chore(findings): jfrog/artifactory/artifactory-oss
Summary
jfrog/artifactory/artifactory-oss has 91 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2021-38297 | twistlock_cve | Critical | go-1.15.9 |
CVE-2022-23806 | twistlock_cve | Critical | go-1.15.9 |
CVE-2022-29885 | twistlock_cve | High | apache tomcat-9.0.62 |
CVE-2022-29885 | twistlock_cve | High | apache tomcat_tomcat-embed-core-9.0.58 |
CVE-2022-28327 | twistlock_cve | High | go-1.15.9 |
CVE-2022-24921 | twistlock_cve | High | go-1.15.9 |
CVE-2022-24675 | twistlock_cve | High | go-1.15.9 |
CVE-2022-23773 | twistlock_cve | High | go-1.15.9 |
CVE-2022-23772 | twistlock_cve | High | go-1.15.9 |
CVE-2021-44716 | twistlock_cve | High | go-1.15.9 |
CVE-2021-41772 | twistlock_cve | High | go-1.15.9 |
CVE-2021-41771 | twistlock_cve | High | go-1.15.9 |
CVE-2021-33198 | twistlock_cve | High | go-1.15.9 |
CVE-2021-33196 | twistlock_cve | High | go-1.15.9 |
CVE-2021-33194 | twistlock_cve | High | go-1.15.9 |
CVE-2021-29923 | twistlock_cve | High | go-1.15.9 |
CVE-2020-36518 | twistlock_cve | High | com.fasterxml.jackson.core_jackson-databind-2.13.2 |
CVE-2020-29652 | twistlock_cve | High | golang.org/x/crypto-v0.0.0-20200820211705-5c72a883971a |
CVE-2021-33195 | twistlock_cve | High | go-1.15.9 |
CVE-2022-31129 | twistlock_cve | High | moment-2.29.2 |
CVE-2022-23648 | twistlock_cve | High | github.com/containerd/containerd-v1.3.3 |
CVE-2021-3121 | twistlock_cve | High | github.com/gogo/protobuf-v1.3.1 |
CVE-2021-34558 | twistlock_cve | Medium | go-1.15.9 |
CVE-2022-34305 | twistlock_cve | Medium | apache tomcat-9.0.62 |
CVE-2022-34305 | twistlock_cve | Medium | apache tomcat_tomcat-embed-core-9.0.58 |
CVE-2021-36221 | twistlock_cve | Medium | go-1.15.9 |
CVE-2021-31525 | twistlock_cve | Medium | go-1.15.9 |
CVE-2021-33197 | twistlock_cve | Medium | go-1.15.9 |
CVE-2022-31030 | twistlock_cve | Medium | github.com/containerd/containerd-v1.3.3 |
CVE-2021-41103 | twistlock_cve | Medium | github.com/containerd/containerd-v1.3.3 |
CVE-2021-32760 | twistlock_cve | Medium | github.com/containerd/containerd-v1.3.3 |
CVE-2019-19794 | twistlock_cve | Medium | github.com/miekg/dns-v1.1.15 |
CVE-2015-3627 | twistlock_cve | Medium | github.com/docker/docker-v1.4.2-0.20170802015333-8af4db6f002a |
GHSA-qq97-vm5h-rrhg | twistlock_cve | Low | github.com/docker/distribution-v2.7.1 |
GHSA-77vh-xpmg-72qh | twistlock_cve | Low | github.com/opencontainers/image-spec-v1.0.2-0.20190823105129-775207bd45b6 |
GHSA-5j5w-g665-5m35 | twistlock_cve | Low | github.com/containerd/containerd-v1.3.3 |
CVE-2021-22133 | twistlock_cve | Low | go.elastic.co/apm-v1.8.1-0.20200909061013-2aef45b9cf4b |
CVE-2016-5425 | anchore_cve | High | tomcat-jdbc-9.0.62-jfrog2 |
CVE-2016-6325 | anchore_cve | High | tomcat-jdbc-9.0.62-jfrog2 |
GHSA-qqc5-rgcc-cjqh | anchore_cve | Low | go.elastic.co/apm-v1.8.1-0.20200909061013-2aef45b9cf4b |
CVE-2020-8908 | anchore_cve | Low | guava-30.0-jre |
CVE-2021-26291 | anchore_cve | Critical | maven-artifact-manager-2.2.1 |
CVE-2017-18589 | anchore_cve | High | cookie-0.4.2 |
CVE-2020-9493 | anchore_cve | Critical | chainsaw-0.1.0 |
GHSA-c2h3-6mxw-7mvq | anchore_cve | Medium | github.com/containerd/containerd-v1.3.3 |
CVE-2021-26291 | anchore_cve | Critical | maven-project-2.2.1 |
GHSA-wc69-rhjr-hc9g | anchore_cve | High | moment-2.29.2 |
GHSA-57j2-w4cx-62h2 | anchore_cve | High | jackson-databind-2.13.2 |
GHSA-36xw-fx78-c5r4 | anchore_cve | Medium | github.com/containerd/containerd-v1.3.3 |
