Skip to content

Comments

[Snyk] Security upgrade org.springframework.boot:spring-boot-starter-test from 2.0.0.RELEASE to 3.3.7#43

Open
weinrich15 wants to merge 1 commit intomasterfrom
snyk-fix-a75c3828f1d254bfe55488186a1919c1
Open

[Snyk] Security upgrade org.springframework.boot:spring-boot-starter-test from 2.0.0.RELEASE to 3.3.7#43
weinrich15 wants to merge 1 commit intomasterfrom
snyk-fix-a75c3828f1d254bfe55488186a1919c1

Conversation

@weinrich15
Copy link
Collaborator

snyk-top-banner

Snyk has created this PR to fix 3 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
medium severity Improper Neutralization of Special Elements
SNYK-JAVA-CHQOSLOGBACK-8539866
  509   org.springframework.boot:spring-boot-starter-test:
2.0.0.RELEASE -> 3.3.7
Major version upgrade No Known Exploit
medium severity Improper Neutralization of Special Elements
SNYK-JAVA-CHQOSLOGBACK-8539867
  509   org.springframework.boot:spring-boot-starter-test:
2.0.0.RELEASE -> 3.3.7
Major version upgrade No Known Exploit
low severity Server-side Request Forgery (SSRF)
SNYK-JAVA-CHQOSLOGBACK-8539865
  334   org.springframework.boot:spring-boot-starter-test:
2.0.0.RELEASE -> 3.3.7
Major version upgrade No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Server-side Request Forgery (SSRF)

@weinrich15
Copy link
Collaborator Author

Logo
Checkmarx One – Scan Summary & Details4eb21d31-052d-4cfd-9401-339912fe00c3

New Issues (72)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2023-1973 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2023-3223 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2023-4639 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2024-1635 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2024-38286 Maven-org.apache.tomcat:tomcat-coyote-9.0.22 Vulnerable Package
HIGH CVE-2024-4109 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2024-7885 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH Reflected_XSS_All_Clients /src/main/webapp/admin/adminlogin.jsp: 68
detailsThe method adminlogin embeds untrusted data in generated output with print, at line 68 of /src/main/webapp/admin/adminlogin.jsp. This untrusted dat...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/Injection/xpath_login.jsp: 9
detailsThe method xpath_login embeds untrusted data in generated output with print, at line 9 of /src/main/webapp/vulnerability/Injection/xpath_login.jsp....
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/SendMessage.jsp: 11
detailsThe method SendMessage embeds untrusted data in generated output with print, at line 11 of /src/main/webapp/vulnerability/SendMessage.jsp. This unt...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/SendMessage.jsp: 18
detailsThe method SendMessage embeds untrusted data in generated output with print, at line 18 of /src/main/webapp/vulnerability/SendMessage.jsp. This unt...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/login.jsp: 26
detailsThe method login embeds untrusted data in generated output with print, at line 26 of /src/main/webapp/login.jsp. This untrusted data is embedded in...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/xss/xss4.jsp: 2
detailsThe method xss4 embeds untrusted data in generated output with keyword, at line 15 of /src/main/webapp/vulnerability/xss/xss4.jsp. This untrusted d...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/xss/xss4.jsp: 2
detailsThe method xss4 embeds untrusted data in generated output with print, at line 6 of /src/main/webapp/vulnerability/xss/xss4.jsp. This untrusted data...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/xss/search.jsp: 16
detailsThe method search embeds untrusted data in generated output with searchedName, at line 21 of /src/main/webapp/vulnerability/xss/search.jsp. This un...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/UserDetails.jsp: 8
detailsThe method UserDetails embeds untrusted data in generated output with print, at line 23 of /src/main/webapp/vulnerability/UserDetails.jsp. This unt...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/login.jsp: 7
detailsThe method login embeds untrusted data in generated output with username, at line 22 of /src/main/webapp/login.jsp. This untrusted data is embedded...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/login.jsp: 7
detailsThe method login embeds untrusted data in generated output with password, at line 23 of /src/main/webapp/login.jsp. This untrusted data is embedded...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/java/org/cysecurity/cspf/jvl/controller/xxe.java: 44
detailsThe method processRequest embeds untrusted data in generated output with print, at line 54 of /src/main/java/org/cysecurity/cspf/jvl/controller/xxe...
Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/java/org/cysecurity/cspf/jvl/controller/AddPage.java: 39
detailsThe method processRequest embeds untrusted data in generated output with print, at line 55 of /src/main/java/org/cysecurity/cspf/jvl/controller/Add...
Attack Vector
HIGH Unsafe_Reflection /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 55
detailsThe input obtained by processRequest in /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java at line 55 affects the invocation of a refle...
Attack Vector
HIGH XPath_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/XPathQuery.java: 36
detailsThe application's processRequest method constructs an XPath query, for navigating an XML document. The XPath query is created with compile, at line...
Attack Vector
HIGH XPath_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/XPathQuery.java: 35
detailsThe application's processRequest method constructs an XPath query, for navigating an XML document. The XPath query is created with compile, at line...
Attack Vector
MEDIUM CSRF /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43
detailsMethod processRequest at line 43 of /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java gets a parameter from a user request from...
Attack Vector
MEDIUM CSRF /src/main/webapp/admin/adminlogin.jsp: 12
detailsMethod adminlogin at line 12 of /src/main/webapp/admin/adminlogin.jsp gets a parameter from a user request from ""password"". This parameter value ...
Attack Vector
MEDIUM CSRF /src/main/webapp/admin/adminlogin.jsp: 12
detailsMethod adminlogin at line 12 of /src/main/webapp/admin/adminlogin.jsp gets a parameter from a user request from ""password"". This parameter value ...
Attack Vector
MEDIUM CSRF /src/main/webapp/admin/adminlogin.jsp: 11
detailsMethod adminlogin at line 11 of /src/main/webapp/admin/adminlogin.jsp gets a parameter from a user request from ""username"". This parameter value ...
Attack Vector
MEDIUM CVE-2021-20220 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
MEDIUM CVE-2024-12798 Maven-ch.qos.logback:logback-core-1.5.12 Vulnerable Package
MEDIUM CVE-2024-12798 Maven-ch.qos.logback:logback-classic-1.5.12 Vulnerable Package
MEDIUM HttpOnlyCookies /src/main/webapp/admin/adminlogin.jsp: 37
detailsThe web application's adminlogin method creates a cookie privilege, at line 37 of /src/main/webapp/admin/adminlogin.jsp, and returns it in the resp...
Attack Vector
MEDIUM HttpOnlyCookies /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 59
detailsThe web application's processRequest method creates a cookie privilege, at line 59 of /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValida...
Attack Vector
MEDIUM HttpOnlyCookies /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 63
detailsThe web application's processRequest method creates a cookie username, at line 63 of /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidat...
Attack Vector
MEDIUM HttpOnlyCookies /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 64
detailsThe web application's processRequest method creates a cookie password, at line 64 of /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidat...
Attack Vector
MEDIUM Parameter_Tampering /src/main/java/org/cysecurity/cspf/jvl/controller/EmailCheck.java: 44
detailsMethod processRequest at line 44 of /src/main/java/org/cysecurity/cspf/jvl/controller/EmailCheck.java gets user input from element ""email"". This ...
Attack Vector
MEDIUM Parameter_Tampering /src/main/java/org/cysecurity/cspf/jvl/controller/UsernameCheck.java: 43
detailsMethod processRequest at line 43 of /src/main/java/org/cysecurity/cspf/jvl/controller/UsernameCheck.java gets user input from element ""username""....
Attack Vector
MEDIUM Parameter_Tampering /src/main/webapp/vulnerability/DisplayMessage.jsp: 16
detailsMethod DisplayMessage at line 16 of /src/main/webapp/vulnerability/DisplayMessage.jsp gets user input from element ""msgid"". This input is later c...
Attack Vector
MEDIUM Parameter_Tampering /src/main/webapp/vulnerability/idor/change-email.jsp: 28
detailsMethod changeemail at line 28 of /src/main/webapp/vulnerability/idor/change-email.jsp gets user input from element ""id"". This input is later conc...
Attack Vector
MEDIUM Parameter_Tampering /src/main/webapp/admin/manageusers.jsp: 13
detailsMethod manageusers at line 13 of /src/main/webapp/admin/manageusers.jsp gets user input from element ""user"". This input is later concatenated by ...
Attack Vector
MEDIUM Parameter_Tampering /src/main/webapp/vulnerability/forumposts.jsp: 9
detailsMethod forumposts at line 9 of /src/main/webapp/vulnerability/forumposts.jsp gets user input from element ""postid"". This input is later concatena...
Attack Vector
MEDIUM Plaintext_Storage_of_a_Password /src/main/java/org/cysecurity/cspf/jvl/model/DBConnect.java: 26 Attack Vector
MEDIUM Relative_Path_Traversal /src/main/java/org/cysecurity/cspf/jvl/controller/ForwardMe.java: 39
detailsMethod processRequest at line 39 of /src/main/java/org/cysecurity/cspf/jvl/controller/ForwardMe.java gets dynamic data from the ""location"" elemen...
Attack Vector

More results are available on the CxOne platform

Fixed Issues (39)
Great job! The following issues were fixed in this Pull Request

Severity Issue Source File / Package
HIGH CVE-2017-18640 Maven-org.yaml:snakeyaml-1.19
HIGH CVE-2018-1272 Maven-org.springframework:spring-core-5.0.4.RELEASE
HIGH CVE-2021-31684 Maven-net.minidev:json-smart-2.3
HIGH CVE-2022-1471 Maven-org.yaml:snakeyaml-1.19
HIGH CVE-2022-22965 Maven-org.springframework:spring-beans-5.0.4.RELEASE
HIGH CVE-2022-25857 Maven-org.yaml:snakeyaml-1.19
HIGH CVE-2022-27772 Maven-org.springframework.boot:spring-boot-2.0.0.RELEASE
HIGH CVE-2023-1370 Maven-net.minidev:json-smart-2.3
HIGH CVE-2023-20883 Maven-org.springframework.boot:spring-boot-autoconfigure-2.0.0.RELEASE
HIGH CVE-2023-6378 Maven-ch.qos.logback:logback-core-1.2.3
HIGH CVE-2023-6378 Maven-ch.qos.logback:logback-classic-1.2.3
HIGH CVE-2023-6481 Maven-ch.qos.logback:logback-core-1.2.3
HIGH Client_DOM_Stored_XSS /src/main/webapp/vulnerability/Injection/xxe.jsp: 15
HIGH Client_DOM_Stored_XSS /src/main/webapp/vulnerability/Injection/xxe.jsp: 15
HIGH Client_DOM_Stored_XSS /src/main/webapp/vulnerability/Injection/xxe.jsp: 15
MEDIUM CVE-2018-1257 Maven-org.springframework:spring-test-5.0.4.RELEASE
MEDIUM CVE-2021-22060 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2021-22096 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2021-27568 Maven-net.minidev:json-smart-2.3
MEDIUM CVE-2021-42550 Maven-ch.qos.logback:logback-core-1.2.3
MEDIUM CVE-2021-42550 Maven-ch.qos.logback:logback-classic-1.2.3
MEDIUM CVE-2022-22950 Maven-org.springframework:spring-expression-5.0.4.RELEASE
MEDIUM CVE-2022-22950 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2022-22968 Maven-org.springframework:spring-context-5.0.4.RELEASE
MEDIUM CVE-2022-22970 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2022-22970 Maven-org.springframework:spring-beans-5.0.4.RELEASE
MEDIUM CVE-2022-22971 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2022-38749 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-38750 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-38751 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-38752 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-41854 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2023-20861 Maven-org.springframework:spring-expression-5.0.4.RELEASE
MEDIUM CVE-2023-20863 Maven-org.springframework:spring-expression-5.0.4.RELEASE
MEDIUM CVE-2023-34055 Maven-org.springframework.boot:spring-boot-2.0.0.RELEASE
MEDIUM CVE-2023-51074 Maven-com.jayway.jsonpath:json-path-2.4.0
LOW S3 Bucket Without Enabled MFA Delete /s3_with_all_permissions.tf: 1
LOW S3 Bucket Without Enabled MFA Delete /Unsecure_Storage_of_Encryption_Key.tf: 1
LOW S3 Bucket Without Enabled MFA Delete /s3.tf: 1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants