Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Need to address CWE-79 in the latest docker image #354

Open
juliankamil opened this issue Aug 10, 2020 · 4 comments
Open

Need to address CWE-79 in the latest docker image #354

juliankamil opened this issue Aug 10, 2020 · 4 comments

Comments

@juliankamil
Copy link

The latest official Docker image with the tag 20.0.0.8-full-java8-ibmjava ships with a version of IBM Java SDK with JAX-RS API implementation that is reported by HCL AppScan as affected by vulnerabilities in CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').

The scan indicates a number of calls to the method javax.servlet.jsp.JspWriter.print(String):void in defaultHtmlEntry_jsp which is reported as vulnerable to a Cross Site Scripting exploit as described in CWE-79.

Is there a plan to update the official images to ship with a remediated version of IBM JDK and address this issue? Thanks.

@arthurdm
Copy link
Contributor

hey @juliankamil - sorry for the delay.

With every release we pickup the latest available IBM JDK versions. Have you tried the 20.0.0.9 WL image?

@arthurdm
Copy link
Contributor

@juliankamil - which CVEs from this CWE were you particularly interested in? That will help us track down the fixes.

@juliankamil
Copy link
Author

hey @juliankamil - sorry for the delay.

With every release we pickup the latest available IBM JDK versions. Have you tried the 20.0.0.9 WL image?

No worries, thanks @arthurdm...

We haven't, but will try 20.0.0.9 to see if that remediates the issues and will let you know the results.

@juliankamil - which CVEs from this CWE were you particularly interested in? That will help us track down the fixes.

On this, I will check with the development team and get back to you. Generally speaking though, we are not calling the method reported as vulnerable directly; we are only using the Java SDK with the library that happens to be using the method. So we'll need to do some tracking down to see which CVEs are applicable in this case.

@Neelavathi-k
Copy link

Hi @juliankamil

Actually i am facing the same above mentioned issue (javax.servlet.jsp.JspWriter.print(String):void) in spring mvc.
Will u plz help me on that
we are not using docker we are using spring mvc

Thanks in Advance 😃

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants