streamnative / kop

Kafka-on-Pulsar - A protocol handler that brings native Kafka protocol to Apache Pulsar
https://streamnative.io/docs/kop
Apache License 2.0
447 stars 132 forks source link

[Snyk] Fix for 14 vulnerabilities #2022

Closed BewareMyPower closed 8 months ago

BewareMyPower commented 8 months ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

#### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - pom.xml #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **379/1000**
**Why?** Has a fix available, CVSS 3.3 | Creation of Temporary File in Directory with Insecure Permissions
[SNYK-JAVA-COMGOOGLEGUAVA-5710356](https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **638/1000**
**Why?** Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 4.9 | Resource Exhaustion
[SNYK-JAVA-COMRABBITMQ-6028124](https://snyk.io/vuln/SNYK-JAVA-COMRABBITMQ-6028124) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **616/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.9 | Denial of Service (DoS)
[SNYK-JAVA-COMSQUAREUPOKIO-5773320](https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKIO-5773320) | | No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **616/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 5.9 | Denial of Service (DoS)
[SNYK-JAVA-COMSQUAREUPOKIO-5820002](https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKIO-5820002) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **490/1000**
**Why?** Has a fix available, CVSS 5.3 | Improper Certificate Validation
[SNYK-JAVA-IONETTY-1042268](https://snyk.io/vuln/SNYK-JAVA-IONETTY-1042268) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | No Known Exploit ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **399/1000**
**Why?** Has a fix available, CVSS 3.7 | Improper Input Validation
[SNYK-JAVA-ORGAPACHEAVRO-5926693](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEAVRO-5926693) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **539/1000**
**Why?** Has a fix available, CVSS 6.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGAPACHECOMMONS-1316638](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-1316638) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **539/1000**
**Why?** Has a fix available, CVSS 6.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGAPACHECOMMONS-1316639](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-1316639) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | No Known Exploit ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **539/1000**
**Why?** Has a fix available, CVSS 6.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGAPACHECOMMONS-1316640](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-1316640) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | No Known Exploit ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **589/1000**
**Why?** Has a fix available, CVSS 7.5 | Denial of Service (DoS)
[SNYK-JAVA-ORGAPACHECOMMONS-1316641](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-1316641) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | No Known Exploit ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity") | **486/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 3.3 | Information Exposure
[SNYK-JAVA-ORGJETBRAINSKOTLIN-2393744](https://snyk.io/vuln/SNYK-JAVA-ORGJETBRAINSKOTLIN-2393744) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | Proof of Concept ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **661/1000**
**Why?** Recently disclosed, Has a fix available, CVSS 7.5 | Allocation of Resources Without Limits or Throttling
[SNYK-JAVA-ORGJSON-5962464](https://snyk.io/vuln/SNYK-JAVA-ORGJSON-5962464) | | No | No Known Exploit ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Allocation of Resources Without Limits or Throttling
[SNYK-JAVA-ORGXERIALSNAPPY-5918282](https://snyk.io/vuln/SNYK-JAVA-ORGXERIALSNAPPY-5918282) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | Proof of Concept ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity") | **651/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 6.6 | Arbitrary Code Execution
[SNYK-JAVA-ORGYAML-3152153](https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153) | `io.streamnative:pulsar-broker:`
`3.0.0.1 -> 3.1.0.5`
| No | Proof of Concept (*) Note that the real score may have changed since the PR was raised. #### Vulnerabilities that could not be fixed - Upgrade: - Could not upgrade `io.streamnative.pulsar.handlers:pulsar-kafka-schema-registry@2.11.0-SNAPSHOT` to `io.streamnative.pulsar.handlers:pulsar-kafka-schema-registry@3.1.0.5`; Reason `could not apply upgrade, dependency is managed externally` ; Location: `provenance does not contain location` Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/bewaremypower/project/745a6ec8-e389-42d3-b151-42e0855cc54d?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/bewaremypower/project/745a6ec8-e389-42d3-b151-42e0855cc54d?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"3740bb13-a41f-4ad3-9d6f-e78d101dffe8","prPublicId":"3740bb13-a41f-4ad3-9d6f-e78d101dffe8","dependencies":[{"name":"io.streamnative.pulsar.handlers:pulsar-kafka-schema-registry","from":"2.11.0-SNAPSHOT","to":"3.1.0.5"},{"name":"io.streamnative:pulsar-broker","from":"3.0.0.1","to":"3.1.0.5"}],"packageManager":"maven","projectPublicId":"745a6ec8-e389-42d3-b151-42e0855cc54d","projectUrl":"https://app.snyk.io/org/bewaremypower/project/745a6ec8-e389-42d3-b151-42e0855cc54d?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JAVA-COMGOOGLEGUAVA-5710356","SNYK-JAVA-COMRABBITMQ-6028124","SNYK-JAVA-COMSQUAREUPOKIO-5773320","SNYK-JAVA-COMSQUAREUPOKIO-5820002","SNYK-JAVA-IONETTY-1042268","SNYK-JAVA-ORGAPACHEAVRO-5926693","SNYK-JAVA-ORGAPACHECOMMONS-1316638","SNYK-JAVA-ORGAPACHECOMMONS-1316639","SNYK-JAVA-ORGAPACHECOMMONS-1316640","SNYK-JAVA-ORGAPACHECOMMONS-1316641","SNYK-JAVA-ORGJETBRAINSKOTLIN-2393744","SNYK-JAVA-ORGJSON-5962464","SNYK-JAVA-ORGXERIALSNAPPY-5918282","SNYK-JAVA-ORGYAML-3152153"],"upgrade":["SNYK-JAVA-COMGOOGLEGUAVA-5710356","SNYK-JAVA-COMRABBITMQ-6028124","SNYK-JAVA-COMSQUAREUPOKIO-5773320","SNYK-JAVA-COMSQUAREUPOKIO-5820002","SNYK-JAVA-IONETTY-1042268","SNYK-JAVA-ORGAPACHEAVRO-5926693","SNYK-JAVA-ORGAPACHECOMMONS-1316638","SNYK-JAVA-ORGAPACHECOMMONS-1316639","SNYK-JAVA-ORGAPACHECOMMONS-1316640","SNYK-JAVA-ORGAPACHECOMMONS-1316641","SNYK-JAVA-ORGJETBRAINSKOTLIN-2393744","SNYK-JAVA-ORGJSON-5962464","SNYK-JAVA-ORGXERIALSNAPPY-5918282","SNYK-JAVA-ORGYAML-3152153"],"isBreakingChange":false,"env":"prod","prType":"fix","templateVariants":["priorityScore"],"priorityScoreList":[379,638,616,616,490,399,539,539,539,589,486,661,696,651],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Creation of Temporary File in Directory with Insecure Permissions](https://learn.snyk.io/lesson/insecure-temporary-file/?loc=fix-pr) 🦉 [Resource Exhaustion](https://learn.snyk.io/lesson/redos/?loc=fix-pr) 🦉 [Improper Input Validation](https://learn.snyk.io/lesson/improper-input-validation/?loc=fix-pr) 🦉 [More lessons are available in Snyk Learn](https://learn.snyk.io/?loc=fix-pr)
CLAassistant commented 8 months ago

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

github-actions[bot] commented 8 months ago

@BewareMyPower:Thanks for your contribution. For this PR, do we need to update docs? (The PR template contains info about doc, which helps others know more about the changes. Can you provide doc-related info in this and future PR descriptions? Thanks)