Skip to content

Conversation

@snyk-bot
Copy link

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • with-sockjs/pom.xml
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Issue Upgrade Breaking Change Exploit Maturity
high severity Deserialization of Untrusted Data
SNYK-JAVA-CHQOSLOGBACK-31407
Yes No Known Exploit
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLEGUAVA-32236
com.google.guava:guava:
24.0-jre -> 24.1.1-android
No No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-OGNL-30474
Yes No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451342
No No Known Exploit
high severity Remote Code Execution
SNYK-JAVA-ORGAPACHETOMCATEMBED-451343
No Mature
low severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451458
No No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451459
No No Known Exploit
medium severity Open Redirect
SNYK-JAVA-ORGAPACHETOMCATEMBED-451503
No No Known Exploit
medium severity Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-451504
No No Known Exploit
high severity Insecure Defaults
SNYK-JAVA-ORGAPACHETOMCATEMBED-451505
No No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-451508
No No Known Exploit
medium severity Directory Traversal
SNYK-JAVA-ORGAPACHETOMCATEMBED-451510
No No Known Exploit
medium severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHETOMCATEMBED-451511
No No Known Exploit
high severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHETOMCATEMBED-451515
No Mature
high severity Directory Traversal
SNYK-JAVA-ORGAPACHETOMCATEMBED-451518
No No Known Exploit
high severity Privilege Escalation
SNYK-JAVA-ORGAPACHETOMCATEMBED-538490
Yes No Known Exploit
high severity Arbitrary Code Execution
SNYK-JAVA-ORGHIBERNATE-451605
No No Known Exploit
high severity Arbitrary Code Execution
SNYK-JAVA-ORGSPRINGFRAMEWORK-32201
org.springframework:spring-messaging:
4.2.2.RELEASE -> 4.3.16.RELEASE
No No Known Exploit
high severity Arbitrary Code Execution
SNYK-JAVA-ORGSPRINGFRAMEWORK-32223
org.springframework:spring-messaging:
4.2.2.RELEASE -> 4.3.16.RELEASE
No No Known Exploit
medium severity Multipart Content Pollution
SNYK-JAVA-ORGSPRINGFRAMEWORK-460644
org.springframework:spring-messaging:
4.2.2.RELEASE -> 4.3.16.RELEASE
org.springframework:spring-websocket:
4.2.2.RELEASE -> 4.3.20.RELEASE
No No Known Exploit
low severity Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-72470
org.springframework:spring-websocket:
4.2.2.RELEASE -> 4.3.20.RELEASE
No No Known Exploit

Vulnerabilities that could not be fixed

  • Upgrade:
    • Could not upgrade org.springframework.boot:spring-boot-starter-thymeleaf@1.5.4.RELEASE to org.springframework.boot:spring-boot-starter-thymeleaf@2.0.0.RELEASE; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/repos/central/data/org/springframework/boot/spring-boot-dependencies/1.5.4.RELEASE/spring-boot-dependencies-1.5.4.RELEASE.pom

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:

🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic

@lahsivjar lahsivjar closed this Aug 9, 2020
@lahsivjar lahsivjar reopened this Aug 9, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

3 participants