Uploaded image for project: 'Beam'
  1. Beam
  2. BEAM-12679

Critical issues are being pulled in by 2 of Beams dependencies

    XMLWordPrintableJSON

    Details

    • Type: Bug
    • Status: Resolved
    • Priority: P2
    • Resolution: Fixed
    • Affects Version/s: None
    • Fix Version/s: 2.34.0
    • Component/s: dependencies
    • Labels:
      None

      Description

      Vulnerabilities are being detected by scans of images using Twistlock security service.

      Vulnerabilities:
      1. org.apache.logging.log4j_log4j-api version 2.6.2 has 2 vulnerabilities (1 critical)
       
      Main issue description: In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
       
      This issue is fixed in version 2.8.2
       
      2. com.fasterxml.jackson.core_jackson-databind version 2.9.8 has 49 vulnerabilities (14 critical)
       
      Example issue description: A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
       
      All issues resolved in versions starting 2.9.10.4

        Attachments

          Issue Links

            Activity

              People

              • Assignee:
                Unassigned
                Reporter:
                joel.cain Joel Cain
              • Votes:
                0 Vote for this issue
                Watchers:
                4 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved: