[
https://issues.apache.org/jira/browse/GEODE-10448?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Alexander Murmann updated GEODE-10448:
--------------------------------------
Labels: needsTriage (was: )
> CVE-2022-42889 Apache Commons Text security vulnerability in Apache Geode
> -------------------------------------------------------------------------
>
> Key: GEODE-10448
> URL: https://issues.apache.org/jira/browse/GEODE-10448
> Project: Geode
> Issue Type: Bug
> Components: pulse, tools
> Affects Versions: 1.15.1
> Reporter: Eli
> Priority: Major
> Labels: needsTriage
>
> I have encountered the security vulnerability
> [CVE-2022-42889|https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om]
> related to Apache Commons Text. It is mentioned that the mitigation is to
> "Upgrade to [Apache Commons Text
> 1.10.0|https://commons.apache.org/proper/commons-text/download_text.cgi]."
> because the following jar files are present.
> <GEODE_HOME>/locator01/GemFire_gemfire/services/http/0.0.0.0_7070_pulse_xxxxxxxx/webapp/WEB-INF/lib/commons-text-1.9.jar
>
> <GEODE_HOME>/locator01/GemFire_root/services/http/0.0.0.0_7070_pulse_xxxxxxxx/webapp/WEB-INF/lib/commons-text-1.9.jar
> The latest official [Apache Geode version
> 1.15.1|[https://apache.org/dyn/closer.cgi/geode/1.15.1/apache-geode-1.15.1.tgz|https://urldefense.com/v3/__https:/apache.org/dyn/closer.cgi/geode/1.15.1/apache-geode-1.15.1.tgz__;!!OrxsNty6D4my!7476fkBhS9dRAajU_LNsgk5KeehflkDwT1rsdOg5_lmW9F-rnt-zPr7K5J66Ylc8jzr9eR10QsOBYlTmJR0Y8tDl8ik$]]
> has the vulnerable file commons-text-1.9.jar, which falls under the affected
> range “version 1.5 and continuing through 1.9”. Inside the folder
> <GEODE_HOME>/tools/Pulse, there is the file geode-pulse-1.15.1.war. Inside
> that war file, there is the file
> geode-pulse-1.15.1.war/WEB-INF/lib/commons-text-1.9.jar.
> As a temporary workaround, I replaced the file commons-text-1.9.jar with
> commons-text-1.10.0.jar, updated the MANIFEST.MF file under
> geode-pulse-1.15.1.war/META-INF, and created a new geode-pulse-1.15.1.war
> file including the 2 updated files mentioned.
> Unfortunately, I’m not a developer. I’m not familiar with Github, so as much
> as I would like to help in contributing in the code, there is a more
> appropriate person to perform the update to commons-text 1.10.0. I have sent
> a mail to ASF Security Team, and I was given this
> [link|[https://github.com/apache/geode/blob/master/build-tools/geode-dependency-management/src/main/groovy/org/apache/geode/gradle/plugins/DependencyConstraints.groovy#L144|https://urldefense.com/v3/__https:/github.com/apache/geode/blob/master/build-tools/geode-dependency-management/src/main/groovy/org/apache/geode/gradle/plugins/DependencyConstraints.groovy*L144__;Iw!!OrxsNty6D4my!6EKoN5DUPbSrn9BPavV5jC0T1h5U4Ih1aqdG5cHGJt2a0fqw2jCVoWL4Nl1lCC4hkzC3buVr9YC30Y_jxCSk43yE-FU$]]
> that shows the dependency on the vulnerable commons-text version 1.9.
> Can somebody assist in fixing this security vulnerability? Thank you in
> advance!
--
This message was sent by Atlassian Jira
(v8.20.10#820010)