最新消息:雨落星辰是一个专注网站SEO优化、网站SEO诊断、搜索引擎研究、网络营销推广、网站策划运营及站长类的自媒体原创博客

amazon web services - AWS Inspector Reporting Vulnerabilities in Unused Maven Dependencies (META-INFmaven) - How to Handle? - St

programmeradmin3浏览0评论

I have been using AWS Inspector for some time now to scan and track vulnerabilities for my docker Images for a number of java projects. Recently, I noticed a sudden and drastic increase in the number of reported vulnerabilities. The change has happened within the same day and a report of few medium vulnerabilities turned into a nightmare of critical vulnerabilities.

An example is that for a project with no critical and no high vulnerabilities it went to around 30+ critical and 50+ high. Most of them, reporting vulnerabilities on libraries which are not reported from the dependency tree of my application.

e.g. by running

mvn dependency:tree

I have noticed that the paths reported are coming usually from META-INF/maven/ metainfo directory where every pom.xml of every library is kept for reference, but not only.

What I have tried so far:

  • Checked if dependencies are actually used with mvn dependency:tree, confirming that many reported libraries are not part of the runtime dependencies.
  • Updated dependencies, it had minimal effect on reducing the number of reported CVEs.
  • Scanned with alternative tools like Trivy and OWASP Dependency-Check do not flag these vulnerabilities in the same way.
  • Checked AWS Inspector settings but with no luck in finding any relevant settings apart from suppression management.

My question is what is the expected way to treat those reported vulnerabilities from now on? It seems almost impossible to just clean all of those reported CVEs which some are like really really old.

EDIT:

AWS is reporting that they rolled out a new ECR scanning engine, which is a fair explanation, allow me though to explain why this is an issue with an example:

I'm adding as one of my runtime dependencies apm-agent-attach in its latest version. By navigating tο mvnrepository it displays all the dependencies of this .jar file.

As a critical finding AWS displays about jackson databind of jackson library which is not present instead it is detected in:

my-service.war/WEB-INF/lib/apm-agent-attach-1.52.1.jar/elastic-apm-agent.jar/agent/META-INF/maven/co.elastic.apm/apm-dubbo-plugin/pom.xml

How easily this vulnerability is exploitable, if it is present at all..

与本文相关的文章

发布评论

评论列表(0)

  1. 暂无评论