arangodb
arangodb copied to clipboard
Vulnerabilities in arangodb 3.11
My Environment
- ArangoDB Version: 3.11
- Deployment Mode: cluster
- Deployment Strategy: Manual
- Configuration:
- Infrastructure: own
- Operating System: windows 10
- Total RAM in your machine: 32gb
- Disks in use: HDD
- Used Package:
Component, Query & Data
Affected feature:
AQL query (if applicable):
AQL explain and/or profile (if applicable):
Dataset:
Size of your Dataset on disk:
Replication Factor & Number of Shards (Cluster only):
Steps to reproduce
- i have downloaded the source code from gitbhub for 3.11 version
- Used Jfrog Xray to run scan on downloaded source code
- found the below mentioned vulnetabilities.
Problem: [{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-175028", "severity": 4, "message": "🐸 CVE-2021-23343 - Severity: High\nImpacted Components: path-parse:1.0.5", "source": "JFrog", "startLineNumber": 19, "startColumn": 5, "endLineNumber": 19, "endColumn": 43 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-175028", "severity": 4, "message": "🐸 CVE-2021-23343 - Severity: High\nImpacted Components: path-parse:1.0.6", "source": "JFrog", "startLineNumber": 20, "startColumn": 5, "endLineNumber": 20, "endColumn": 43 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-93302", "severity": 4, "message": "🐸 CVE-2019-20149 - Severity: High\nImpacted Components: kind-of:6.0.2", "source": "JFrog", "startLineNumber": 20, "startColumn": 5, "endLineNumber": 20, "endColumn": 43 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-262079", "severity": 4, "message": "🐸 CVE-2022-38900 - Severity: High\nImpacted Components: decode-uri-component:0.2.0", "source": "JFrog", "startLineNumber": 20, "startColumn": 5, "endLineNumber": 20, "endColumn": 43 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-127745", "severity": 4, "message": "🐸 CVE-2020-7751 - Severity: High\nImpacted Components: pathval:1.1.0", "source": "JFrog", "startLineNumber": 27, "startColumn": 5, "endLineNumber": 27, "endColumn": 21 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-231760", "severity": 4, "message": "🐸 CVE-2020-7677 - Severity: Critical\nImpacted Components: thenify:3.3.0", "source": "JFrog", "startLineNumber": 28, "startColumn": 5, "endLineNumber": 28, "endColumn": 33 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-522313", "severity": 4, "message": "🐸 CVE-2022-25883 - Severity: High\nImpacted Components: semver:5.5.0", "source": "JFrog", "startLineNumber": 28, "startColumn": 5, "endLineNumber": 28, "endColumn": 33 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-262099", "severity": 4, "message": "🐸 CVE-2022-24999 - Severity: High\nImpacted Components: qs:6.5.2", "source": "JFrog", "startLineNumber": 28, "startColumn": 5, "endLineNumber": 28, "endColumn": 33 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-176662", "severity": 4, "message": "🐸 CVE-2021-32640 - Severity: Medium\nImpacted Components: ws:5.2.2", "source": "JFrog", "startLineNumber": 28, "startColumn": 5, "endLineNumber": 28, "endColumn": 33 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-200203", "severity": 4, "message": "🐸 CVE-2021-44906 - Severity: Critical\nImpacted Components: minimist:0.0.8", "source": "JFrog", "startLineNumber": 29, "startColumn": 5, "endLineNumber": 29, "endColumn": 22 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-257996", "severity": 4, "message": "🐸 CVE-2022-3517 - Severity: High\nImpacted Components: minimatch:3.0.4", "source": "JFrog", "startLineNumber": 29, "startColumn": 5, "endLineNumber": 29, "endColumn": 22 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-95385", "severity": 4, "message": "🐸 CVE-2020-7598 - Severity: Medium\nImpacted Components: minimist:0.0.8", "source": "JFrog", "startLineNumber": 29, "startColumn": 5, "endLineNumber": 29, "endColumn": 22 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-200203", "severity": 4, "message": "🐸 CVE-2021-44906 - Severity: Critical\nImpacted Components: minimist:1.2.0", "source": "JFrog", "startLineNumber": 30, "startColumn": 5, "endLineNumber": 30, "endColumn": 25 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-412548", "severity": 4, "message": "🐸 CVE-2022-46175 - Severity: High\nImpacted Components: json5:1.0.1", "source": "JFrog", "startLineNumber": 30, "startColumn": 5, "endLineNumber": 30, "endColumn": 25 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-95385", "severity": 4, "message": "🐸 CVE-2020-7598 - Severity: Medium\nImpacted Components: minimist:1.2.0", "source": "JFrog", "startLineNumber": 30, "startColumn": 5, "endLineNumber": 30, "endColumn": 25 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-522313", "severity": 4, "message": "🐸 CVE-2022-25883 - Severity: High\nImpacted Components: semver:5.5.0", "source": "JFrog", "startLineNumber": 32, "startColumn": 5, "endLineNumber": 32, "endColumn": 24 },{ "resource": "/c:/Users/ru713f/Desktop/test/arangodb-3.11/3rdParty/V8/v7.9.317/tools/turbolizer/package.json", "owner": "generated_diagnostic_collection_name#3", "code": "XRAY-257996", "severity": 4, "message": "🐸 CVE-2022-3517 - Severity: High\nImpacted Components: minimatch:3.0.4", "source": "JFrog", "startLineNumber": 32, "startColumn": 5, "endLineNumber": 32, "endColumn": 24 }]
Expected result:
This affects me as well. Are these vulnerabilities mitigated by ArangoDB? It looks like the version of V8 used here (7.9) is from 2019. Node.js 16 LTS, which is now EOL, uses V8 9.0, while Node.js 18 LTS uses V8 10.1. As browsers have also moved on, it looks unlikely these vulnerabilities would be addressed in V8 7.9. What's standing in the way of upgrading ArangoDB's V8 to a more current version?
Edit: looks like #20324 and #20486 fixes this. Is it possible to patch this fix into 3.11 as well?
ArangoDB 3.12 is going to contain an upgraded V8.