GHSA-qq97-vm5h-rrhg | anchore_cve | Low | github.com/docker/distribution-v2.7.1+incompatible |
CVE-2014-1975 | anchore_cve | Medium | unzipper-0.10.11 |
CVE-2019-10743 | anchore_cve | Medium | archiver-5.3.1 |
CVE-2006-1611 | anchore_cve | Medium | archiver-5.3.1 |
GHSA-c3h9-896r-86jm | anchore_cve | High | github.com/gogo/protobuf-v1.3.1 |
CVE-2022-23307 | anchore_cve | High | chainsaw-0.1.0 |
CVE-2022-29885 | anchore_cve | High | tomcat-jdbc-9.0.62-jfrog2 |
CVE-2017-18589 | anchore_cve | High | cookie-0.4.1 |
CVE-2022-34305 | anchore_cve | Medium | tomcat-jdbc-9.0.62-jfrog2 |
GHSA-5j5w-g665-5m35 | anchore_cve | Low | github.com/containerd/containerd-v1.3.3 |
CVE-2017-8806 | anchore_cve | Medium | postgresql-42.3.3 |
CVE-2016-5425 | anchore_cve | High | tomcat-jdbc-9.0.63 |
CVE-2013-1779 | anchore_cve | Low | fresh-0.5.2 |
CVE-2020-13401 | anchore_cve | Medium | github.com/docker/engine-v0.0.0-20191113042239-ea84732a7725 |
CVE-2018-20699 | anchore_cve | Medium | github.com/docker/engine-v0.0.0-20191113042239-ea84732a7725 |
GHSA-c72p-9xmj-rx3w | anchore_cve | Medium | github.com/containerd/containerd-v1.3.3 |
CVE-2016-6325 | anchore_cve | High | tomcat-jdbc-9.0.63 |
GHSA-44r7-7p62-q3fr | anchore_cve | Medium | github.com/miekg/dns-v1.1.15 |
CVE-2021-22570 | anchore_cve | High | google.golang.org/protobuf-v1.24.0 |
CVE-2021-22569 | anchore_cve | Medium | google-protobuf-3.9.1 |
GHSA-crp2-qrr5-8pq7 | anchore_cve | High | github.com/containerd/containerd-v1.3.3 |
CVE-2022-34305 | anchore_cve | Medium | tomcat-jdbc-9.0.63 |
CVE-2015-5237 | anchore_cve | High | google.golang.org/protobuf-v1.24.0 |
CVE-2020-8908 | anchore_cve | Low | guava-30.0-jre |
CVE-2015-4035 | anchore_cve | High | xz-1.8 |
GHSA-5ffw-gxpp-mxpf | anchore_cve | Medium | github.com/containerd/containerd-v1.3.3 |
CVE-2021-22569 | anchore_cve | Medium | google-protobuf-3.19.1 |
CCE-85987-6 | oscap_comp | Medium | |
CCE-85886-0 | oscap_comp | Medium | |
CVE-2021-29281 | anchore_cve | Critical | archiver-5.3.1 |
CVE-2016-1000027 | anchore_cve | Critical | spring-core-5.3.20 |
GHSA-qq97-vm5h-rrhg | anchore_cve | Low | github.com/docker/distribution-v2.7.1+incompatible |
CVE-2021-22570 | anchore_cve | High | google.golang.org/protobuf-v1.27.1 |
CVE-2021-22570 | anchore_cve | High | google.golang.org/protobuf-v1.27.1 |
GHSA-5ffw-gxpp-mxpf | anchore_cve | Medium | github.com/containerd/containerd-v1.6.2 |
CVE-2021-22570 | anchore_cve | High | google.golang.org/protobuf-v1.27.1 |
CVE-2015-5237 | anchore_cve | High | google.golang.org/protobuf-v1.27.1 |
CVE-2016-1000027 | anchore_cve | Critical | spring-core-5.3.20 |
CVE-2021-22570 | anchore_cve | High | google.golang.org/protobuf-v1.27.1 |
CVE-2015-5237 | anchore_cve | High | google.golang.org/protobuf-v1.27.1 |
CVE-2015-5237 | anchore_cve | High | google.golang.org/protobuf-v1.27.1 |
CVE-2015-5237 | anchore_cve | High | google.golang.org/protobuf-v1.27.1 |
VAT: https://vat.dso.mil/vat/container/20671?branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/jfrog/artifactory/artifactory-oss/-/jobs/12258843
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Approval" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications -
Send approval request to Authorizing Official -
Close issue after approval from Authorizing Official
Note: If the above approval process is rejected for any reason, the
Approval
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theApproval
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.