-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CDK custom resource CustomCDKBucketDeployment: SecurityHub HIGH notification: CVE-2023-43804 - Python urllib3 #27661
Comments
@aws/aws-cdk-maintainers |
Taking a look into replicating this issue. |
I have the same problem. Critical security report for a bunch of Custom Resources. Recommended mitigation by AWS inspector: |
Hey @volkovartem , could you please tell us which resources are you seeing these for? Also what cdk version are you using right now? |
Hey @Rick-Ernsting , I tried replicating with the code you mentioned but that does not create And could you also share what your
|
Can confirm, I see |
I released a newer version of this library but it has not made to the cdk repo yet. Upgrading this could help with resolving a security issue: #27661 Needed to run multiple integ tests for this and got warnings similar to following: ``` Stack: test-bucket-deployment-deployed-bucket - Resource: DeployMe5AwsCliLayerF0F79631 - Impact: WILL_REPLACE !!! If these destructive changes are necessary, please indicate this on the PR !!! Failed: /Users/vinakuk/Desktop/Work/Repositories/CDK/Ops/Security-Issue/aws-cdk/packages/@aws-cdk-testing/framework-integ/test/aws-s3-deployment/test/integ.bucket-deployment-signcontent.js !!! This test contains destructive changes !!! ``` I believe this is expected since the version of the library is changing. ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Hey, we have merged in the update. It would make it into the next cdk release Keeping this issue open to confirm if that release resolves the issue for you. |
Hello Vinayak, |
Thank you, guys! |
Hey apologies, there was an issue after merging this in the pipeline. I am actively looking into it and will update here with the progress. |
Hey, thank you for your patience. :) We have released it as part of our most recent update: https://github.com/aws/aws-cdk/releases/tag/v2.106.0. Please let me know if you still see a security hub notification after updating to this version. |
I released a newer version of this library but it has not made to the cdk repo yet. Upgrading this could help with resolving a security issue: #27661 Needed to run multiple integ tests for this and got warnings similar to following: ``` Stack: test-bucket-deployment-deployed-bucket - Resource: DeployMe5AwsCliLayerF0F79631 - Impact: WILL_REPLACE !!! If these destructive changes are necessary, please indicate this on the PR !!! Failed: /Users/vinakuk/Desktop/Work/Repositories/CDK/Ops/Security-Issue/aws-cdk/packages/@aws-cdk-testing/framework-integ/test/aws-s3-deployment/test/integ.bucket-deployment-signcontent.js !!! This test contains destructive changes !!! ``` I believe this is expected since the version of the library is changing. ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Hello Vinayak. Thank you for the update. I see that the urllib3 library is updated to a version which doesn't contain the CVE-2023-43804 problem. I updated and deployed my stacks and saw that the security hub/inspector notification disappeared. |
Closed |
|
Describe the bug
In SecurityHub we get a HIGH severity notification "CVE-2023-43804 - urllib3" with message:
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the
Cookie
HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify aCookie
header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.We get this notification when the CDK custom resource CustomCDKBucketDeployment is deployed by CDK. Can you update urllib3 to a version which is not vulnerable?
Expected Behavior
That we get no SecurityHub notification
Reproduction Steps
When we deploy this:
We then see the SecurityHub HIGH notification: CVE-2023-43804 - Python urllib3
Possible Solution
Upgrade Python urllib library
Additional Information/Context
No response
CDK CLI Version
2.96.2
Framework Version
No response
Node.js Version
18.16.0
OS
Windows
Language
TypeScript, Python
Language Version
TypeScript 5.1.3
Other information
No response
The text was updated successfully, but these errors were encountered: