-
Notifications
You must be signed in to change notification settings - Fork 5.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security Vulnerability fix for helix-core [CVE-2023-38647] #23820
base: master
Are you sure you want to change the base?
Conversation
Please revise the release note entry to include the PR number, and also to follow the Order of changes in the Release Notes Guidelines. Maybe something like:
|
Thanks for pointing out. Updated the release note. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please squash your commits into a single commit may be something like -
Fix CVE-2023-38647 helix-core in presto-pinot connector
Also rebase your PR on lastest master as well.
@@ -30,6 +30,10 @@ | |||
<groupId>com.google.errorprone</groupId> | |||
<artifactId>error_prone_annotations</artifactId> | |||
</exclusion> | |||
<exclusion> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are we confident this dependency is not required? Can we not upgrade the dependency to a newer version without the CVE?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I see that the most recent versions of helix-core don't have any CVE - https://mvnrepository.com/artifact/org.apache.helix/helix-core
I also see that newer versions of Pinot are already on one of these versions, we can also explore upgrading Pinot if it's relatively less complex.
Description
Fixes the helix-core security vulnerability CVE-2023-38647 by removing helix-core package from presto-pinot.
Motivation and Context
An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. This unbounded deserialization can likely lead to remote code execution. The code can be run in Helix REST start and Workflow creation. Affect all the versions lower and include 1.2.0. Affected products: helix-core, helix-rest Mitigation: Short term, stop using any YAML based configuration and workflow creation.
Impact
NA
Test Plan
Contributor checklist
Release Notes