keanhankins / ranger

Mirror of Apache Ranger
Apache License 2.0
0 stars 0 forks source link

CVE-2023-1436 (High) detected in jettison-1.3.8.jar, jettison-1.1.jar #415

Open mend-for-github-com[bot] opened 1 year ago

mend-for-github-com[bot] commented 1 year ago

CVE-2023-1436 - High Severity Vulnerability

Vulnerable Libraries - jettison-1.3.8.jar, jettison-1.1.jar

jettison-1.3.8.jar

A StAX implementation for JSON.

Library home page: https://github.com/jettison-json/jettison

Path to dependency file: /ranger-hbase-plugin-shim/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.3.8/jettison-1.3.8.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.3.8/jettison-1.3.8.jar

Dependency Hierarchy: - hbase-server-2.0.2.jar (Root Library) - :x: **jettison-1.3.8.jar** (Vulnerable Library)

jettison-1.1.jar

A StAX implementation for JSON.

Path to dependency file: /ranger-examples/conditions-enrichers/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/canner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/canner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/canner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/20210323191140_BPZOMN/downloadResource_XCVEKW/20210323194224/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar,/home/wss-scanner/.m2/repository/org/codehaus/jettison/jettison/1.1/jettison-1.1.jar

Dependency Hierarchy: - :x: **jettison-1.1.jar** (Vulnerable Library)

Found in HEAD commit: 3d8c1142c5739a45e8e562215c8c83915a44ee6c

Found in base branch: master

Vulnerability Details

An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.

Publish Date: 2023-03-22

URL: CVE-2023-1436

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-q6g2-g7f3-rr83

Release Date: 2023-03-22

Fix Resolution (org.codehaus.jettison:jettison): 1.5.4

Direct dependency fix Resolution (org.apache.hbase:hbase-server): 2.0.3


:rescue_worker_helmet: Automatic Remediation is available for this issue