dstl/baleen

Hello! we found a vulnerable dependency in your project.

JavaEcosystemResearch opened this issue · 0 comments

Hi! We spot a vulnerable dependency in your project, which might threaten your software. We also found another project that uses the same vulnerable dependency in a similar way as you did, and they have upgraded the dependency. We, thus, believe that your project is highly possible to be affected by this vulnerability similarly. The following shows the detailed information.

Vulnerability description

  • CVE: CVE-2019-16943
  • Vulnerable dependency: com.fasterxml.jackson.core:jackson-databind:2.9.8
  • Vulnerable function: com.fasterxml.jackson.databind.JavaType:isEnumType()
  • Invocation Path:
uk.gov.dstl.baleen.consumers.LocationElasticsearch:doProcess(org.apache.uima.jcas.JCas)
 ⬇️ 
com.fasterxml.jackson.databind.ObjectMapper:readValue(java.lang.String,java.lang.Class)
 ⬇️ 
...
 ⬇️ 
com.fasterxml.jackson.databind.JavaType:isEnumType()

Upgrade example

Another project also used the same dependency with a similar invocation path, and they have taken actions to resolve this issue.

com.visionarts.powerjambda.actions.JsonBodyActionRequestReader:readRequest(com.visionarts.powerjambda.AwsProxyRequest)
 ⬇️ 
com.fasterxml.jackson.databind.ObjectMapper:readValue(java.lang.String,java.lang.Class)
 ⬇️ 
...
 ⬇️ 
com.fasterxml.jackson.databind.JavaType:isEnumType()

Therefore, you might also need to upgrade this dependency. Hope this can help you! 😄