opensearch-project / terraform-provider-opensearch

https://registry.terraform.io/providers/opensearch-project/opensearch
Apache License 2.0
75 stars 58 forks source link

github.com/aws/aws-sdk-go-v1.45.24: 1 vulnerabilities (highest severity is: 7.5) - autoclosed #96

Closed mend-for-github-com[bot] closed 1 year ago

mend-for-github-com[bot] commented 1 year ago
Vulnerable Library - github.com/aws/aws-sdk-go-v1.45.24

Found in HEAD commit: 24a1c298b7e63c6f1872f0290e22be5ef64e10f7

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (github.com/aws/aws-sdk-go-v1.45.24 version) Remediation Possible**
CVE-2022-41721 High 7.5 golang.org/x/net-v0.1.0 Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2022-41721 ### Vulnerable Library - golang.org/x/net-v0.1.0

[mirror] Go supplementary network libraries

Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.1.0.zip

Dependency Hierarchy: - github.com/aws/aws-sdk-go-v1.45.24 (Root Library) - :x: **golang.org/x/net-v0.1.0** (Vulnerable Library)

Found in HEAD commit: 24a1c298b7e63c6f1872f0290e22be5ef64e10f7

Found in base branch: main

### Vulnerability Details

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

Publish Date: 2023-01-13

URL: CVE-2022-41721

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2023-01-13

Fix Resolution: v0.2.0

afrodidact commented 1 year ago

I will submit a PR for this shortly.

afrodidact commented 1 year ago

Hi @prudhvigodithi, can this issue be assigned to me, please? AWS has released v1.45.25 of the AWS SDK for Go, and I have a commit ready for review.

prudhvigodithi commented 1 year ago

Hey @afrodidact this already taken care by @rblcoder in the PR https://github.com/opensearch-project/terraform-provider-opensearch/pull/91/files. Thanks

prudhvigodithi commented 1 year ago

Closing this issue as the change https://github.com/opensearch-project/terraform-provider-opensearch/pull/91 is already pushed. Thank you

afrodidact commented 1 year ago

Hi @prudhvigodithi, I believe @rblcoder's PR takes care of issue #78, whereas mine takes care of issue #91.

prudhvigodithi commented 1 year ago

Hey @afrodidact from @rblcoder PR the github.com/aws/aws-sdk-go is already updated to v1.45.24, hence I have closed this issue. Thanks Screenshot 2023-10-12 at 10 51 41 PM

prudhvigodithi commented 1 year ago

@afrodidact do you think this is fixed in v1.45.25 ?

rblcoder commented 1 year ago

@prudhvigodithi @afrodidact I didn't check that the issue is unresolved https://github.com/aws/aws-sdk-go/issues/4738

afrodidact commented 1 year ago

I understand now that this issue will be resolved in the next release after 31st October.

Sorry for the confusion.

mend-for-github-com[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.