UNCLASSIFIED - NO CUI

Skip to content

chore(findings): ccj2-a3im/datahub/datahub-upgrade

Summary

ccj2-a3im/datahub/datahub-upgrade has 103 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=ccj2-a3im/datahub/datahub-upgrade&tag=1.0.0&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2021-26291 Anchore CVE Critical maven-artifact-3.6.3 0.45481 false
CVE-2023-28115 Twistlock CVE Critical snappy-1.2.2-r0 0.19850 false
CVE-2023-41330 Twistlock CVE Critical snappy-1.2.2-r0 0.01021 false
CVE-2012-5783 Anchore CVE Medium commons-httpclient-3.1 0.00649 false
CVE-2024-29133 Twistlock CVE Medium org.apache.commons_commons-configuration2-2.8.0 0.00509 false
CVE-2020-13956 Anchore CVE Medium commons-httpclient-3.1 0.00505 false
CVE-2023-3635 Anchore CVE High okio-fakefilesystem-jvm-3.2.0 0.00335 false
CVE-2025-30065 Twistlock CVE Critical org.apache.parquet_parquet-avro-1.12.3 0.00319 false
CVE-2025-48924 Twistlock CVE Medium commons-lang_commons-lang-2.6 0.00258 false
CVE-2025-48924 Twistlock CVE Medium org.apache.commons_commons-lang3-3.17.0 0.00258 false
CVE-2025-48924 Twistlock CVE Medium org.apache.commons_commons-lang3-3.12.0 0.00258 false
CVE-2025-27818 Anchore CVE High kafka-metadata-3.7.2 0.00226 false
CVE-2025-27818 Anchore CVE High kafka-tools-api-3.7.2 0.00226 false
CVE-2025-27818 Anchore CVE High kafka-raft-3.7.2 0.00226 false
CVE-2025-27818 Anchore CVE High kafka-storage-3.7.2 0.00226 false
CVE-2025-27818 Anchore CVE High kafka-group-coordinator-3.7.2 0.00226 false
CVE-2025-27818 Anchore CVE High kafka-storage-api-3.7.2 0.00226 false
CVE-2025-27818 Anchore CVE High kafka-server-common-3.7.2 0.00226 false
CVE-2025-27818 Anchore CVE High kafka_2.13-3.7.2 0.00226 false
CVE-2024-29131 Twistlock CVE Medium org.apache.commons_commons-configuration2-2.8.0 0.00203 false
CVE-2024-45338 Anchore CVE Medium golang.org/x/net-v0.32.0 0.00189 false
CVE-2024-12798 Twistlock CVE Medium ch.qos.logback_logback-core-1.4.14 0.00186 false
CVE-2024-36124 Twistlock CVE Medium org.iq80.snappy_snappy-0.4 0.00180 false
CVE-2025-41234 Twistlock CVE Medium spring-web-6.1.14 0.00175 false
CVE-2024-43126 Anchore CVE High opentelemetry-exporter-sender-okhttp-1.45.0 0.00141 false
CVE-2025-46762 Twistlock CVE High org.apache.parquet_parquet-avro-1.12.3 0.00129 false
CVE-2025-22235 Twistlock CVE High spring-boot-3.2.9 0.00106 false
CVE-2025-52999 Twistlock CVE High com.fasterxml.jackson.core_jackson-core-2.13.4 0.00072 false
CVE-2023-32731 Twistlock CVE High grpc-protobuf-1.53.0 0.00070 false
CVE-2016-2781 Anchore CVE Medium coreutils-fmt-9.7-r1 0.00065 false
CVE-2016-2781 Anchore CVE Medium coreutils-env-9.7-r1 0.00065 false
CVE-2016-2781 Anchore CVE Medium coreutils-sha512sum-9.7-r1 0.00065 false
CVE-2016-2781 Anchore CVE Medium coreutils-9.7-r1 0.00065 false
CVE-2025-22233 Twistlock CVE Low spring-context-6.1.14 0.00063 false
CVE-2024-23454 Anchore CVE Medium hadoop-mapreduce-client-core-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-annotations-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-client-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-mapreduce-client-jobclient-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-mapreduce-client-common-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-hdfs-client-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-yarn-common-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-auth-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-yarn-api-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-yarn-client-3.3.6 0.00062 false
CVE-2024-23454 Anchore CVE Medium hadoop-shaded-guava-1.1.1 0.00062 false
CVE-2024-23454 Twistlock CVE Low org.apache.hadoop_hadoop-common-3.3.6 0.00062 false
CVE-2025-47907 Anchore CVE High stdlib-go1.24.1 0.00059 false
CVE-2025-48734 Twistlock CVE Low commons-beanutils_commons-beanutils-1.9.4 0.00056 false
CVE-2025-55163 Twistlock CVE High io.netty_netty-codec-http2-4.1.118.Final 0.00055 false
