Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2023-41329 #3464

Closed
carlmolemans opened this issue Dec 15, 2023 · 2 comments · Fixed by #3468
Closed

CVE-2023-41329 #3464

carlmolemans opened this issue Dec 15, 2023 · 2 comments · Fixed by #3468
Labels
agent-java community Issues and PRs created by the community triage

Comments

@carlmolemans
Copy link

carlmolemans commented Dec 15, 2023

Dear,

I noticed that the elastic apm agent relies on wiremock 2.35.0 as test dependency (https://mvnrepository.com/artifact/com.github.tomakehurst/wiremock-jre8-standalone/2.35.0) which is vulnerable to CVE-2023-41329

Can you please bump this version to 2.35.1 ( https://mvnrepository.com/artifact/com.github.tomakehurst/wiremock-jre8-standalone/2.35.1 ) which contains the fix. This was released back 6th of september 23.

I read about your https://www.elastic.co/community/security stuff but I find it too much hassle to actually report a security issue at your side hence I use github.

Kr,

@github-actions github-actions bot added agent-java community Issues and PRs created by the community triage labels Dec 15, 2023
@SylvainJuge
Copy link
Member

Thanks for reporting this.
I'll take a look to see if we can upgrade it just to prevent further reports, but I don't think this is very high priority as it's a test library.

Security vulnerabilities should be reported to [email protected] as stated in https://www.elastic.co/community/security that you have read. One of the main reasons for doing so is that it provides some time to investigate and fix any serious security issue BEFORE it has been publicly disclosed.

Sorry if it looks like a rant, but reporting publicly first just adds extra pressure to the people in charge of maintaining the code and also transitively to all the users of the affected software component. While it might take us a few days to release a patched version it is not uncommon to see users with long release and deployment cycles, which could leave an open and documented security vulnerability ready for use in the field in their applications.
On the other end, just reporting it first allows to properly prioritize and coordinate those security issues to minimize exposure in the end-users applications that might be impacted.

Here Wiremock is just used as a test dependency which is not shipped within our product, we don't even use the proxy/recording feature of the library, thus this vulnerability very likely does not affects us.

@carlmolemans
Copy link
Author

Thanks for reporting this. I'll take a look to see if we can upgrade it just to prevent further reports, but I don't think this is very high priority as it's a test library.

Security vulnerabilities should be reported to [email protected] as stated in https://www.elastic.co/community/security that you have read. One of the main reasons for doing so is that it provides some time to investigate and fix any serious security issue BEFORE it has been publicly disclosed.

Sorry if it looks like a rant, but reporting publicly first just adds extra pressure to the people in charge of maintaining the code and also transitively to all the users of the affected software component. While it might take us a few days to release a patched version it is not uncommon to see users with long release and deployment cycles, which could leave an open and documented security vulnerability ready for use in the field in their applications. On the other end, just reporting it first allows to properly prioritize and coordinate those security issues to minimize exposure in the end-users applications that might be impacted.

Here Wiremock is just used as a test dependency which is not shipped within our product, we don't even use the proxy/recording feature of the library, thus this vulnerability very likely does not affects us.

I understand your rant, however this CVE was already publicly disclosed due to automated scanners on eg. mvnrepository.org. I argue that it was already publicly disclosed.

Nonetheless I thank you for fixing the issue within 3 days.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
agent-java community Issues and PRs created by the community triage
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants