ui icon indicating copy to clipboard operation
ui copied to clipboard

Address many security vulnerabilities in the latest Temporal UI release 2.26.1

Open sonpham96 opened this issue 1 year ago • 0 comments

Describe the bug A clear and concise description of what the bug is.

A quick scan by security vulnerability scanner results in 17 CVEs for the latest temporal UI image published on Docker hub temporalio/ui:2.26.1:

3 High CVEs:

  • CVE-2023-5363
  • CVE-2019-0190
  • CVE-2023-44487

12 medium CVEs:

  • CVE-2023-6129
  • CVE-2023-46218
  • CVE-2024-0727
  • CVE-2023-6992
  • CVE-2023-42366
  • CVE-2023-42365
  • CVE-2023-42364
  • CVE-2023-42363
  • CVE-2023-5678
  • CVE-2023-46219
  • CVE-2024-28180
  • CVE-2023-45288

2 low CVEs:

  • CVE-2024-2511
  • CVE-2023-6237

Scan Results:

Scan results for: image temporalio/ui:2.26.1 sha256:a5462f3261819dc0576369bfe9201854e6cee6a8caf97d3bd355f531312c1c86
Vulnerabilities
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
|      CVE       | SEVERITY | CVSS |          PACKAGE           |  VERSION  |      STATUS       | PUBLISHED  | DISCOVERED |                    DESCRIPTION                     |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-5363  | high     | 7.50 | openssl                    | 3.1.3-r0  | fixed in 3.1.4-r0 | > 5 months | < 1 hour   | Issue summary: A bug has been identified in the    |
|                |          |      |                            |           | > 5 months ago    |            |            | processing of key and initialisation vector (IV)   |
|                |          |      |                            |           |                   |            |            | lengths.  This can lead to potential truncation or |
|                |          |      |                            |           |                   |            |            | ov...                                              |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2019-0190  | high     | 7.50 | openssl                    | 3.1.3-r0  |                   | > 5 years  | < 1 hour   | A bug exists in the way mod_ssl handled client     |
|                |          |      |                            |           |                   |            |            | renegotiations. A remote attacker could send a     |
|                |          |      |                            |           |                   |            |            | carefully crafted request that would cause mod_ssl |
|                |          |      |                            |           |                   |            |            | to en...                                           |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-44487 | high     | 5.30 | golang.org/x/net           | v0.10.0   | fixed in 0.17.0   | > 6 months | < 1 hour   | The HTTP/2 protocol allows a denial of service     |
|                |          |      |                            |           | > 6 months ago    |            |            | (server resource consumption) because request      |
|                |          |      |                            |           |                   |            |            | cancellation can reset many streams quickly, as    |
|                |          |      |                            |           |                   |            |            | exploited...                                       |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-6129  | medium   | 6.50 | openssl                    | 3.1.3-r0  | fixed in 3.1.4-r3 | > 3 months | < 1 hour   | Issue summary: The POLY1305 MAC (message           |
|                |          |      |                            |           | > 3 months ago    |            |            | authentication code) implementation contains       |
|                |          |      |                            |           |                   |            |            | a bug that might corrupt the internal state of     |
|                |          |      |                            |           |                   |            |            | applications runn...                               |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-46218 | medium   | 6.50 | curl                       | 8.4.0-r0  | fixed in 8.5.0-r0 | > 4 months | < 1 hour   | This flaw allows a malicious HTTP server to set    |
|                |          |      |                            |           | > 4 months ago    |            |            | \"super cookies\" in curl that are then passed     |
|                |          |      |                            |           |                   |            |            | back to more origins than what is otherwise        |
|                |          |      |                            |           |                   |            |            | allowed or ...                                     |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2024-0727  | medium   | 5.50 | openssl                    | 3.1.3-r0  | fixed in 3.1.4-r5 | 83 days    | < 1 hour   | Issue summary: Processing a maliciously formatted  |
|                |          |      |                            |           | 84 days ago       |            |            | PKCS12 file may lead OpenSSL to crash leading      |
|                |          |      |                            |           |                   |            |            | to a potential Denial of Service attack  Impact    |
|                |          |      |                            |           |                   |            |            | summar...                                          |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-6992  | medium   | 5.50 | zlib                       | 1.2.13-r1 |                   | > 3 months | < 1 hour   | Cloudflare version of zlib library was found       |
|                |          |      |                            |           |                   |            |            | to be vulnerable to memory corruption issues       |
|                |          |      |                            |           |                   |            |            | affecting the deflation algorithm implementation   |
|                |          |      |                            |           |                   |            |            | (deflate.c)...                                     |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-42366 | medium   | 5.50 | busybox                    | 1.36.1    |                   | > 4 months | < 1 hour   | A heap-buffer-overflow was discovered in BusyBox   |
|                |          |      |                            |           |                   |            |            | v.1.36.1 in the next_token function at awk.c:1159. |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-42365 | medium   | 5.50 | busybox                    | 1.36.1    |                   | > 4 months | < 1 hour   | A use-after-free vulnerability was discovered in   |
|                |          |      |                            |           |                   |            |            | BusyBox v.1.36.1 via a crafted awk pattern in the  |
|                |          |      |                            |           |                   |            |            | awk.c copyvar function.                            |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-42364 | medium   | 5.50 | busybox                    | 1.36.1    |                   | > 4 months | < 1 hour   | A use-after-free vulnerability in BusyBox v.1.36.1 |
|                |          |      |                            |           |                   |            |            | allows attackers to cause a denial of service      |
|                |          |      |                            |           |                   |            |            | via a crafted awk pattern in the awk.c evaluate    |
|                |          |      |                            |           |                   |            |            | funct...                                           |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-42363 | medium   | 5.50 | busybox                    | 1.36.1    |                   | > 4 months | < 1 hour   | A use-after-free vulnerability was discovered      |
|                |          |      |                            |           |                   |            |            | in xasprintf function in xfuncs_printf.c:344 in    |
|                |          |      |                            |           |                   |            |            | BusyBox v.1.36.1.                                  |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-5678  | medium   | 5.30 | openssl                    | 3.1.3-r0  | fixed in 3.1.4-r1 | > 5 months | < 1 hour   | Issue summary: Generating excessively long X9.42   |
|                |          |      |                            |           | > 5 months ago    |            |            | DH keys or checking excessively long X9.42 DH keys |
|                |          |      |                            |           |                   |            |            | or parameters may be very slow.  Impact summary:   |
|                |          |      |                            |           |                   |            |            | A...                                               |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-46219 | medium   | 5.30 | curl                       | 8.4.0-r0  | fixed in 8.5.0-r0 | > 4 months | < 1 hour   | When saving HSTS data to an excessively long file  |
|                |          |      |                            |           | > 4 months ago    |            |            | name, curl could end up removing all contents,     |
|                |          |      |                            |           |                   |            |            | making subsequent requests using that file unaware |
|                |          |      |                            |           |                   |            |            | of...                                              |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2024-28180 | moderate | 0.00 | gopkg.in/square/go-jose.v2 | v2.6.0    | fixed in          | 41 days    | < 1 hour   | Package jose aims to provide an implementation     |
|                |          |      |                            |           | 34 days ago       |            |            | of the Javascript Object Signing and Encryption    |
|                |          |      |                            |           |                   |            |            | set of standards. An attacker could send a JWE     |
|                |          |      |                            |           |                   |            |            | containi...                                        |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-45288 | moderate | 0.00 | golang.org/x/net/http2     | v0.22.0   | fixed in 0.23.0   | 14 days    | < 1 hour   | An attacker may cause an HTTP/2 endpoint to        |
|                |          |      |                            |           | 14 days ago       |            |            | read arbitrary amounts of header data by sending   |
|                |          |      |                            |           |                   |            |            | an excessive number of CONTINUATION frames.        |
|                |          |      |                            |           |                   |            |            | Maintaining H...                                   |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2024-2511  | low      | 0.00 | openssl                    | 3.1.3-r0  | fixed in 3.1.4-r6 | n/a        | < 1 hour   | Issue summary: Some non-default TLS server         |
|                |          |      |                            |           | 9 days ago        |            |            | configurations can cause unbounded memory growth   |
|                |          |      |                            |           |                   |            |            | when processing TLSv1.3 sessions  Impact summary:  |
|                |          |      |                            |           |                   |            |            | An attac...                                        |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+
| CVE-2023-6237  | low      | 0.00 | openssl                    | 3.1.3-r0  | fixed in 3.1.4-r4 | > 3 months | < 1 hour   | Excessive time spent checking invalid RSA public   |
|                |          |      |                            |           | > 3 months ago    |            |            | keys                                               |
+----------------+----------+------+----------------------------+-----------+-------------------+------------+------------+----------------------------------------------------+

Vulnerabilities found for image temporalio/ui:2.26.1: total - 17, critical - 0, high - 3, medium - 12, low - 2
Vulnerability threshold check results: PASS

Compliance Issues
+----------+------------------------------------------------------------------------+
| SEVERITY |                              DESCRIPTION                               |
+----------+------------------------------------------------------------------------+
| high     | (CIS_Docker_v1.5.0 - 4.1) Image should be created with a non-root user |
+----------+------------------------------------------------------------------------+

Compliance found for image temporalio/ui:2.26.1: total - 1, critical - 0, high - 1, medium - 0, low - 0
Compliance threshold check results: PASS

To Reproduce Steps to reproduce the behavior:

  1. Pull the latest image temporalio/ui:2.26.1 from Dockerhub
  2. Scan the image with any vulnerability scanner

Expected behavior A clear and concise description of what you expected to happen.

There is no CVE found in the temporalio/ui image.

sonpham96 avatar Apr 19 '24 08:04 sonpham96