CVE-2025-58057 Twistlock CVE Medium io.netty_netty-codec-4.1.118.Final 0.00052 false
CVE-2025-41242 Twistlock CVE Medium spring-webmvc-6.1.14 0.00048 false
CVE-2024-39657 Anchore CVE High opentelemetry-exporter-sender-okhttp-1.45.0 0.00048 false
CVE-2024-12801 Twistlock CVE Low ch.qos.logback_logback-core-1.4.14 0.00048 false
CVE-2023-50572 Anchore CVE Medium jline-3.9.0 0.00043 false
CVE-2025-58056 Twistlock CVE Low io.netty_netty-codec-http-4.1.118.Final 0.00042 false
CVE-2023-2976 Twistlock CVE High com.google.guava_guava-30.1.1-jre 0.00042 false
CVE-2025-27817 Anchore CVE High kafka-tools-api-3.7.2 0.00031 false
CVE-2025-27817 Anchore CVE High kafka_2.13-3.7.2 0.00031 false
CVE-2025-27817 Anchore CVE High kafka-raft-3.7.2 0.00031 false
CVE-2025-27817 Anchore CVE High kafka-metadata-3.7.2 0.00031 false
CVE-2025-27817 Anchore CVE High kafka-storage-3.7.2 0.00031 false
CVE-2025-27817 Anchore CVE High kafka-server-common-3.7.2 0.00031 false
CVE-2025-27817 Anchore CVE High kafka-group-coordinator-3.7.2 0.00031 false
CVE-2025-27817 Anchore CVE High kafka-storage-api-3.7.2 0.00031 false
CVE-2025-49146 Twistlock CVE High org.postgresql_postgresql-42.7.4 0.00026 false
CVE-2023-32732 Twistlock CVE Medium grpc-protobuf-1.53.0 0.00023 false
CVE-2025-4673 Anchore CVE Medium stdlib-go1.24.1 0.00019 false
CVE-2025-4673 Twistlock CVE Low net/http-1.24.1 0.00019 false
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.13.4.2 0.00015 false
CVE-2025-22871 Anchore CVE Critical stdlib-go1.24.1 0.00013 false
CVE-2025-22871 Twistlock CVE Low net/http/internal-1.24.1 0.00013 false
CVE-2025-22874 Twistlock CVE Low crypto/x509-1.24.1 0.00012 false
CVE-2025-22874 Anchore CVE High stdlib-go1.24.1 0.00012 false
CVE-2020-8908 Twistlock CVE Low com.google.guava_guava-30.1.1-jre 0.00011 false
CVE-2025-4674 Anchore CVE High stdlib-go1.24.1 0.00006 false
d33cd1c56d51b8a0593f5ec64f2fc68e Anchore Compliance Critical N/A N/A
PRISMA-2023-0067 Twistlock CVE High com.fasterxml.jackson.core_jackson-core-2.13.4 N/A N/A
GHSA-xjp4-hw94-mvp5 Anchore CVE Medium commons-configuration2-2.8.0 N/A N/A
GHSA-wxr5-93ph-8wr9 Anchore CVE High commons-beanutils-1.9.4 N/A N/A
GHSA-vvgc-356p-c3xw Anchore CVE Medium golang.org/x/net-v0.32.0 N/A N/A
GHSA-rc42-6c7j-7h5r Anchore CVE High spring-boot-3.2.9 N/A N/A
GHSA-r936-gwx5-v52f Anchore CVE Medium spring-webmvc-6.1.14 N/A N/A
GHSA-qxp5-gwg8-xv66 Anchore CVE Medium golang.org/x/net-v0.32.0 N/A N/A
GHSA-prj3-ccx8-p6x4 Anchore CVE High netty-codec-http2-4.1.118.Final N/A N/A
GHSA-pr98-23f8-jwxv Anchore CVE Medium logback-core-1.4.14 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.12.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang-2.6 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.17.0 N/A N/A
GHSA-hq9p-pm7w-8p54 Anchore CVE High postgresql-42.7.4 N/A N/A
GHSA-hcg3-q754-cr77 Anchore CVE High golang.org/x/crypto-v0.31.0 N/A N/A
GHSA-h46c-h94j-95f3 Anchore CVE High jackson-core-2.13.4 N/A N/A
GHSA-fghv-69vj-qj49 Anchore CVE Low netty-codec-http-4.1.118.Final N/A N/A
GHSA-f5fw-25gw-5m92 Anchore CVE Low hadoop-common-3.3.6 N/A N/A
GHSA-9w38-p64v-xpmv Anchore CVE Medium commons-configuration2-2.8.0 N/A N/A
GHSA-8wh2-6qhj-h7j9 Anchore CVE Medium snappy-0.4 N/A N/A
GHSA-7g45-4rm6-3mm3 Anchore CVE Medium guava-30.1.1-jre N/A N/A
GHSA-6v67-2wr5-gvf4 Anchore CVE Low logback-core-1.4.14 N/A N/A
GHSA-6r3c-xf4w-jxjm Anchore CVE Medium spring-web-6.1.14 N/A N/A
GHSA-5mg8-w23w-74h3 Anchore CVE Low guava-30.1.1-jre N/A N/A
GHSA-53wx-pr6q-m3j5 Anchore CVE High parquet-avro-1.12.3 N/A N/A
GHSA-4wp7-92pw-q264 Anchore CVE Low spring-context-6.1.14 N/A N/A
GHSA-3p8m-j85q-pgmj Anchore CVE Medium netty-codec-4.1.118.Final N/A N/A
GHSA-2c59-37c4-qrx5 Anchore CVE Critical parquet-avro-1.12.3 N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=ccj2-a3im/datahub/datahub-upgrade&tag=1.0.0&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information