chore(findings): ccj2-a3im/datahub/datahub-upgrade
Summary
ccj2-a3im/datahub/datahub-upgrade has 103 new findings discovered during continuous monitoring.
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=ccj2-a3im/datahub/datahub-upgrade&tag=1.0.0&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
id | source | severity | package | impact | workaround | epss_score | kev |
---|---|---|---|---|---|---|---|
CVE-2021-26291 | Anchore CVE | Critical | maven-artifact-3.6.3 | 0.45481 | false | ||
CVE-2023-28115 | Twistlock CVE | Critical | snappy-1.2.2-r0 | 0.19850 | false | ||
CVE-2023-41330 | Twistlock CVE | Critical | snappy-1.2.2-r0 | 0.01021 | false | ||
CVE-2012-5783 | Anchore CVE | Medium | commons-httpclient-3.1 | 0.00649 | false | ||
CVE-2024-29133 | Twistlock CVE | Medium | org.apache.commons_commons-configuration2-2.8.0 | 0.00509 | false | ||
CVE-2020-13956 | Anchore CVE | Medium | commons-httpclient-3.1 | 0.00505 | false | ||
CVE-2023-3635 | Anchore CVE | High | okio-fakefilesystem-jvm-3.2.0 | 0.00335 | false | ||
CVE-2025-30065 | Twistlock CVE | Critical | org.apache.parquet_parquet-avro-1.12.3 | 0.00319 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | commons-lang_commons-lang-2.6 | 0.00258 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.17.0 | 0.00258 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.12.0 | 0.00258 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-metadata-3.7.2 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-tools-api-3.7.2 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-raft-3.7.2 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-storage-3.7.2 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-group-coordinator-3.7.2 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-storage-api-3.7.2 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-server-common-3.7.2 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka_2.13-3.7.2 | 0.00226 | false | ||
CVE-2024-29131 | Twistlock CVE | Medium | org.apache.commons_commons-configuration2-2.8.0 | 0.00203 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.32.0 | 0.00189 | false | ||
CVE-2024-12798 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.4.14 | 0.00186 | false | ||
CVE-2024-36124 | Twistlock CVE | Medium | org.iq80.snappy_snappy-0.4 | 0.00180 | false | ||
CVE-2025-41234 | Twistlock CVE | Medium | spring-web-6.1.14 | 0.00175 | false | ||
CVE-2024-43126 | Anchore CVE | High | opentelemetry-exporter-sender-okhttp-1.45.0 | 0.00141 | false | ||
CVE-2025-46762 | Twistlock CVE | High | org.apache.parquet_parquet-avro-1.12.3 | 0.00129 | false | ||
CVE-2025-22235 | Twistlock CVE | High | spring-boot-3.2.9 | 0.00106 | false | ||
CVE-2025-52999 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.13.4 | 0.00072 | false | ||
CVE-2023-32731 | Twistlock CVE | High | grpc-protobuf-1.53.0 | 0.00070 | false | ||
CVE-2016-2781 | Anchore CVE | Medium | coreutils-fmt-9.7-r1 | 0.00065 | false | ||
CVE-2016-2781 | Anchore CVE | Medium | coreutils-env-9.7-r1 | 0.00065 | false | ||
CVE-2016-2781 | Anchore CVE | Medium | coreutils-sha512sum-9.7-r1 | 0.00065 | false | ||
CVE-2016-2781 | Anchore CVE | Medium | coreutils-9.7-r1 | 0.00065 | false | ||
CVE-2025-22233 | Twistlock CVE | Low | spring-context-6.1.14 | 0.00063 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-mapreduce-client-core-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-annotations-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-client-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-mapreduce-client-jobclient-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-mapreduce-client-common-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-hdfs-client-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-yarn-common-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-auth-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-yarn-api-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-yarn-client-3.3.6 | 0.00062 | false | ||
CVE-2024-23454 | Anchore CVE | Medium | hadoop-shaded-guava-1.1.1 | 0.00062 | false | ||
CVE-2024-23454 | Twistlock CVE | Low | org.apache.hadoop_hadoop-common-3.3.6 | 0.00062 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.24.1 | 0.00059 | false | ||
CVE-2025-48734 | Twistlock CVE | Low | commons-beanutils_commons-beanutils-1.9.4 | 0.00056 | false | ||
CVE-2025-55163 | Twistlock CVE | High | io.netty_netty-codec-http2-4.1.118.Final | 0.00055 | false | ||
