Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

exclude vulnerable indirect dep xalan #2695

Merged
merged 1 commit into from
Jan 31, 2024

Conversation

peterhaochen47
Copy link
Member

  • a vulnerable xalan version (2.7.2; CVE-2022-34169) is brought in by the saml library we use: org.springframework.security.extensions:spring-security-saml2-core which has reached EOL (we are replacing it for develop branch, but not 74.5.x branch). So this xalan would not be bumped by spring-security-saml2-core anymore.
  • so to address this CVE scan result (CVE-2022-34169), exclude this indirect dep, like develop branch does: 061bee9
  • note: excluding a dep of a library we use carries the risk of failure if we trigger a code path in the library that depends on the dep. The fact all tests are passing + the fact that this exclude has been applied in develop branch for more than 1 year give us enough confidence that this exclude would not introduce a failure.

[#186948853]

@cf-gitbot
Copy link

We have created an issue in Pivotal Tracker to manage this:

https://www.pivotaltracker.com/story/show/186949072

The labels on this github issue will be updated when the story is started.

Copy link
Contributor

@swalchemist swalchemist left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would it makes sense to add comments in the build.gradle files explaining why the exclude is there? Seems important since it's keeping a CVE out of the package.

@swalchemist
Copy link
Contributor

Wouldn't the build fail if we actually needed this dependency? Seems pretty low-risk to me.

I know Spring has a lot of potential for runtime errors that are surprising, but perhaps not for this type of issue.

@peterhaochen47
Copy link
Member Author

Wouldn't the build fail if we actually needed this dependency? Seems pretty low-risk to me.

I know Spring has a lot of potential for runtime errors that are surprising, but perhaps not for this type of issue.

After reading this gradle doc, I got the impression that the failure might happen at runtime instead of build time. But in any case, if all our tests are passing, it's pretty good evidence that exclude works. Usually, we should use exclude very sparingly, in this case the direct dep (the saml extension lib) has reached EOL, so it can't be bumped, so our options are limited.

@peterhaochen47
Copy link
Member Author

Would it makes sense to add comments in the build.gradle files explaining why the exclude is there? Seems important since it's keeping a CVE out of the package.

Sure, wouldn't hurt to add that in addition to commit message.

- a vulnerable xalan version (2.7.2; CVE-2022-34169) is brought in by the saml library we use:
org.springframework.security.extensions:spring-security-saml2-core which
has reached EOL (we are replacing it for develop branch, but not 74.5.x
branch). So this xalan would not be bumped by spring-security-saml2-core
anymore.
- so to address this CVE scan result (CVE-2022-34169), exclude this
  indirect dep, like develop branch does: 061bee9
- note: excluding a dep of a library we use carries the risk of failure
  if we trigger a code path in the library that depends on the dep. The
  fact all tests are passing + the fact that this exclude has been applied in develop
  branch for more than 1 year give us enough confidence that this
  exclude would not introduce a failure.

[#186948853]
@peterhaochen47 peterhaochen47 merged commit 4cc1209 into 74.5.x Jan 31, 2024
2 checks passed
@peterhaochen47 peterhaochen47 deleted the pr/74.5.x/exclude-xalan-saml branch January 31, 2024 00:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Development

Successfully merging this pull request may close these issues.

3 participants