Open popenc opened 2 years ago
Will try to remove log4j from dependencies and see how that goes.
Updated to OPERA v2.8.4 (Python module). Looks like the above CVEs remain. I'm now going through to see where the above libraries are located.
Added removal of (unused) log4j in Docker image. Should be able to use a fresh build and enable OPERAWS on servers again.
This is now running on GDIT/ceam dev server. I'm getting data back from the example API request, although it took a really long time. Also, since the ceam dev server cannot reach CCTE from outside the EPA network, it's not able to get DTXSID and therefore isn't getting data from the DB, so it always runs the model.
log4j resolutions added to dev and epa staging.
NOTE: If operaws CVEs are still being flagged in Prisma via the Gitlab pipeline, this along with bt_api can be deployed on a separate backend server that goes through the routine manual app scans, which do pass.
Prisma scans working again and added them back to the Gitlab pipeline. It looks like updating to v2.9.1 has resolved the log4j vulnerability but all the rest remain.
15 critical, 39 high, 13 medium, and 18 low.
Main offending libraries:
Upgraded to OPERA v2.8, which still throws high to critical level security vulnerabilities when scanning the Docker image with Prisma (cts_kube repo).
Update: new version v2.8.2 is supposed to have security updates. Update to v2.8.2 and test the Prisma scans.