Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Okhttp critical vulnerability #3664

Closed
JoseOrtiz opened this issue Jul 18, 2022 · 15 comments · Fixed by #3682
Closed

Okhttp critical vulnerability #3664

JoseOrtiz opened this issue Jul 18, 2022 · 15 comments · Fixed by #3682
Labels
tag: security Security related changes
Milestone

Comments

@JoseOrtiz
Copy link

Okhttp dependency has a high vulnerability fixed on version 4.9.2, as described here

Is there a plan to fix this?

@tstrohmeier
Copy link

+1

@devinsba
Copy link
Contributor

devinsba commented Jul 28, 2022

Hi folks. Thank you for the report. Unfortunately we cannot update to the 4.x line because it no longer supports Java 7, and requires adding the kotlin runtime which we would not be open to adding to our javaagent. We are looking at mitigating the issue, but the dependency will still exist and still get flagged by peoples security scanners. Long term we would either have to backport the fix or switch to a different client that supports all of our needs

The good news

Fortunately the scope of the security implications of this issue are quite limited for us. The only time there would be secrets in the header values would be when the javaagent is configured in an agentless fashion. So if you are using the javaagent with a standard agent deploy, sending telemetry data to an agent over http, udp, and/or unix domain sockets, then there won't ever be a secret in the headers. Not to mention, it would require that the API key/secret be configured in a malformed way

@devinsba
Copy link
Contributor

devinsba commented Aug 2, 2022

We have remediated the issue in #3682. This will be included in the next release

@devinsba devinsba added this to the 0.106.0 milestone Aug 2, 2022
@github-actions
Copy link

github-actions bot commented Aug 9, 2022

🤖 This issue has been addressed in the latest release. See full details in the Release Notes.

@github-actions github-actions bot closed this as completed Aug 9, 2022
@deganmee
Copy link

This still causes an issue for dev shops that make security a priority; even with patching the exploit, the existence of the library will cause false alerts.

@gsdatta
Copy link

gsdatta commented Aug 17, 2022

+1 to @deganmee, we cannot get past security review in many cases because the JAR still exists on the classpath

@aviorma
Copy link

aviorma commented Sep 4, 2022

+1
Can we get an ETA for this?

@deganmee
Copy link

From a support ticket:

This won’t be fully fixed before our team migrates the Java Tracer to Java 8 minimum, which will take a few weeks at the least.

@bantonsson
Copy link
Contributor

Yes, the official ETA is when we move to Java 8 minimum, which will happen within the next few weeks. I'm sorry that I can't be more precise than that, and it's very unfortunate that it's triggering false alerts in security scanners, but we are working on it.

@bantonsson bantonsson added the tag: security Security related changes label Sep 26, 2022
@deganmee
Copy link

deganmee commented Oct 11, 2022

Yes, the official ETA is when we move to Java 8 minimum, which will happen within the next few weeks. I'm sorry that I can't be more precise than that, and it's very unfortunate that it's triggering false alerts in security scanners, but we are working on it.

4 weeks later - we appreciate that you are working on this - any updates @bantonsson ?

@bantonsson
Copy link
Contributor

@deganmee Sorry that this is taking so long. Would love for things to move faster. We're tidying up the last few loose ends and are about to communicate with Java 7 customers and give them time to change (if needed) their build/deploy pipelines. The release and switch is expected to happen early November.

@jcoombs-at-cambia
Copy link

@bantonsson any updates you can provide?

@bantonsson
Copy link
Contributor

@jcoombs-at-cambia next week. We're really close with the last bits of cleanup.

@tstrohmeier
Copy link

@bantonsson When will you release it?

@devinsba
Copy link
Contributor

This was released as part of 1.0.0 so any of the 1.x versions have the fix

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
tag: security Security related changes
Projects
None yet
Development

Successfully merging a pull request may close this issue.

8 participants