[
https://issues.apache.org/jira/browse/RANGER-5095?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Basapuram Kumar updated RANGER-5095:
------------------------------------
Description:
*Issue*
The current version of Ranger uses Apache Atlas 2.2.0, which transitively
depends on Spring Framework 4.3.29.RELEASE. This specific version of the Spring
Framework is vulnerable to CVE-2023-20863.
*Root Cause:*
The vulnerability exists due to the dependency on Apache Atlas 2.2.0, which
includes the outdated and vulnerable version of the Spring Framework
(4.3.29.RELEASE).
*Resolution Suggestion:*
To address CVE-2023-20863, it is recommended to upgrade Apache Atlas to version
2.4.0, which includes an updated and secure version of the Spring
Framework-5.3.39.
[CVE-2023-20863|https://nvd.nist.gov/vuln/detail/CVE-2023-20863] Description
```
In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it
is possible for a user to provide a specially crafted SpEL expression that may
cause a denial-of-service (DoS) condition.
```
By upgrading Atlas-2.4.0, it used *springframework-5.3.39*
After upgrading atlas to 2.4.0, here is the dependency tree, which uses *atlas*
to *5.3.39*
{code:java}
[INFO] +- org.apache.atlas:atlas-intg:jar:2.4.0:compile
[INFO] | +- javax.inject:javax.inject:jar:1:compile
[INFO] | \- org.springframework:spring-context:jar:5.3.39:compile
[INFO] | +- org.springframework:spring-aop:jar:5.3.39:compile
[INFO] | +- org.springframework:spring-beans:jar:5.3.39:compile
[INFO] | +- org.springframework:spring-core:jar:5.3.39:compile
[INFO] | | \- org.springframework:spring-jcl:jar:5.3.39:compile
[INFO] | \- org.springframework:spring-expression:jar:5.3.39:compile {code}
Atlas spring framework used link is here -
[https://github.com/apache/atlas/blob/4787b753271718d0b06cf6545f331f9a12ce1f63/pom.xml#L179C1-L180C1]
was:
*Issue*
The current version of Ranger uses Apache Atlas 2.2.0, which transitively
depends on Spring Framework 4.3.29.RELEASE. This specific version of the Spring
Framework is vulnerable to CVE-2023-20863.
*Root Cause:*
The vulnerability exists due to the dependency on Apache Atlas 2.2.0, which
includes the outdated and vulnerable version of the Spring Framework
(4.3.29.RELEASE).
*Resolution Suggestion:*
To address CVE-2023-20863, it is recommended to upgrade Apache Atlas to version
2.4.0, which includes an updated and secure version of the Spring
Framework-5.3.39.
[CVE-2023-20863|https://nvd.nist.gov/vuln/detail/CVE-2023-20863] Description
```
In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it
is possible for a user to provide a specially crafted SpEL expression that may
cause a denial-of-service (DoS) condition.
```
By upgrading Atlas-2.4.0, it used *springframework-5.3.39*
After upgrading atlas to 2.4.0, here is the dependency tree, which uses atlas
to 5.3.39
{code:java}
[INFO] +- org.apache.atlas:atlas-intg:jar:2.4.0:compile
[INFO] | +- javax.inject:javax.inject:jar:1:compile
[INFO] | \- org.springframework:spring-context:jar:5.3.39:compile
[INFO] | +- org.springframework:spring-aop:jar:5.3.39:compile
[INFO] | +- org.springframework:spring-beans:jar:5.3.39:compile
[INFO] | +- org.springframework:spring-core:jar:5.3.39:compile
[INFO] | | \- org.springframework:spring-jcl:jar:5.3.39:compile
[INFO] | \- org.springframework:spring-expression:jar:5.3.39:compile {code}
[https://github.com/apache/atlas/blob/4787b753271718d0b06cf6545f331f9a12ce1f63/pom.xml#L179C1-L180C1]
> Bump Atlas to 2.4.0 to fix CVE's
> --------------------------------
>
> Key: RANGER-5095
> URL: https://issues.apache.org/jira/browse/RANGER-5095
> Project: Ranger
> Issue Type: Improvement
> Components: Ranger
> Reporter: Basapuram Kumar
> Priority: Major
>
> *Issue*
> The current version of Ranger uses Apache Atlas 2.2.0, which transitively
> depends on Spring Framework 4.3.29.RELEASE. This specific version of the
> Spring Framework is vulnerable to CVE-2023-20863.
> *Root Cause:*
> The vulnerability exists due to the dependency on Apache Atlas 2.2.0, which
> includes the outdated and vulnerable version of the Spring Framework
> (4.3.29.RELEASE).
> *Resolution Suggestion:*
> To address CVE-2023-20863, it is recommended to upgrade Apache Atlas to
> version 2.4.0, which includes an updated and secure version of the Spring
> Framework-5.3.39.
>
> [CVE-2023-20863|https://nvd.nist.gov/vuln/detail/CVE-2023-20863] Description
> ```
> In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ ,
> it is possible for a user to provide a specially crafted SpEL expression that
> may cause a denial-of-service (DoS) condition.
> ```
> By upgrading Atlas-2.4.0, it used *springframework-5.3.39*
> After upgrading atlas to 2.4.0, here is the dependency tree, which uses
> *atlas* to *5.3.39*
> {code:java}
> [INFO] +- org.apache.atlas:atlas-intg:jar:2.4.0:compile
> [INFO] | +- javax.inject:javax.inject:jar:1:compile
> [INFO] | \- org.springframework:spring-context:jar:5.3.39:compile
> [INFO] | +- org.springframework:spring-aop:jar:5.3.39:compile
> [INFO] | +- org.springframework:spring-beans:jar:5.3.39:compile
> [INFO] | +- org.springframework:spring-core:jar:5.3.39:compile
> [INFO] | | \- org.springframework:spring-jcl:jar:5.3.39:compile
> [INFO] | \- org.springframework:spring-expression:jar:5.3.39:compile
> {code}
>
> Atlas spring framework used link is here -
> [https://github.com/apache/atlas/blob/4787b753271718d0b06cf6545f331f9a12ce1f63/pom.xml#L179C1-L180C1]
>
>
--
This message was sent by Atlassian Jira
(v8.20.10#820010)