdc.

As a mitigation, this is part of our tools package this run on deployment and shuts down it is not always available.

No action in Dublin.

sdc

catalog

org.owasp.antisamy

false positive.

came from portal sdk. not used by sdc directly.

both issues are connected to cross site scripting and injections of html sdc does not use portal sdk in a way that can impact us.

No action in Dublin.

PORTAL-542 - Getting issue details... STATUS

sdc

catalog

org.owasp.esapi

False positive.

came from portal sdk. no used in sdc directly.




No action in Dublin.

PORTAL-528 - Getting issue details... STATUS

sdc

catalog

org.seleniumhq.selenium

False positive

used as part of the sdc ui automation. not deployed in production

the vulnerability has no info in it

No action in Dublin.

sdc

catalog + onboarding

handlebars

is part of swagger used by the application.

to mitigate this we will remove access to swagger in the release

No action in Dublin.
sdc-titan-cassandra this repository is used in sdc as a dependency, it was forked from an open source project that is no longer maintained. these issues are not adressed in the repo. we adress them on the consumption of the dependency in sdc.


sdc-titan-cassandraorg.codehaus.jackson

CVE-2017-7525 expose theclienttoexactionofmalicecode by a user.


sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.


No action in Dublin.


move to JenoseGraph in El Alto

sdc-titan-cassandracom.fasterxml.jackson.core

CVE-2017-7525 expose theclienttoexactionofmalicecode by a user.


sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.


No action in Dublin


move to JenoseGraph in El Alto

sdc-titan-cassandracom.fasterxml.jackson.coresdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.

No action in Dublin


move to JenoseGraph in El Alto

sdc-titan-cassandraorg.codehaus.groovy

Falseposotive

CVE-2015-3253 expose the application to DOS attack and exactionofmalicioscodeby passing serialized objects. the client receives specific objects for serialization

sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.

to support geo-redundancy

No action in Dublin.


move to JenoseGraph in El Alto

sdc-titan-cassandracommons-collections

sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.

No action in Dublin.

move to JenoseGraph in El Alto

sdc-titan-cassandrach.qos.logback

False positive,

CVE-2017-5929 sdc-titan-casndra is the driver usedbysdc to communicate with the graph representation stored in Cassandra. the driver used is internal to the application.


No action in Dublin.  


move to JenoseGraph in El Alto

sdc-titan-cassandraorg.hibernate

CVE-2017-7536wenotusesecurity manager and as such is not vulnerable

sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.

No action in Dublin.  


move to JenoseGraph in El Alto

sdc-titan-cassandraio.netty

False positive

CVE-2015-2156 nettyisusedinsidethedbdriverandatestingframeworkthatbothdo not read cookies.

CVE-2016-4970 used for testing and as a driver base as such they are not accepting requests andwillnotbeaffectbydos


sdc-titan-casndraisthe driver usedbysdctocommunicate with the graph representation stored in Cassandra. the driver used is internal to the application.


No action in Dublin.  


move to JenoseGraph in El Alto

sdc-titan-cassandraorg.apache.httpcomponents

False positive

the client used for communication tothedbandthe vulnerability is not applicable.


No action in Dublin.


move to JenoseGraph in El Alto

sdc-titan-cassandracom.google.guavaaddressed on consumption in sdcNo action in Dublin.
sdc-titan-cassandradom4jaddressed on consumption in sdcNo action in Dublin.
sdc-titan-cassandraorg.mindrotaddressed on consumption in sdcNo action in Dublin.
sdc-titan-cassandralibthriftaddressed on consumption in sdc

No action in Dublin;

Move to JenoseGraph in El Alto or:

SDC-2264 - Getting issue details... STATUS

sdc-workflow-designer com.fasterxml.jackson.core

False positive.

No version with a fix is currently available.


work flow json marshaling to object and is not serializing java objects.

as such the vulnerability is not applicable

No Action for Dublin



sdc-workflow-designerorg.codehaus.jackson

False positive.