CVE-2025-58057 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.118.Final | 0.00052 | false | ||
CVE-2025-41242 | Twistlock CVE | Medium | spring-webmvc-6.1.14 | 0.00048 | false | ||
CVE-2024-39657 | Anchore CVE | High | opentelemetry-exporter-sender-okhttp-1.45.0 | 0.00048 | false | ||
CVE-2024-12801 | Twistlock CVE | Low | ch.qos.logback_logback-core-1.4.14 | 0.00048 | false | ||
CVE-2023-50572 | Anchore CVE | Medium | jline-3.9.0 | 0.00043 | false | ||
CVE-2025-58056 | Twistlock CVE | Low | io.netty_netty-codec-http-4.1.118.Final | 0.00042 | false | ||
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-30.1.1-jre | 0.00042 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-tools-api-3.7.2 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka_2.13-3.7.2 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-raft-3.7.2 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-metadata-3.7.2 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-storage-3.7.2 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-server-common-3.7.2 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-group-coordinator-3.7.2 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-storage-api-3.7.2 | 0.00031 | false | ||
CVE-2025-49146 | Twistlock CVE | High | org.postgresql_postgresql-42.7.4 | 0.00026 | false | ||
CVE-2023-32732 | Twistlock CVE | Medium | grpc-protobuf-1.53.0 | 0.00023 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.24.1 | 0.00019 | false | ||
CVE-2025-4673 | Twistlock CVE | Low | net/http-1.24.1 | 0.00019 | false | ||
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.13.4.2 | 0.00015 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.24.1 | 0.00013 | false | ||
CVE-2025-22871 | Twistlock CVE | Low | net/http/internal-1.24.1 | 0.00013 | false | ||
CVE-2025-22874 | Twistlock CVE | Low | crypto/x509-1.24.1 | 0.00012 | false | ||
CVE-2025-22874 | Anchore CVE | High | stdlib-go1.24.1 | 0.00012 | false | ||
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-30.1.1-jre | 0.00011 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.24.1 | 0.00006 | false | ||
d33cd1c56d51b8a0593f5ec64f2fc68e | Anchore Compliance | Critical | N/A | N/A | |||
PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.13.4 | N/A | N/A | ||
GHSA-xjp4-hw94-mvp5 | Anchore CVE | Medium | commons-configuration2-2.8.0 | N/A | N/A | ||
GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.32.0 | N/A | N/A | ||
GHSA-rc42-6c7j-7h5r | Anchore CVE | High | spring-boot-3.2.9 | N/A | N/A | ||
GHSA-r936-gwx5-v52f | Anchore CVE | Medium | spring-webmvc-6.1.14 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.32.0 | N/A | N/A | ||
GHSA-prj3-ccx8-p6x4 | Anchore CVE | High | netty-codec-http2-4.1.118.Final | N/A | N/A | ||
GHSA-pr98-23f8-jwxv | Anchore CVE | Medium | logback-core-1.4.14 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.12.0 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang-2.6 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.17.0 | N/A | N/A | ||
GHSA-hq9p-pm7w-8p54 | Anchore CVE | High | postgresql-42.7.4 | N/A | N/A | ||
GHSA-hcg3-q754-cr77 | Anchore CVE | High | golang.org/x/crypto-v0.31.0 | N/A | N/A | ||
GHSA-h46c-h94j-95f3 | Anchore CVE | High | jackson-core-2.13.4 | N/A | N/A | ||
GHSA-fghv-69vj-qj49 | Anchore CVE | Low | netty-codec-http-4.1.118.Final | N/A | N/A | ||
GHSA-f5fw-25gw-5m92 | Anchore CVE | Low | hadoop-common-3.3.6 | N/A | N/A | ||
GHSA-9w38-p64v-xpmv | Anchore CVE | Medium | commons-configuration2-2.8.0 | N/A | N/A | ||
GHSA-8wh2-6qhj-h7j9 | Anchore CVE | Medium | snappy-0.4 | N/A | N/A | ||
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-30.1.1-jre | N/A | N/A | ||
GHSA-6v67-2wr5-gvf4 | Anchore CVE | Low | logback-core-1.4.14 | N/A | N/A | ||
GHSA-6r3c-xf4w-jxjm | Anchore CVE | Medium | spring-web-6.1.14 | N/A | N/A | ||
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-30.1.1-jre | N/A | N/A | ||
GHSA-53wx-pr6q-m3j5 | Anchore CVE | High | parquet-avro-1.12.3 | N/A | N/A | ||
GHSA-4wp7-92pw-q264 | Anchore CVE | Low | spring-context-6.1.14 | N/A | N/A | ||
GHSA-3p8m-j85q-pgmj | Anchore CVE | Medium | netty-codec-4.1.118.Final | N/A | N/A | ||
GHSA-2c59-37c4-qrx5 | Anchore CVE | Critical | parquet-avro-1.12.3 | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=ccj2-a3im/datahub/datahub-upgrade&tag=1.0.0&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.