UNCLASSIFIED - NO CUI

Skip to content

chore(findings): jfrog/artifactory/artifactory-oss

Summary

jfrog/artifactory/artifactory-oss has 91 new findings discovered during continuous monitoring.

id source severity package
CVE-2021-38297 twistlock_cve Critical go-1.15.9
CVE-2022-23806 twistlock_cve Critical go-1.15.9
CVE-2022-29885 twistlock_cve High apache tomcat-9.0.62
CVE-2022-29885 twistlock_cve High apache tomcat_tomcat-embed-core-9.0.58
CVE-2022-28327 twistlock_cve High go-1.15.9
CVE-2022-24921 twistlock_cve High go-1.15.9
CVE-2022-24675 twistlock_cve High go-1.15.9
CVE-2022-23773 twistlock_cve High go-1.15.9
CVE-2022-23772 twistlock_cve High go-1.15.9
CVE-2021-44716 twistlock_cve High go-1.15.9
CVE-2021-41772 twistlock_cve High go-1.15.9
CVE-2021-41771 twistlock_cve High go-1.15.9
CVE-2021-33198 twistlock_cve High go-1.15.9
CVE-2021-33196 twistlock_cve High go-1.15.9
CVE-2021-33194 twistlock_cve High go-1.15.9
CVE-2021-29923 twistlock_cve High go-1.15.9
CVE-2020-36518 twistlock_cve High com.fasterxml.jackson.core_jackson-databind-2.13.2
CVE-2020-29652 twistlock_cve High golang.org/x/crypto-v0.0.0-20200820211705-5c72a883971a
CVE-2021-33195 twistlock_cve High go-1.15.9
CVE-2022-31129 twistlock_cve High moment-2.29.2
CVE-2022-23648 twistlock_cve High github.com/containerd/containerd-v1.3.3
CVE-2021-3121 twistlock_cve High github.com/gogo/protobuf-v1.3.1
CVE-2021-34558 twistlock_cve Medium go-1.15.9
CVE-2022-34305 twistlock_cve Medium apache tomcat-9.0.62
CVE-2022-34305 twistlock_cve Medium apache tomcat_tomcat-embed-core-9.0.58
CVE-2021-36221 twistlock_cve Medium go-1.15.9
CVE-2021-31525 twistlock_cve Medium go-1.15.9
CVE-2021-33197 twistlock_cve Medium go-1.15.9
CVE-2022-31030 twistlock_cve Medium github.com/containerd/containerd-v1.3.3
CVE-2021-41103 twistlock_cve Medium github.com/containerd/containerd-v1.3.3
CVE-2021-32760 twistlock_cve Medium github.com/containerd/containerd-v1.3.3
CVE-2019-19794 twistlock_cve Medium github.com/miekg/dns-v1.1.15
CVE-2015-3627 twistlock_cve Medium github.com/docker/docker-v1.4.2-0.20170802015333-8af4db6f002a
GHSA-qq97-vm5h-rrhg twistlock_cve Low github.com/docker/distribution-v2.7.1
GHSA-77vh-xpmg-72qh twistlock_cve Low github.com/opencontainers/image-spec-v1.0.2-0.20190823105129-775207bd45b6
GHSA-5j5w-g665-5m35 twistlock_cve Low github.com/containerd/containerd-v1.3.3
CVE-2021-22133 twistlock_cve Low go.elastic.co/apm-v1.8.1-0.20200909061013-2aef45b9cf4b
CVE-2016-5425 anchore_cve High tomcat-jdbc-9.0.62-jfrog2
CVE-2016-6325 anchore_cve High tomcat-jdbc-9.0.62-jfrog2
GHSA-qqc5-rgcc-cjqh anchore_cve Low go.elastic.co/apm-v1.8.1-0.20200909061013-2aef45b9cf4b
CVE-2020-8908 anchore_cve Low guava-30.0-jre
CVE-2021-26291 anchore_cve Critical maven-artifact-manager-2.2.1
CVE-2017-18589 anchore_cve High cookie-0.4.2
CVE-2020-9493 anchore_cve Critical chainsaw-0.1.0
GHSA-c2h3-6mxw-7mvq anchore_cve Medium github.com/containerd/containerd-v1.3.3
CVE-2021-26291 anchore_cve Critical maven-project-2.2.1
GHSA-wc69-rhjr-hc9g anchore_cve High moment-2.29.2
GHSA-57j2-w4cx-62h2 anchore_cve High jackson-databind-2.13.2
GHSA-36xw-fx78-c5r4 anchore_cve Medium github.com/containerd/containerd-v1.3.3
