-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[PDI-19580]-Enable Use of OAUTH for PDI Mail Steps and Entries that use IMAP/SMTP #9423
Conversation
SonarQube Quality Gate Maintainability Rating on New Code (is worse than A) See analysis details on SonarQube Fix issues before they fail your Quality Gate with SonarLint in your IDE. |
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2021-33813 ] jdom:jdom 1.0Description: [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-26336 ] org.apache.poi:poi-scratchpad 4.1.1Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
❌ Build failed in 34m 55sBuild command: mvn clean verify -B -e -Daudit -Djs.no.sandbox -pl \
plugins/email-messages/impl,plugins/email-messages/ui,plugins/mail-job/impl,plugins/mail-job/ui 👌 All tests passed! Tests run: 47, Failures: 0, Skipped: 0 Test Results ℹ️ This is an automatic message |
PDI-19580-Enable Use of OAUTH for PDI Mail Steps and Entries that use IMAP/SMTP