[ 
https://issues.apache.org/jira/browse/BEAM-5075?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17547356#comment-17547356
 ] 

Albert Baker commented on BEAM-5075:
------------------------------------

Suresh : 

Yes sir, this is still an issue in this and /every/ apache project, git hub 
project, everywhere on the planet, that doesn't already have this implemented.  
 Every software project pulls in third party libray dependencies.   Many of 
them currently have, or /soon/ will have recently discovered vulnerabilities in 
the libraies.   Running OWASP dependency check prior to every release, 
highlights which libraies to update prior to release.

I cant tell you how many times I performed security assessmsnts on 
servers/services and used OWASP Dependency check as a key to tell me where the 
vulnerabilities were in a system.   Researchers who discover the flaws, write a 
proof-of-concept "test" to deomonstrate the flaw.  Often times after the flaw 
is fixed, the researcher publishes the proof-of-concept on the internet.  If 
you find the PoC, you have a slam dunk missle body of an exploit, all you have 
to do is package in a warhead/payload.    Most "defender type" security 
analysts wont go to this level of trouble, but hackers and spies will.

Customers who have apache servers/services/components running in production, 
might not know of the currently security vulnerabilities within the libraies so 
they wont get upgraded  Most do keep up on version releases...and note the 
reasons why the new version was released.  Security issues in the component 
/and the libraries/ gets their attention.    Apache should IMHO, be a good 
example/steward of the processing infrastructure of the world and keep thier 
components up2date, and note in the update read.me if there were security 
imporovements including third party library upgrades.

 

Thank you for your time.

 

> Please add OWASP Dependency Check to the build
> ----------------------------------------------
>
>                 Key: BEAM-5075
>                 URL: https://issues.apache.org/jira/browse/BEAM-5075
>             Project: Beam
>          Issue Type: New Feature
>          Components: build-system
>    Affects Versions: 3.0.0, 2.6.0, 2.7.0
>         Environment: All development, build, test, environments.
>            Reporter: Albert Baker
>            Priority: P3
>              Labels: build, easy-fix, security
>   Original Estimate: 1h
>  Remaining Estimate: 1h
>
>  Please add OWASP Dependency Check to the build (pom.xml).  OWASP DC makes an 
> outbound REST call to MITRE Common Vulnerabilities & Exposures (CVE) to 
> perform a lookup for each dependant .jar to list any/all known 
> vulnerabilities for each jar.  This step is needed because a manual MITRE CVE 
> lookup/check on the main component does not include checking for 
> vulnerabilities in components or in dependant libraries.
> OWASP Dependency check : 
> https://www.owasp.org/index.php/OWASP_Dependency_Check has plug-ins for most 
> Java build/make types (ant, maven, ivy, gradle).   
> Also, add the appropriate command to the nightly build to generate a report 
> of all known vulnerabilities in any/all third party libraries/dependencies 
> that get pulled in. example : mvn -Powasp -Dtest=false -DfailIfNoTests=false 
> clean aggregate
> Generating this report nightly/weekly will help inform the project's 
> development team if any dependant libraries have a reported known 
> vulnerailities.  Project teams that keep up with removing vulnerabilities on 
> a weekly basis will help protect businesses that rely on these open source 
> componets.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)

Reply via email to