We scan all our images with Trivy. The latest SonarQube developer editions report a critical vulnerability with org.thymeleaf:thymeleaf-spring5. The community edition doesn’t report this vulnerability.
- SonarQube developer Edition
- versions: 9.2.1.49989, 8.9.3.48735, 8.9.2.46101
- error observed (wrap logs/code around triple quote ``` for proper formatting)
# trivy image --skip-update sonarqube:9.2.1-developer
2021-12-06T15:13:37.749Z INFO Detected OS: alpine
2021-12-06T15:13:37.749Z INFO Detecting Alpine vulnerabilities...
2021-12-06T15:13:37.751Z INFO Number of language-specific files: 1
2021-12-06T15:13:37.751Z INFO Detecting jar vulnerabilities...
sonarqube:9.2.1-developer (alpine 3.14.3)
=========================================
Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)
Java (jar)
==========
Total: 9 (UNKNOWN: 0, LOW: 3, MEDIUM: 3, HIGH: 2, CRITICAL: 1)
<skip non-criticals in log>
------------------------------+
| org.thymeleaf:thymeleaf-spring5 | CVE-2021-43466 | CRITICAL | 3.0.12.RELEASE | | Template injection |
| | | | | | in thymeleaf-spring5 |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-43466 |
+--------------------------------------+------------------+----------+-------------------+---------------+---------------------------------------+
- steps to reproduce. Run trivy (docker image)
# trivy image --skip-update sonarqube:9.2.1-developer
- potential workaround: the image works, but is vulnerable to attacks. Risk is unclear.