You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have checked the branches or the maintainers' PRs for upcoming features.
Feature Request
Not a feature request, but I couldn't find a way to post a simple issue without using a form.
JDA depends on com.squareup.okhttp3:okhttp:4.9.3, which in turn depends on two vulnerable Kotlin libraries (kotlin-stdlib-common v1.4.0 and kotlin-stdlib v1.4.10). This is what the concerned Maven dependency tree looks like:
OkHttp doesn't seem to be affected by CVE-2020-15824 and CVE-2022-24329, as it doesn't rely on Kotlin scripting, but it still depends on the vulnerable libraries and is thus often detected as vulnerable by code analysis tools like SonarQube. CVE-2020-29582 might still apply.
Updating the OkHttp dependency would prevent this from happening and fix the vulnerability.
The text was updated successfully, but these errors were encountered:
mind-overflow
changed the title
Update OkHttp dependency to avoid CVE-2020-29582 and CVE-2020-15824
Update OkHttp dependency to avoid CVE-2020-29582, CVE-2020-15824 and CVE-2022-24329
Jan 16, 2023
No problem, and thank you for the great work!
I tried JDA 5.0.0-beta.3 and it seems fixed - we're left with a false positive, but nothing else can be done until okhttp releases a new version.
The reason is that with v4.10.0 they changed their dependencies to this:
So, while previously, okhttp v4.9.3 depended on com.squareup.okio:okiov2.8.0, newer okhttp v4.10.0 depends on com.squareup.okio:okio-jvmv3.0.0 which, now, imports the vulnerable org.jetbrains.kotlin:kotlin-stdlib-jdk8v1.5.31 package (CVE-2022-24329). Funnily enough, the previous com.squareup.okio:okio package did not have this issue.
This is fixed in com.squareup.okio:okio-jvmv3.3.0 but there's currently no okhttp release that depends on that version. All other CVEs are now fixed.
Thank you again and sorry for stealing your time! I guess I'll ping the people over at okhttp, tho this is very minor as it's just a false positive.
General Troubleshooting
Feature Request
Not a feature request, but I couldn't find a way to post a simple issue without using a form.
JDA depends on
com.squareup.okhttp3:okhttp:4.9.3
, which in turn depends on two vulnerable Kotlin libraries (kotlin-stdlib-common v1.4.0
andkotlin-stdlib v1.4.10
). This is what the concerned Maven dependency tree looks like:There are also related issues on the OkHttp repository: square/okhttp#6219 and square/okhttp#7217
OkHttp doesn't seem to be affected by CVE-2020-15824 and CVE-2022-24329, as it doesn't rely on Kotlin scripting, but it still depends on the vulnerable libraries and is thus often detected as vulnerable by code analysis tools like SonarQube. CVE-2020-29582 might still apply.
Concerned issues: CVE-2020-29582 | CVE-2020-15824 | CVE-2022-24329
Updating the OkHttp dependency would prevent this from happening and fix the vulnerability.
The text was updated successfully, but these errors were encountered: