Skip to content

Comments

[Snyk] Security upgrade org.springframework.boot:spring-boot-starter-test from 2.0.0.RELEASE to 3.1.9#29

Open
weinrich15 wants to merge 1 commit intomasterfrom
snyk-fix-d0c862349bbe5e6741b1e0cbce68746b
Open

[Snyk] Security upgrade org.springframework.boot:spring-boot-starter-test from 2.0.0.RELEASE to 3.1.9#29
weinrich15 wants to merge 1 commit intomasterfrom
snyk-fix-d0c862349bbe5e6741b1e0cbce68746b

Conversation

@weinrich15
Copy link
Collaborator

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Buffer Overflow
SNYK-JAVA-COMJAYWAYJSONPATH-6140361
org.springframework.boot:spring-boot-starter-test:
2.0.0.RELEASE -> 3.1.9
Yes Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

@weinrich15
Copy link
Collaborator Author

Logo
Checkmarx One – Scan Summary & Details974ddaff-3c2e-4056-bf1f-8ac53961d182

New Issues

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2015-4852 Maven-commons-collections:commons-collections-3.2.1 Vulnerable Package
HIGH CVE-2015-6420 Maven-commons-collections:commons-collections-3.2.1 Vulnerable Package
HIGH CVE-2015-7501 Maven-commons-collections:commons-collections-3.2.1 Vulnerable Package
HIGH CVE-2016-10707 Npm-jquery-1.6.4 Vulnerable Package
HIGH CVE-2016-2170 Maven-commons-collections:commons-collections-3.2.1 Vulnerable Package
HIGH CVE-2022-4492 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2022-45688 Maven-org.json:json-20131018 Vulnerable Package
HIGH CVE-2023-1108 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2023-24998 Maven-org.apache.tomcat:tomcat-coyote-9.0.22 Vulnerable Package
HIGH CVE-2023-44487 Maven-org.apache.tomcat:tomcat-coyote-9.0.22 Vulnerable Package
HIGH CVE-2023-5072 Maven-org.json:json-20131018 Vulnerable Package
HIGH CVE-2023-5379 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
MEDIUM CVE-2007-2379 Npm-jquery-1.6.4 Vulnerable Package
MEDIUM CVE-2012-6708 Npm-jquery-1.6.4 Vulnerable Package
MEDIUM CVE-2014-6071 Npm-jquery-1.6.4 Vulnerable Package
MEDIUM CVE-2015-9251 Npm-jquery-1.6.4 Vulnerable Package
MEDIUM CVE-2019-11358 Npm-jquery-1.6.4 Vulnerable Package
MEDIUM CVE-2020-11022 Npm-jquery-1.6.4 Vulnerable Package
MEDIUM CVE-2020-11023 Npm-jquery-1.6.4 Vulnerable Package
MEDIUM CVE-2020-7656 Npm-jquery-1.6.4 Vulnerable Package
MEDIUM CVE-2023-42795 Maven-org.apache.tomcat:tomcat-util-9.0.22 Vulnerable Package
MEDIUM CVE-2023-42795 Maven-org.apache.tomcat:tomcat-coyote-9.0.22 Vulnerable Package
MEDIUM CVE-2023-45648 Maven-org.apache.tomcat:tomcat-coyote-9.0.22 Vulnerable Package
MEDIUM CVE-2024-21733 Maven-org.apache.tomcat:tomcat-coyote-9.0.22 Vulnerable Package
MEDIUM Cxf0b588a3-5c6f Npm-jquery-1.6.4 Vulnerable Package
MEDIUM RDS With Backup Disabled /rds.tf: 1 Make sure the AWS RDS configuration has automatic backup configured. If the retention period is equal to 0 there is no backup
MEDIUM Unpinned Actions Full Length Commit SHA /cx.yml: 13 Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps...
LOW Heap_Inspection /src/main/webapp/vulnerability/csrf/changepassword.jsp: 34 Attack Vector
LOW Heap_Inspection /src/main/webapp/vulnerability/Injection/orm.jsp: 31 Attack Vector
LOW Heap_Inspection /src/main/java/org/cysecurity/cspf/jvl/model/DBConnect.java: 28 Attack Vector
LOW Heap_Inspection /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 33 Attack Vector
LOW Use_Of_Hardcoded_Password /src/main/java/org/cysecurity/cspf/jvl/controller/rds.java: 8 Attack Vector
LOW Use_Of_Hardcoded_Password_In_Config /src/main/webapp/WEB-INF/config.properties: 6 Attack Vector

Fixed Issues

Severity Issue Source File / Package
HIGH CVE-2017-18640 Maven-org.yaml:snakeyaml-1.19
HIGH CVE-2018-1272 Maven-org.springframework:spring-core-5.0.4.RELEASE
HIGH CVE-2021-27568 Maven-net.minidev:json-smart-2.3
HIGH CVE-2021-31684 Maven-net.minidev:json-smart-2.3
HIGH CVE-2022-22965 Maven-org.springframework:spring-beans-5.0.4.RELEASE
HIGH CVE-2022-25857 Maven-org.yaml:snakeyaml-1.19
HIGH CVE-2022-27772 Maven-org.springframework.boot:spring-boot-2.0.0.RELEASE
HIGH Cx6a5f7948-7054 Maven-commons-collections:commons-collections-3.2.1
HIGH SQL_Injection /src/main/webapp/admin/adminlogin.jsp: 11
HIGH SQL_Injection /src/main/webapp/admin/adminlogin.jsp: 11
HIGH SQL_Injection /src/main/webapp/admin/adminlogin.jsp: 11
HIGH SQL_Injection /src/main/webapp/admin/adminlogin.jsp: 11
HIGH SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 44
HIGH SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 44
HIGH SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 44
HIGH SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 44
HIGH SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43
HIGH SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43
HIGH SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43
HIGH SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43
MEDIUM CSRF /src/main/webapp/admin/adminlogin.jsp: 12
MEDIUM CSRF /src/main/webapp/admin/adminlogin.jsp: 12
MEDIUM CSRF /src/main/webapp/admin/adminlogin.jsp: 11
MEDIUM CSRF /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43
MEDIUM CVE-2021-22060 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2021-22096 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2021-42550 Maven-ch.qos.logback:logback-classic-1.2.3
MEDIUM CVE-2021-42550 Maven-ch.qos.logback:logback-core-1.2.3
MEDIUM CVE-2022-22950 Maven-org.springframework:spring-expression-5.0.4.RELEASE
MEDIUM CVE-2022-22950 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2022-22968 Maven-org.springframework:spring-context-5.0.4.RELEASE
MEDIUM CVE-2022-22970 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2022-22970 Maven-org.springframework:spring-beans-5.0.4.RELEASE
MEDIUM CVE-2022-22971 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2022-38749 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-38750 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-38751 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-38752 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-41854 Maven-org.yaml:snakeyaml-1.19
MEDIUM Cleartext_Submission_of_Sensitive_Information /src/main/webapp/ForgotPassword.jsp: 44
MEDIUM External_Control_of_System_or_Config_Setting /src/main/webapp/vulnerability/baasm/SiteTitle.jsp: 32
MEDIUM External_Control_of_System_or_Config_Setting /src/main/webapp/admin/Configure.jsp: 21
MEDIUM External_Control_of_System_or_Config_Setting /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 56
MEDIUM External_Control_of_System_or_Config_Setting /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 58
MEDIUM External_Control_of_System_or_Config_Setting /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 55
MEDIUM External_Control_of_System_or_Config_Setting /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 57
MEDIUM External_Control_of_System_or_Config_Setting /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 54
MEDIUM External_Control_of_System_or_Config_Setting /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 59
MEDIUM Frameable_Login_Page /src/main/webapp/login.jsp: 1
MEDIUM HttpOnlyCookies_In_Config /src/main/webapp/WEB-INF/web.xml: 0
MEDIUM Input_Path_Not_Canonicalized /src/main/java/org/cysecurity/cspf/jvl/controller/AddPage.java: 39
MEDIUM Input_Path_Not_Canonicalized /src/main/webapp/vulnerability/idor/download.jsp: 11
MEDIUM Input_Path_Not_Canonicalized /src/main/webapp/vulnerability/idor/download.jsp: 11
MEDIUM Input_Path_Not_Canonicalized /src/main/webapp/vulnerability/sqli/download_id_union.jsp: 29
MEDIUM Input_Path_Not_Canonicalized /src/main/webapp/vulnerability/sqli/download_id_union.jsp: 29
MEDIUM Input_Path_Not_Canonicalized /src/main/webapp/vulnerability/sqli/download_id.jsp: 29
MEDIUM Input_Path_Not_Canonicalized /src/main/webapp/vulnerability/sqli/download_id.jsp: 29
MEDIUM Stored_Absolute_Path_Traversal /src/main/webapp/vulnerability/sqli/download_id.jsp: 29
MEDIUM Stored_Absolute_Path_Traversal /src/main/webapp/vulnerability/sqli/download_id_union.jsp: 29
LOW Creation_of_Temp_File_in_Dir_with_Incorrect_Permissions /src/main/java/org/cysecurity/cspf/jvl/controller/AddPage.java: 45
LOW Escape_False /src/main/webapp/WEB-INF/AdminPanel.jsp: 5
LOW Escape_False /src/main/webapp/vulnerability/xss/xss4.jsp: 15
LOW Escape_False /src/main/webapp/vulnerability/xss/search.jsp: 21
LOW Escape_False /src/main/webapp/vulnerability/unvalidated/OpenURL.jsp: 3
LOW Escape_False /src/main/webapp/vulnerability/unvalidated/OpenForward.jsp: 5
LOW Escape_False /src/main/webapp/vulnerability/unvalidated/OpenForward.jsp: 4
LOW Escape_False /src/main/webapp/vulnerability/unvalidated/OpenForward.jsp: 3
LOW Escape_False /src/main/webapp/vulnerability/SendMessage.jsp: 21
LOW Escape_False /src/main/webapp/vulnerability/Injection/xxe.jsp: 8
LOW Escape_False /src/main/webapp/vulnerability/Injection/xpath_login.jsp: 4
LOW Escape_False /src/main/webapp/login.jsp: 23
LOW Escape_False /src/main/webapp/login.jsp: 22
LOW Escape_False /src/main/webapp/header.jsp: 165
LOW Escape_False /src/main/webapp/header.jsp: 157
LOW Escape_False /src/main/webapp/header.jsp: 140
LOW Escape_False /src/main/webapp/header.jsp: 134
LOW Escape_False /src/main/webapp/header.jsp: 132
LOW Escape_False /src/main/webapp/header.jsp: 122
LOW Escape_False /src/main/webapp/header.jsp: 121
LOW Escape_False /src/main/webapp/header.jsp: 116
LOW Escape_False /src/main/webapp/header.jsp: 115
LOW Escape_False /src/main/webapp/header.jsp: 114
LOW Escape_False /src/main/webapp/header.jsp: 113
LOW Escape_False /src/main/webapp/header.jsp: 108
LOW Escape_False /src/main/webapp/header.jsp: 107
LOW Escape_False /src/main/webapp/header.jsp: 106
LOW Escape_False /src/main/webapp/header.jsp: 105
LOW Escape_False /src/main/webapp/header.jsp: 99
LOW Escape_False /src/main/webapp/header.jsp: 98
LOW Escape_False /src/main/webapp/header.jsp: 97
LOW Escape_False /src/main/webapp/header.jsp: 91
LOW Escape_False /src/main/webapp/header.jsp: 89
LOW Escape_False /src/main/webapp/header.jsp: 87
LOW Escape_False /src/main/webapp/header.jsp: 81
LOW Escape_False /src/main/webapp/header.jsp: 79
LOW Escape_False /src/main/webapp/header.jsp: 78
LOW Escape_False /src/main/webapp/header.jsp: 78
LOW Escape_False /src/main/webapp/header.jsp: 72
LOW Escape_False /src/main/webapp/header.jsp: 71
LOW Escape_False /src/main/webapp/header.jsp: 70
LOW Escape_False /src/main/webapp/header.jsp: 69
LOW Escape_False /src/main/webapp/header.jsp: 60
LOW Escape_False /src/main/webapp/header.jsp: 59
LOW Escape_False /src/main/webapp/header.jsp: 59
LOW Escape_False /src/main/webapp/header.jsp: 58
LOW Escape_False /src/main/webapp/header.jsp: 57
LOW Escape_False /src/main/webapp/header.jsp: 50
LOW Escape_False /src/main/webapp/header.jsp: 46
LOW Escape_False /src/main/webapp/header.jsp: 45
LOW Escape_False /src/main/webapp/header.jsp: 40
LOW Escape_False /src/main/webapp/header.jsp: 35
LOW Escape_False /src/main/webapp/header.jsp: 34
LOW Escape_False /src/main/webapp/header.jsp: 33
LOW Escape_False /src/main/webapp/header.jsp: 32
LOW Escape_False /src/main/webapp/header.jsp: 26
LOW Escape_False /src/main/webapp/header.jsp: 17
LOW Escape_False /src/main/webapp/header.jsp: 16
LOW Improper_Resource_Access_Authorization /src/main/webapp/vulnerability/sqli/download_id_union.jsp: 43
LOW Improper_Resource_Access_Authorization /src/main/webapp/vulnerability/sqli/download_id.jsp: 43
LOW Improper_Resource_Access_Authorization /src/main/webapp/vulnerability/idor/download.jsp: 24
LOW Improper_Resource_Access_Authorization /src/main/webapp/vulnerability/baasm/SiteTitle.jsp: 31
LOW Improper_Resource_Access_Authorization /src/main/webapp/header.jsp: 9
LOW Improper_Resource_Access_Authorization /src/main/webapp/admin/Configure.jsp: 20
LOW Improper_Resource_Access_Authorization /src/main/java/org/cysecurity/cspf/jvl/model/DBConnect.java: 26
LOW Improper_Resource_Access_Authorization /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 65
LOW Improper_Resource_Access_Authorization /src/main/java/org/cysecurity/cspf/jvl/controller/AddPage.java: 53
LOW Improper_Resource_Access_Authorization /src/main/java/org/cysecurity/cspf/jvl/controller/Unsecure_Storage_of_Encryption_Key.java: 26
LOW

More results are available on AST platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants