Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Scanning projects that depend on datahub-client shows an unlikely vulnerability due to an old guava dependency #5134

Closed
markaalvaro opened this issue Jun 9, 2022 · 5 comments
Assignees
Labels
bug Bug report

Comments

@markaalvaro
Copy link

Describe the bug
Scanning projects that depend on datahub leads to an unnecessary guava 15 vulnerability flag. It doesn't seem like the dependency actually depends on it, and this is likely only appearing bc internal pom files for building the client artifact are being published in the artifact itself.

To Reproduce
Steps to reproduce the behavior:

  1. Create a Java project that depends on 'io.acryl:datahub-client:0.8.26'
  2. Scan it with OWASP's dependency checker
  3. View report

Expected behavior
Generally I don't think the pom file in META-INF/maven needs to be published with the jar file, which would probably mitigate this issue.

Screenshots
Scanning my project which depends on the datahub-client leads to this output.

datahub-client-0.8.36.jar/META-INF/maven/com.google.guava/guava/pom.xml (pkg:maven/com.google.guava/[email protected], cpe:2.3:a:google:guava:15.0:*:*:*:*:*:*:*) : CVE-2018-10237, CVE-2020-8908

Desktop (please complete the following information):
Probably not relevant but:

  • OS: macOS Monterey
  • Browser: Although not used
  • Version: io.acryl:datahub-client:0.8.26

Additional context
N/A

@RyanHolstien
Copy link
Collaborator

Thanks for the report @markaalvaro ! This is a transient dependency pulled in from one of our other dependencies. Forced an upgrade in the build to the guava version we use in the rest of the code that does not have the high vulnerability. The second vulnerability is a low category and is not exploitable in DataHub as we do not use the com.google.common.io.Files.createTempDir() utility function nor do our usages of the library which brings it in as a transient dependency.

@markaalvaro
Copy link
Author

Yeah I imagine what I'm seeing flagged isn't actually a concern, since the actual guava version used is much higher than 15. What I'm seeing, though, specifically is the checker flagging a pom file in:

datahub-client-0.8.36.jar/META-INF/maven/com.google.guava/guava/pom.xml

(was using 0.8.26 but updated to 0.8.36 recently)
Is that pom still going to be in the published jar? Does it need to be?

@RyanHolstien
Copy link
Collaborator

I believe the pom files are included as a part of the Shadow gradle plugin we use that specifies which dependencies we are leveraging. The file will be there, but it will show the updated version (27.0.1) and shouldn't trigger the warning.

@markaalvaro
Copy link
Author

Ah ok. Perfect!

@RyanHolstien
Copy link
Collaborator

PR with changes has been merged, closing. Let us know if this doesn't resolve your issue and we can either reopen or open a new one 😄

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Bug report
Projects
None yet
Development

No branches or pull requests

2 participants