-
Notifications
You must be signed in to change notification settings - Fork 645
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Jackson Databind vulnerability #793
Comments
I investigated the status of Jackson dependency in each connector. The summary is as follows: elasticsearchUpgraded in #804 kinesis, s3, sns, sqs, awslambda, dynamodbJackson dependency in these connectors are comming from aws-sdk-java. I sent a pull request to aws-sdk-java to upgrade Jackson: aws/aws-sdk-java#1480 However aws-sdk-java have to support Java 6 and some of fixes for Jackson vulnerabilities have not been backported to Jackson 2.6.x which is for Java 6. Hence, we might have to overwrite Jackson dependency in Alpakka side. azure-storage-queueSame as aws-sdk-java in the point of Java 6 support. I created an issue instead of sending a pull request: Azure/azure-storage-java#264 geodeJackson was upgraded in develop branch recently: apache/geode@c076bef#diff-1fa89afcc2bb350e76df4a548d82c912R46 orientdbI sent a pull request to orientdb repository: orientechnologies/orientdb#8118 Note: orientdb has dependency to blueprints and blueprints has a dependency to old version of Jackson. But I guess it will be evicted by the latest version of Jackson if above pull request is merged. |
Great investigation work @takezoe ! Thank you. |
Since the vulnerability (all cves listed rely on one main mechanism) is not widely understood (although reports do usually explain the general idea), I wrote: and from that one suggestion I would make is to ensure that Default Typing is not enabled by default. It is not enabled by default for new I realize that many automated CVE/vulnerability checkers only have binary yes/no condition based on versions (which is unfortunate) so version upgrades are often necessary just to be safe. |
Status updated: kinesis, s3, sns, sqs, awslambda, dynamodbPull request has been rejected to keep Java 6 support, but aws-sdk-java-v2 seems to use newer version of Jackson. Maybe we should switch to that (in the future). Upgrading to AWS SDK2 has been discussed in #372. orientdbPull request has been merged. We can wait for the next release. |
@cowtowncoder I think possibility of being actually affected by Jackson's vulnerabilities is not so high in Alpakka (and a lot of other Java softwares). However I also think upgrading dependent libraries is a good habit bascally. In particular, foundation libraries have a possibility to make a large impact because they are used from a lot of other softwares. |
@takezoe yes absolutely upgrade makes sense, I fully agree. I just wanted link some more information on sec vuln itself. |
AWS SDK 2.5.20 has upgraded those dependencies to |
With #1777 merged all connectors are on Jackson Databind 2.9.9. |
Closing this for the upcoming release. |
There are a couple of quite serious vulnerabilities (potentially remote code execution) in jackson-databind:
Among the Alpakka modules older versions are pulled in (directly or transitively) by:
I think all these needs to be updated
The text was updated successfully, but these errors were encountered: