Skip to content
This repository has been archived by the owner on Aug 7, 2023. It is now read-only.

[Snyk-dev] Fix for 41 vulnerabilities #75

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

admons
Copy link

@admons admons commented Apr 20, 2022

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244
com.amazonaws:aws-java-sdk-s3:
1.11.640 -> 1.12.202
No No Known Exploit
high severity 584/1000
Why? Has a fix available, CVSS 7.4
Improper Authorization
SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276
com.google.cloud:google-cloud-storage:
1.74.0 -> 2.1.9
Yes No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMGOOGLEPROTOBUF-2331703
com.google.cloud:google-cloud-storage:
1.74.0 -> 2.1.9
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No No Known Exploit
medium severity 651/1000
Why? Mature exploit, Has a fix available, CVSS 5.3
Directory Traversal
SNYK-JAVA-COMMONSIO-1277109
org.kie:kie-ci:
7.32.0.Final -> 7.32.0.k20191220
No Mature
high severity 751/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.6
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1040458
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Arbitrary File Deletion
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051966
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 711/1000
Why? Mature exploit, Has a fix available, CVSS 6.5
Server-Side Request Forgery (SSRF)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051967
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Mature
medium severity 611/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.8
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088328
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088329
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088330
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
critical severity 776/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 9.1
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088331
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 626/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.1
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088332
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088333
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 626/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.1
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088334
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088335
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 626/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.1
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088336
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088337
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088338
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 631/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.2
Deserialization of Untrusted Data
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1294540
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569176
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569177
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569178
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569179
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569180
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569181
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569182
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Remote Code Execution (RCE)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569183
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569185
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569186
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Arbitrary Code Execution
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569187
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569189
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Server-Side Request Forgery (SSRF)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569190
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 746/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.5
Server-Side Request Forgery (SSRF)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569191
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-2388977
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No No Known Exploit
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Arbitrary Code Injection
SNYK-JAVA-ORGAPACHEANT-1015405
org.kie:kie-ci:
7.32.0.Final -> 7.32.0.k20191220
No No Known Exploit
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Insecure Default
SNYK-JAVA-ORGAPACHEANT-569130
org.kie:kie-ci:
7.32.0.Final -> 7.32.0.k20191220
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Output Neutralization for Logs
SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Input Validation
SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No No Known Exploit
critical severity 947/1000
Why? Mature exploit, Recently disclosed, Has a fix available, CVSS 9.8
Remote Code Execution
SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
org.kie:kie-spring:
7.32.0.Final -> 7.68.0.Final
No Mature
low severity 471/1000
Why? Recently disclosed, Has a fix available, CVSS 3.7
Improper Handling of Case Sensitivity
SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Vulnerabilities that could not be fixed

  • Upgrade:
    • Could not upgrade org.springframework.boot:[email protected] to org.springframework.boot:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.3.6.RELEASE/spring-boot-dependencies-2.3.6.RELEASE.pom
    • Could not upgrade org.springframework:[email protected] to org.springframework:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/spring-framework-bom/5.2.11.RELEASE/spring-framework-bom-5.2.11.RELEASE.pom

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Arbitrary File Deletion
🦉 Server-Side Request Forgery (SSRF)
🦉 Remote Code Execution (RCE)
🦉 More lessons are available in Snyk Learn

The following vulnerabilities are fixed with an upgrade:
- https://dev.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244
- https://dev.snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276
- https://dev.snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-2331703
- https://dev.snyk.io/vuln/SNYK-JAVA-COMMONSIO-1277109
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1040458
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051966
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1051967
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088328
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088329
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088330
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088331
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088332
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088333
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088334
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088335
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088336
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088337
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1088338
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1294540
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569176
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569177
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569178
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569179
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569180
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569181
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569182
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569183
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569185
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569186
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569187
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569189
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569190
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-1569191
- https://dev.snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-2388977
- https://dev.snyk.io/vuln/SNYK-JAVA-ORGAPACHEANT-1015405
- https://dev.snyk.io/vuln/SNYK-JAVA-ORGAPACHEANT-569130
- https://dev.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
- https://dev.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
- https://dev.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
- https://dev.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
- https://dev.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants