META-INF pom is considered as a vulnerability #5811
Replies: 3 comments 6 replies
-
Hello @o-shevchenko You're almost right. But why you think we don't need to include these dependencies in result? |
Beta Was this translation helpful? Give feedback.
-
Hey @DmitriyLewen , thanks for the response!
Because com.databricks:databricks-jdbc:2.6.36 doesn't bring any transitive dependencies (See But that's not the case here, even if you specify a newer version of the dependency and it will be present in classpath, Trivy still will be reporting vulnerability. Don't you agree? |
Beta Was this translation helpful? Give feedback.
-
We faced this issue again. Trivy reports |
Beta Was this translation helpful? Give feedback.
-
Description
Trivy reports vulnerabilities but such jars are not present in our Docker image. Gradle
dependencies
tree doesn't show it.Debug
parameter for Trivy also doesn't show such libs.After digging into it, we discovered that Trivy probably detects
META-INF/pom.xml
as a vulnerability.Particularly, it found
META-INF/pom.xml
introduced in the lastdatabricks-jdbc
jarProbably, Databricks should fix build for com.databricks:databricks-jdbc:2.6.36 as well, since
com.databricks:databricks-jdbc:2.6.34
doesn't include problematic dependencies inMETA-INF/pom.xml
but detection still should be fixed in Trivy for such cases.Desired Behavior
Trivy doesn't report vulnerability if the actual jar is not present.
Actual Behavior
Trivy reports vulnerability if the actual jar is not present but there is pom.xml with a problematic version
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Output Format
None
Mode
Standalone
Debug Output
Operating System
Linux
Version
TRIVY_IMAGE='aquasec/trivy:0.48.1'
Checklist
trivy image --reset
Beta Was this translation helpful? Give feedback.
All reactions