-
Notifications
You must be signed in to change notification settings - Fork 6k
Consider downgrading to Nimbus 8 #9399
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Fixed via e79141a |
Unfortunately this broke
And unfortunately Spring Security 5.4.2 has its own vulnerability, so it is a bit of egg-chicken problem I will come up with a full issue, just don't have time right now to create a new project and tinker with its setup. |
@ThanksForAllTheFish that's absolutely correct. We are struggling with the same CVE right now. However I think upgrade to nimbus 9.x won't solve the issue, but will hide it. The fix for json-smart library doesn't exist right now and doesn't look like it will be in the nearest future. I opened an issue in nimbus repository as well: https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/411/json-smart-critical-vulnerability-cve-2021 |
@erlioniel I guess this is not the right channel, but if I got it correctly with nimbus 9 json smart is shaded and optional, somehow you can remove the library from the classpath and still have JWT parsing working. That is what
does. After that you can run |
@ThanksForAllTheFish the problem I'm stating is not that the dependency will present in the tree, but the fact that the dependency with vulnerability will be bundled without fix. Which will hide the problem, not solve it. |
@erlioniel and @jzheaux so as oauth2-oidc-sdk-9.2.2 has fixed the vulnerability CVE-2021-27568 - how to handle this with spring-boot-2.4.4 and spring-security-5.4.5 ? |
@barclay-reg depends on what solution are you looking for. If you are looking for a fixed issue - using oidc-sdk 9.2.2 is a good option, so you have to force the particular version of the dependency. If you are looking for a fix in the report - I doubt it's possible right now, because For our project, we checked that the issue itself doesn't cause any data exposure and added this particular library as an exception. According to oidc-sdk devs |
@barclay-reg @ThanksForAllTheFish and everyone interested in the issue - there is a fixed version of |
@erlioniel many thanks for this hint - luckily 2.4.1 is back to java-8 (as 2.4 made the jump to java-11) .. although: the jdk-8 and jdk-7 (?) builds are failing ... |
@barclay-reg Nimbus backported the related fix to Spring Boot 2.4.4 is on |
@jzheaux they backported the custom fix to 8.x, however I think the the correct solution will be to bump json-smart version for oauth-sdk & jose-jwt and then bump the dependency in spring security as well. |
Thanks for sharing, @erlioniel, and for the tickets you filed to the Nimbus project to update the json-smart dependency.
I appreciate this suggestion. Generally, though, Spring Security only manages its direct dependencies. I think the result will be the same by updating to the latest 8.x on the next patch release. |
Due to a version incompatibility between
oauth2-oidc-sdk:8.x
andnimbus-jose-jwt:9.x
, various users have reported friction with using Spring Security 5.4.x.Since Spring Security doesn't rely on any
nimbus-jose-jwt:9.x
features, and since Nimbus will be supportingnimbus-jose-jwt:8.20.x
for a longer time than normal, it seems like a win-win to change Spring Security 5.4.x to usenimbus-jose-jwt:8.20.x
instead.Anyone who needs 9.x features from
nimbus-jose-jwt
could declare their own dependency version in their applications.The text was updated successfully, but these errors were encountered: