Thought you cleaned up your malicious flatmap-stream code? Check again.
You may have thought you’d read everything there was to read about flatmap-stream and as a result, fixed the offending component once and for all. However, after a deeper inspection of embedded components potentially still in use, the Sonatype Data Research team has uncovered a different reality.
The situation is similar to this. Imagine if a large meat manufacturer shipped a bunch of bad beef that was recalled. They’ve cleaned up their act and gotten rid of the tainted product from all of their manufacturing and packaging plants. However, the meat they sold to Picabe Burgers months ago, has been formed into hamburgers and stored in the freezer, ready to be cooked and sold in the coming weeks. The meat manufacturer is no longer “vulnerable”, but you the consumer could be exposed or “exploited” by what remains.
In this month’s Nexus Intelligence Insights, we’ll take a deeper dive into additional vector points that are at risk from the original flatmap-stream vulnerability, talk about something we at Sontatype call secondary expansion, and give remediation guidance on what to do next.
Name of Vuln/Sonatype ID: Sonatype-2018-0413
Type of Vulnerability: Malicious code injection
- hellhun_homelibrary 1.0.1
*** This is a Security Bloggers Network syndicated blog from Sonatype Blog authored by Elisa Velarde. Read the original post at: https://blog.sonatype.com/nexus-intelligence-insights-sonatype-2018-0413