Hi Atlassian-Staff,
We are asked to perform security scanning of pom.xml dependencies with tools like snyk.io and to paste the dependency tree to the DCHELP ticket. But what can I do, when I use the platform-pom and all these dependencies are marked as provided
with no version. Is there a newer platform pom for Jira I can/must use?
The scanner shows basically two problems:
- (1) From
com.atlassian.jira:jira-api@8.8.0
multiple things are vulnerable. But my app wants to support Jira 8.8 as lowest version. How can I solve this and the other Problem? - (2) From
com.google.code.gson:gson@2.2.2-atlassian-1
snyk suggests to upgrade to the vanilla gson. But I thought for OSGi reasons there is a special Atlassian build of gson we have to use. What is the solution here?
Here is the complete scanner result:
Tested 143 dependencies for known issues, found 16 issues, 16 vulnerable paths.
Issues to fix by upgrading:
Upgrade com.google.code.gson:gson@2.2.2-atlassian-1 to com.google.code.gson:gson@2.8.9 to fix
β Deserialization of Untrusted Data [High Severity][https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327] in com.google.code.gson:gson@2.2.2-atlassian-1
introduced by com.google.code.gson:gson@2.2.2-atlassian-1
Issues with no direct upgrade or patch:
β Information Disclosure [Medium Severity][https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415] in com.google.guava:guava@26.0-jre
introduced by com.atlassian.jira:jira-api@8.8.0 > com.google.guava:guava@26.0-jre
This issue was fixed in versions: 30.0-android, 30.0-jre
β Integer Overflow [High Severity][https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-173761] in com.google.protobuf:protobuf-java@3.0.2
introduced by com.atlassian.jira:jira-api@8.8.0 > com.google.javascript:closure-compiler-unshaded@v20181008 > com.google.protobuf:protobuf-java@3.0.2
This issue was fixed in versions: 3.4.0
β Information Exposure [Low Severity][https://snyk.io/vuln/SNYK-JAVA-COMMONSCODEC-561518] in commons-codec:commons-codec@1.9
introduced by com.atlassian.plugins:atlassian-plugins-webresource@4.1.3 > commons-codec:commons-codec@1.9
This issue was fixed in versions: 1.13
β Improper Certificate Validation [Medium Severity][https://snyk.io/vuln/SNYK-JAVA-COMMONSHTTPCLIENT-30083] in commons-httpclient:commons-httpclient@3.1-atlassian-2
introduced by com.atlassian.jira:jira-api@8.8.0 > commons-httpclient:commons-httpclient@3.1-atlassian-2
No upgrade or patch available
β Man-in-the-Middle (MitM) [Medium Severity][https://snyk.io/vuln/SNYK-JAVA-COMMONSHTTPCLIENT-31660] in commons-httpclient:commons-httpclient@3.1-atlassian-2
introduced by com.atlassian.jira:jira-api@8.8.0 > commons-httpclient:commons-httpclient@3.1-atlassian-2
No upgrade or patch available
β Directory Traversal [Medium Severity][https://snyk.io/vuln/SNYK-JAVA-COMMONSIO-1277109] in commons-io:commons-io@2.6
introduced by com.atlassian.jira:jira-api@8.8.0 > commons-io:commons-io@2.6
This issue was fixed in versions: 2.7
β XML External Entity (XXE) Injection [High Severity][https://snyk.io/vuln/SNYK-JAVA-DOM4J-174153] in dom4j:dom4j@1.4
introduced by com.atlassian.jira:jira-api@8.8.0 > com.atlassian.core:atlassian-core@7.0.2 > dom4j:dom4j@1.4
No upgrade or patch available
β Man-in-the-Middle (MitM) [Low Severity][https://snyk.io/vuln/SNYK-JAVA-LOG4J-1300176] in log4j:log4j@1.2.17-atlassian-2
introduced by com.atlassian.jira:jira-api@8.8.0 > log4j:log4j@1.2.17-atlassian-2
No upgrade or patch available
β Deserialization of Untrusted Data [Critical Severity][https://snyk.io/vuln/SNYK-JAVA-LOG4J-572732] in log4j:log4j@1.2.17-atlassian-2
introduced by com.atlassian.jira:jira-api@8.8.0 > log4j:log4j@1.2.17-atlassian-2
No upgrade or patch available
β XML External Entity (XXE) Injection [High Severity][https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSJACKSON-534878] in org.codehaus.jackson:jackson-mapper-asl@1.9.13-atlassian-4
introduced by com.atlassian.jira:jira-api@8.8.0 > org.codehaus.jackson:jackson-mapper-asl@1.9.13-atlassian-4
No upgrade or patch available
β Denial of Service (DoS) [Medium Severity][https://snyk.io/vuln/SNYK-JAVA-XERCES-30183] in xerces:xercesImpl@2.9.1
introduced by com.atlassian.jira:jira-api@8.8.0 > com.atlassian.ofbiz:entityengine-share@1.4.0 > xerces:xercesImpl@2.9.1
This issue was fixed in versions: 2.11.0.SP5
β Denial of Service (DoS) [Medium Severity][https://snyk.io/vuln/SNYK-JAVA-XERCES-31497] in xerces:xercesImpl@2.9.1
introduced by com.atlassian.jira:jira-api@8.8.0 > com.atlassian.ofbiz:entityengine-share@1.4.0 > xerces:xercesImpl@2.9.1
This issue was fixed in versions: 2.11.0
β Denial of Service (DoS) [High Severity][https://snyk.io/vuln/SNYK-JAVA-XERCES-31585] in xerces:xercesImpl@2.9.1
introduced by com.atlassian.jira:jira-api@8.8.0 > com.atlassian.ofbiz:entityengine-share@1.4.0 > xerces:xercesImpl@2.9.1
This issue was fixed in versions: 2.12.0
β Denial of Service (DoS) [Medium Severity][https://snyk.io/vuln/SNYK-JAVA-XERCES-32014] in xerces:xercesImpl@2.9.1
introduced by com.atlassian.jira:jira-api@8.8.0 > com.atlassian.ofbiz:entityengine-share@1.4.0 > xerces:xercesImpl@2.9.1
This issue was fixed in versions: 2.10.0
β Improper Input Validation [Medium Severity][https://snyk.io/vuln/SNYK-JAVA-XERCES-608891] in xerces:xercesImpl@2.9.1
introduced by com.atlassian.jira:jira-api@8.8.0 > com.atlassian.ofbiz:entityengine-share@1.4.0 > xerces:xercesImpl@2.9.1
This issue was fixed in versions: 2.12.0.SP03
Here is my pom.xml (shortened)
<project ...>
<dependencyManagement>
<dependencies>
<dependency>
<groupId>com.atlassian.jira</groupId>
<artifactId>jira-project</artifactId>
<version>${jira.version}</version>
<type>pom</type>
<scope>import</scope>
</dependency>
</dependencies>
</dependencyManagement>
<dependencies>
<dependency>
<groupId>com.atlassian.jira</groupId>
<artifactId>jira-api</artifactId>
<!-- done by jira-plugins-platform-pom -->
<!--<version>${jira.version}</version>-->
<scope>provided</scope>
</dependency>
<dependency>
<groupId>com.google.code.gson</groupId>
<artifactId>gson</artifactId>
<version>2.2.2-atlassian-1</version>
<dependency>
<!-- .... -->
</dependencies>
<properties>
<jira.version>8.8.0</jira.version>
<!-- .... -->
</properties>
</project>
It would be great if you could point me towards a solution
Thanks,
Bernhard