No version with a fix is currently available.


work flow uses json marshaling to object and is not serializing java objects.

as such the vulnerability is not applicable.

No Action for Dublin
sdc-workflow-designercommons-beanutils

CVE-2014-0114 expose the application to remote code exaction by manipulating the class loader

all versions have vulnerabilities in them. waiting for a fix in future versions.

Update the version of the dependency as soon as security issue fixed.

mitigated

by that you need access to the server class loder to use.

No action in Dublin.

SDC-2269 - Getting issue details... STATUS

sdc-workflow-designercom.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used in workflow.

No action in Dublin.  
sdc-workflow-designerorg.springframework

False positive,

we do not serve static pages using spring

No action in Dublin.  

dcae-ds

while fixing the vulnerabilities an issue was identified in spring boot that does not allow us to upgrade to the latest version.

as such, we had to roll back to the original version and with it, we received back a lot of security issues. as a mitigation, the only option is to disable DCAE_DS in case the user has security concerns regarding its vulnerabilities.

this can be done by changing the helm charts to not start it. this will still allow the user to use sdc but without the monitoring studio.





sdc-dcae-d-ci com.fasterxml.jackson.core

False positive

this is part of the automation and is not deployed.

No action in Dublin.

no version is available that fixes this issue.

sdc-dcae-d-cicom.google.guava

False positive

this is part of the automation and is not deployed.

No action in Dublin.
sdc-dcae-d-dt-be-mainch.qos.logback

False positive,

we do not uselogbackto serialize information received from a socket.

No action in Dublin.
sdc-dcae-d-dt-be-maincom.fasterxml.jackson.core

False positive.

No version with a fix is currently available.


DCAE-DS uses json marshaling to object and is not serializing java objects.

as such the vulnerability is not applicable.

No action in Dublin.

no version is available that fixes this issue.

sdc-dcae-d-dt-be-maincom.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used in sdc.

No action in Dublin.
sdc-dcae-d-dt-be-maincommons-beanutils

CVE-2014-0114 expose the application to remote code exaction by manipulating the class loader

all versions have vulnerabilities in them. waiting for a fix in future versions.

Update the version of the dependency as soon as security issue fixed.

mitigated by that you need access to the server class loader to use.

No action in Dublin.

SDC-2269 - Getting issue details... STATUS

sdc-dcae-d-dt-be-mainorg.apache.tomcat.embed

False Positive

Dcae-ds does not use tomcat it is just part of spring boot.

No action in Dublin.
sdc-dcae-d-dt-be-mainorg.apache.tomcat.embed

False Positive

Dcae-ds does not use tomcat it is just part of spring boot.


No action in Dublin.
sdc-dcae-d-dt-be-mainorg.springframeworkThe spring-core and spring-web modules of Spring Framework are vulnerable to a multipart content pollution vulnerability.No action in Dublin.
sdc-dcae-d-dt-be-mainorg.springframework

False positive,

we do not use spring messaging and as such are not exposed to this issue.

No action in Dublin.
sdc-dcae-d-dt-be-main
org.springframework

CVE-2018-15756: is false positive as we do not use spring to serve static pages.

CVE-2018-11039: Spring Framework is vulnerable to Cross-Site Tracing (XST) attacks

CVE-2018-11040: he configuration causing this is not enabled in the application and as such we are not impacted

No action in Dublin.
sdc-dcae-d-dt-be-main
org.springframework

CVE-2018-11040: the configuration causing this is not enabled in the application and as such we are not impacted

CVE-2018-1271: False positive the issue is vulnerable when service pages from a windows file system. this is not an issue as we are running inside a docker which os is Linux.

No action in Dublin.
sdc-dcae-d-dt-be-propertycom.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used.

No action in Dublin.
sdc-dcae-d-fech.qos.logback

False positive,

we do not use logback to serialize information received from a socket.

No action in Dublin.
sdc-dcae-d-fecom.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overload the

the class which have this vulnerability AtomicDoubleArray CompoundOrdering are not used.

No action in Dublin.
sdc-dcae-d-feorg.eclipse.jetty

this dependency exposes the application to HTTP Request Smuggling.

there is not mitigation available.

the dependency comes with spring boot.

the latest versions include a bug that does not allow us to upgrade this.

No action in Dublin.

SDC-2268 - Getting issue details... STATUS

sdc-dcae-d-feorg.eclipse.jettyThe jetty package is vulnerable to Information Disclosure via InvalidPathException messageNo action in Dublin.
sdc-dcae-d-feorg.springframeworkThe spring-core and spring-web modules of Spring Framework are vulnerable to a multipart content pollution vulnerability.No action in Dublin.
sdc-dcae-d-feorg.springframework

False positive,

we do not use spring messaging and as such are not exposed to this issue.

No action in Dublin.
sdc-dcae-d-feorg.springframework

CVE-2018-15756: is false positive as we do not use spring to serve static pages.

CVE-2018-11039: Spring Framework is vulnerable to Cross-Site Tracing (XST) attacks

CVE-2018-11040: the configuration causing this is not enabled in the application and as such we are not impacted

No action in Dublin.
sdc-dcae-d-feorg.springframework

CVE-2018-11040: the configuration causing this is not enabled in the application and as such we are not impacted

CVE-2018-1271: False positive the issue is vulnerable when service pages from a windows file system. this is not an issue as we are running inside a docker which os is Linux.

No action in Dublin.
sdc-dcae-d-dtangular

angular exposes the application to cross site scripting vulnerability.


there is no fix available in any angular versions.

No action in Dublin.
sdc-dcae-d-dtbootstrap 3.3.4

bootstrap exposes the application to cross site scripting vulnerability.


there is no fix available in any bootstrap versions.

No action in Dublin.
sdc-dcae-d-dtch.qos.logback

False positive,

we do not use logback to serialize information received from a socket.

No action in Dublin.
sdc-dcae-d-dtcom.fasterxml.jackson.core

False positive.

No version with a fix is currently available.


DCAE-DS uses json marshaling to object and is not serializing java objects.

as such the vulnerability is not applicable.

No action in Dublin.
sdc-dcae-d-dtcom.google.guava

false positive.

the guava exposes the application to serialization of objects with out validations. and will be able to overloadthe

the class whichhavethis vulnerability AtomicDoubleArray CompoundOrdering are not used.

No action in Dublin.
sdc-dcae-d-dtjquery

jquery exposes the application to cross-site scripting vulnerability.



No action in Dublin.
sdc-dcae-d-dtorg.eclipse.jetty

this dependency exposes the application to HTTP Request Smuggling.

there is no mitigation available.

the dependency comes with spring boot.

the latest versions include a bug that does not allow us to upgrade this.

No action in Dublin.

SDC-2268 - Getting issue details... STATUS

sdc-dcae-d-dtorg.eclipse.jettyThe jetty package is vulnerable to Information Disclosure via InvalidPathException messageNo action in Dublin.
sdc-dcae-d-dtorg.springframeworkThe spring-core and spring-web modules of Spring Framework are vulnerable to a multipart content pollution vulnerability.No action in Dublin.
sdc-dcae-d-dtorg.springframework

False positive,

we do not use spring messaging and as such are not exposed to this issue.

No action in Dublin.
sdc-dcae-d-dt
org.springframework

CVE-2018-15756: is false positive as we do not use spring to serve static pages.

CVE-2018-11039: Spring Framework is vulnerable to Cross-Site Tracing (XST) attacks

CVE-2018-11040: the configuration causing this is not enabled in the application and as such we are not impacted

No action in Dublin.
sdc-dcae-d-dt
org.springframework

CVE-2018-11040: the configuration causing this is not enabled in the application and as such we are not impacted

CVE-2018-1271: False positive the issue is vulnerable when service pages from a windows file system. this is not an issue as we are running inside a docker which os is Linux.

No action in Dublin.