org.apache.calcite:calcite-core@1.23.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.calcite:calcite-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
XML External Entity (XXE) Injection

org.apache.calcite:calcite-core is a Core Calcite APIs and engine.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection via the SQL operators EXISTS_NODE, EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE that do not restrict XML External Entity references in their configuration.

Note: Users who expose these operators, typically by using Oracle dialect (for the first three) or MySQL dialect (for the last one), are affected by this vulnerability.

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.calcite:calcite-core to version 1.32.0 or higher.

[1.22.0,1.32.0)
  • H
Man-in-the-Middle (MitM)

org.apache.calcite:calcite-core is a Core Calcite APIs and engine.

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). The HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters.

The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications.

How to fix Man-in-the-Middle (MitM)?

Upgrade org.apache.calcite:calcite-core to version 1.26 or higher.

[,1.26)