<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TOS 8 tRestClient error with indirectly referenced class after update of adobe cxf-rt-rs, databinding, client jars relating to CVE-2022-46364 vulnerabilities in Talend Studio</title>
    <link>https://community.qlik.com/t5/Talend-Studio/TOS-8-tRestClient-error-with-indirectly-referenced-class-after/m-p/2340612#M108630</link>
    <description>&lt;P&gt;Please help. How can I update the necessary cxf files and not break all the rest of the code?&lt;/P&gt;&lt;P&gt;We have Talend Open Studio Big Data 8.0.1 on Windows 2016 using tRestClient module to connect to a server. Recently our security group has made me update several jars due to the CVE-2022-46364 vulnerabilities. I have updated CXF-Core, CXF-RT-databinding-jaxb, CXF-RT-RS-client, and CXF-RT-RS-extension-providers to the latest version(s) 4.0.0. However, I now get the error - The type jakarta.ws.rs.ext.MessageBodyWriter cannot be resolved. It is indirectly referenced from required .class files. After doing some searching I replaced the jakarta.ws.rs.api with version 3.1.0 (was 2.1.0) and still have this error. In the code the errors are highlighted as the .getResponse() and .readfrom() classes in the following lines. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;code&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;int webClientResponseStatus_tRESTClient_2 = webClient_tRESTClient_2.getResponse().getStatus();&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;if (webClientResponseStatus_tRESTClient_2 &amp;gt;= 300) {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;throw new javax.ws.rs.WebApplicationException(webClient_tRESTClient_2.getResponse());&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;}&lt;/P&gt;&lt;P&gt;&amp;lt;/code&amp;gt;&lt;/P&gt;&lt;P&gt;and in the following&lt;/P&gt;&lt;P&gt;&amp;lt;code&amp;gt;&lt;/P&gt;&lt;P&gt; if (!org.apache.cxf.common.util.StringUtils.isEmpty(contentLength)&lt;/P&gt;&lt;P&gt; &amp;amp;&amp;amp; Integer.valueOf(contentLength) &amp;lt;= 0) {&lt;/P&gt;&lt;P&gt; try {&lt;/P&gt;&lt;P&gt; return org.dom4j.DocumentHelper.parseText("&amp;lt;root/&amp;gt;");&lt;/P&gt;&lt;P&gt; } catch (org.dom4j.DocumentException e_tRESTClient_2) {&lt;/P&gt;&lt;P&gt; e_tRESTClient_2.printStackTrace();&lt;/P&gt;&lt;P&gt; }&lt;/P&gt;&lt;P&gt; return null;&lt;/P&gt;&lt;P&gt; }&lt;/P&gt;&lt;P&gt; return super.readFrom(cls, type, anns, mt, headers, is);&lt;/P&gt;&lt;P&gt; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;});&lt;/P&gt;&lt;P&gt;&amp;lt;/code&amp;gt;&lt;/P&gt;</description>
    <pubDate>Fri, 15 Nov 2024 22:14:04 GMT</pubDate>
    <dc:creator>asheppardwork</dc:creator>
    <dc:date>2024-11-15T22:14:04Z</dc:date>
    <item>
      <title>TOS 8 tRestClient error with indirectly referenced class after update of adobe cxf-rt-rs, databinding, client jars relating to CVE-2022-46364 vulnerabilities</title>
      <link>https://community.qlik.com/t5/Talend-Studio/TOS-8-tRestClient-error-with-indirectly-referenced-class-after/m-p/2340612#M108630</link>
      <description>&lt;P&gt;Please help. How can I update the necessary cxf files and not break all the rest of the code?&lt;/P&gt;&lt;P&gt;We have Talend Open Studio Big Data 8.0.1 on Windows 2016 using tRestClient module to connect to a server. Recently our security group has made me update several jars due to the CVE-2022-46364 vulnerabilities. I have updated CXF-Core, CXF-RT-databinding-jaxb, CXF-RT-RS-client, and CXF-RT-RS-extension-providers to the latest version(s) 4.0.0. However, I now get the error - The type jakarta.ws.rs.ext.MessageBodyWriter cannot be resolved. It is indirectly referenced from required .class files. After doing some searching I replaced the jakarta.ws.rs.api with version 3.1.0 (was 2.1.0) and still have this error. In the code the errors are highlighted as the .getResponse() and .readfrom() classes in the following lines. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;code&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;int webClientResponseStatus_tRESTClient_2 = webClient_tRESTClient_2.getResponse().getStatus();&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;if (webClientResponseStatus_tRESTClient_2 &amp;gt;= 300) {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;throw new javax.ws.rs.WebApplicationException(webClient_tRESTClient_2.getResponse());&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;}&lt;/P&gt;&lt;P&gt;&amp;lt;/code&amp;gt;&lt;/P&gt;&lt;P&gt;and in the following&lt;/P&gt;&lt;P&gt;&amp;lt;code&amp;gt;&lt;/P&gt;&lt;P&gt; if (!org.apache.cxf.common.util.StringUtils.isEmpty(contentLength)&lt;/P&gt;&lt;P&gt; &amp;amp;&amp;amp; Integer.valueOf(contentLength) &amp;lt;= 0) {&lt;/P&gt;&lt;P&gt; try {&lt;/P&gt;&lt;P&gt; return org.dom4j.DocumentHelper.parseText("&amp;lt;root/&amp;gt;");&lt;/P&gt;&lt;P&gt; } catch (org.dom4j.DocumentException e_tRESTClient_2) {&lt;/P&gt;&lt;P&gt; e_tRESTClient_2.printStackTrace();&lt;/P&gt;&lt;P&gt; }&lt;/P&gt;&lt;P&gt; return null;&lt;/P&gt;&lt;P&gt; }&lt;/P&gt;&lt;P&gt; return super.readFrom(cls, type, anns, mt, headers, is);&lt;/P&gt;&lt;P&gt; }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;});&lt;/P&gt;&lt;P&gt;&amp;lt;/code&amp;gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 22:14:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Talend-Studio/TOS-8-tRestClient-error-with-indirectly-referenced-class-after/m-p/2340612#M108630</guid>
      <dc:creator>asheppardwork</dc:creator>
      <dc:date>2024-11-15T22:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: TOS 8 tRestClient error with indirectly referenced class after update of adobe cxf-rt-rs, databinding, client jars relating to CVE-2022-46364 vulnerabilities</title>
      <link>https://community.qlik.com/t5/Talend-Studio/TOS-8-tRestClient-error-with-indirectly-referenced-class-after/m-p/2340613#M108631</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Regarding of this Apache cxf security issues:&lt;/P&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2022-46363" alt="https://nvd.nist.gov/vuln/detail/CVE-2022-46363" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2022-46363&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It seems that it only applies if a CXF service is misconfigured, it is not a real-world vulnerability.&lt;/P&gt;&lt;P&gt;For vulnerabilities with CVE numbers CVE-2022-46363 and CVE-2022-46364, talend patch will be out by the end of this month tentatively as the 2023-01 release in talend subscription solution.&lt;/P&gt;&lt;P&gt;I’m afraid we do not supply patches for the Open Studio releases. We only provide patches for our subscription products.&lt;/P&gt;&lt;P&gt;With talend open studio, we will check it with our RD team to see if there is any mitigation instructions for existing products (talend open studio V 8.0) and will keep you posted as long as there is any information about the next release of Open Studio.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 07:06:00 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Talend-Studio/TOS-8-tRestClient-error-with-indirectly-referenced-class-after/m-p/2340613#M108631</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2023-01-09T07:06:00Z</dc:date>
    </item>
  </channel>
</rss>