GHSA-qq97-vm5h-rrhg anchore_cve Low github.com/docker/distribution-v2.7.1+incompatible
CVE-2014-1975 anchore_cve Medium unzipper-0.10.11
CVE-2019-10743 anchore_cve Medium archiver-5.3.1
CVE-2006-1611 anchore_cve Medium archiver-5.3.1
GHSA-c3h9-896r-86jm anchore_cve High github.com/gogo/protobuf-v1.3.1
CVE-2022-23307 anchore_cve High chainsaw-0.1.0
CVE-2022-29885 anchore_cve High tomcat-jdbc-9.0.62-jfrog2
CVE-2017-18589 anchore_cve High cookie-0.4.1
CVE-2022-34305 anchore_cve Medium tomcat-jdbc-9.0.62-jfrog2
GHSA-5j5w-g665-5m35 anchore_cve Low github.com/containerd/containerd-v1.3.3
CVE-2017-8806 anchore_cve Medium postgresql-42.3.3
CVE-2016-5425 anchore_cve High tomcat-jdbc-9.0.63
CVE-2013-1779 anchore_cve Low fresh-0.5.2
CVE-2020-13401 anchore_cve Medium github.com/docker/engine-v0.0.0-20191113042239-ea84732a7725
CVE-2018-20699 anchore_cve Medium github.com/docker/engine-v0.0.0-20191113042239-ea84732a7725
GHSA-c72p-9xmj-rx3w anchore_cve Medium github.com/containerd/containerd-v1.3.3
CVE-2016-6325 anchore_cve High tomcat-jdbc-9.0.63
GHSA-44r7-7p62-q3fr anchore_cve Medium github.com/miekg/dns-v1.1.15
CVE-2021-22570 anchore_cve High google.golang.org/protobuf-v1.24.0
CVE-2021-22569 anchore_cve Medium google-protobuf-3.9.1
GHSA-crp2-qrr5-8pq7 anchore_cve High github.com/containerd/containerd-v1.3.3
CVE-2022-34305 anchore_cve Medium tomcat-jdbc-9.0.63
CVE-2015-5237 anchore_cve High google.golang.org/protobuf-v1.24.0
CVE-2020-8908 anchore_cve Low guava-30.0-jre
CVE-2015-4035 anchore_cve High xz-1.8
GHSA-5ffw-gxpp-mxpf anchore_cve Medium github.com/containerd/containerd-v1.3.3
CVE-2021-22569 anchore_cve Medium google-protobuf-3.19.1
CCE-85987-6 oscap_comp Medium
CCE-85886-0 oscap_comp Medium
CVE-2021-29281 anchore_cve Critical archiver-5.3.1
CVE-2016-1000027 anchore_cve Critical spring-core-5.3.20
GHSA-qq97-vm5h-rrhg anchore_cve Low github.com/docker/distribution-v2.7.1+incompatible
CVE-2021-22570 anchore_cve High google.golang.org/protobuf-v1.27.1
CVE-2021-22570 anchore_cve High google.golang.org/protobuf-v1.27.1
GHSA-5ffw-gxpp-mxpf anchore_cve Medium github.com/containerd/containerd-v1.6.2
CVE-2021-22570 anchore_cve High google.golang.org/protobuf-v1.27.1
CVE-2015-5237 anchore_cve High google.golang.org/protobuf-v1.27.1
CVE-2016-1000027 anchore_cve Critical spring-core-5.3.20
CVE-2021-22570 anchore_cve High google.golang.org/protobuf-v1.27.1
CVE-2015-5237 anchore_cve High google.golang.org/protobuf-v1.27.1
CVE-2015-5237 anchore_cve High google.golang.org/protobuf-v1.27.1
CVE-2015-5237 anchore_cve High google.golang.org/protobuf-v1.27.1

VAT: https://vat.dso.mil/vat/container/20671?branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/jfrog/artifactory/artifactory-oss/-/jobs/12258843

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the ~"Approval" label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications
  • Send approval request to Authorizing Official
  • Close issue after approval from Authorizing Official

Note: If the above approval process is rejected for any reason, the Approval label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Approval label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information