Skip to content

AWS ECR Image Scan Findings Report - comet-ml/backend-optimizer

Report Date and Time: 2024-12-12 15:57:29

Repository Name: comet-ml/backend-optimizer

Image Tag/Version: 2.1.4

Image Digest: sha256:c842b62c95c5f6f6f1a36f84c459a2d17ca9a4a22ee20ba52c63c77240f70f19

Scan Status: ACTIVE


CVE-2024-6232 - python3-libs, python3

Severity: HIGH

Status: ACTIVE

Description: There is a MEDIUM severity vulnerability affecting CPython.

Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.

Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

First Observed At: 2024-12-12T05:44:04.998000+00:00

Last Observed At: 2024-12-12T05:44:04.998000+00:00

Vulnerable Packages

  • python3-libs Version: 3.9.16

  • python3 Version: 3.9.16


AWS ECR Image Scan Findings Report - comet-ml/backend-react

Report Date and Time: 2024-12-12 15:57:31

Repository Name: comet-ml/backend-react

Image Tag/Version: 3.48.243

Image Digest: sha256:4c42f870589d45a2b09b928f5474e8212064001a8b813126d383c6c100aa6f1d

Scan Status: ACTIVE


CVE-2024-47535 - io.netty:netty-common

Severity: UNTRIAGED

Status: ACTIVE

Description: Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.

Score: 0.0

First Observed At: 2024-12-11T19:23:04.167000+00:00

Last Observed At: 2024-12-11T19:23:04.167000+00:00

Vulnerable Packages

  • io.netty:netty-common Version: 4.1.101.Final

CVE-2024-29025 - io.netty:netty-codec-http

Severity: UNTRIAGED

Status: ACTIVE

Description: Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The HttpPostRequestDecoder can be tricked to accumulate data. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, this field can cumulate data without limits. This vulnerability is fixed in 4.1.108.Final.

Score: 0.0

First Observed At: 2024-12-11T19:23:04.167000+00:00

Last Observed At: 2024-12-11T19:23:04.167000+00:00

Vulnerable Packages

  • io.netty:netty-codec-http Version: 4.1.100.Final

CVE-2024-9823 - org.eclipse.jetty:jetty-servlets

Severity: UNTRIAGED

Status: ACTIVE

Description: There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally.

Score: 0.0

First Observed At: 2024-12-11T19:23:04.167000+00:00

Last Observed At: 2024-12-11T19:23:04.167000+00:00

Vulnerable Packages

  • org.eclipse.jetty:jetty-servlets Version: 9.4.53.v20231009

AWS ECR Image Scan Findings Report - comet-ml/backend-postprocess

Report Date and Time: 2024-12-12 15:57:29

Repository Name: comet-ml/backend-postprocess

Image Tag/Version: 3.48.243

Image Digest: sha256:e87161b4b0d41f1a3b981b6333c5236d71521689abdd86ee697041af08142ee0

Scan Status: ACTIVE


CVE-2024-7254 - com.google.protobuf:protobuf-java

Severity: UNTRIAGED

Status: ACTIVE

Description: Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

Score: 0.0

First Observed At: 2024-12-11T19:22:42.830000+00:00

Last Observed At: 2024-12-11T19:22:42.830000+00:00

Vulnerable Packages

  • com.google.protobuf:protobuf-java Version: 3.21.9

CVE-2024-9823 - org.eclipse.jetty:jetty-servlets

Severity: UNTRIAGED

Status: ACTIVE

Description: There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally.

Score: 0.0

First Observed At: 2024-12-11T19:22:42.830000+00:00

Last Observed At: 2024-12-11T19:22:42.830000+00:00

Vulnerable Packages

  • org.eclipse.jetty:jetty-servlets Version: 9.4.53.v20231009

CVE-2024-47535 - io.netty:netty-common

Severity: UNTRIAGED

Status: ACTIVE

Description: Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.

Score: 0.0

First Observed At: 2024-12-11T19:22:42.830000+00:00

Last Observed At: 2024-12-11T19:22:42.830000+00:00

Vulnerable Packages

  • io.netty:netty-common Version: 4.1.111.Final

AWS ECR Image Scan Findings Report - comet-ml/frontend-nginx

Report Date and Time: 2024-12-12 15:57:30

Repository Name: comet-ml/frontend-nginx

Image Tag/Version: 5.90.12

Image Digest: sha256:0ac2ddc54fdce8257bf119dc73e48cf0de5754864dfa8075a77bd24e53567983

Scan Status: ACTIVE


No findings.

AWS ECR Image Scan Findings Report - comet-ml/backend-python

Report Date and Time: 2024-12-12 15:57:29

Repository Name: comet-ml/backend-python

Image Tag/Version: 3.48.243

Image Digest: sha256:10ef9d7409ded5956453db8080f88acb3c8dce603b46a993aa2aa624762b515f

Scan Status: ACTIVE


CVE-2024-7254 - com.google.protobuf:protobuf-java

Severity: UNTRIAGED

Status: ACTIVE

Description: Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

Score: 0.0

First Observed At: 2024-12-11T19:22:51.185000+00:00

Last Observed At: 2024-12-11T19:22:51.185000+00:00

Vulnerable Packages

  • com.google.protobuf:protobuf-java Version: 3.21.9

CVE-2024-47535 - io.netty:netty-common

Severity: UNTRIAGED

Status: ACTIVE

Description: Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.

Score: 0.0

First Observed At: 2024-12-11T19:22:51.185000+00:00

Last Observed At: 2024-12-11T19:22:51.185000+00:00

Vulnerable Packages

  • io.netty:netty-common Version: 4.1.101.Final

CVE-2024-9823 - org.eclipse.jetty:jetty-servlets

Severity: UNTRIAGED

Status: ACTIVE

Description: There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally.

Score: 0.0

First Observed At: 2024-12-11T19:22:51.185000+00:00

Last Observed At: 2024-12-11T19:22:51.185000+00:00

Vulnerable Packages

  • org.eclipse.jetty:jetty-servlets Version: 9.4.53.v20231009

Dec. 17, 2024