Skip to content

[Snyk] Fix for 18 vulnerabilities #84

New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

Rob-Leggett
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • api/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698
com.fasterxml.jackson.core:jackson-databind:
2.12.3 -> 2.13.4
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244
com.fasterxml.jackson.core:jackson-databind:
2.12.3 -> 2.13.4
No No Known Exploit
medium severity 688/1000
Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424
com.fasterxml.jackson.core:jackson-databind:
2.12.3 -> 2.13.4
No Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMMCHANGE-174481
org.hibernate:hibernate-c3p0:
5.1.0.Final -> 5.4.24.Final
No Proof of Concept
critical severity 704/1000
Why? Has a fix available, CVSS 9.8
XML External Entity (XXE) Injection
SNYK-JAVA-COMMCHANGE-451675
org.hibernate:hibernate-c3p0:
5.1.0.Final -> 5.4.24.Final
No No Known Exploit
high severity 635/1000
Why? Has a fix available, CVSS 8.2
SQL Injection
SNYK-JAVA-ORGHIBERNATE-1041788
org.hibernate:hibernate-c3p0:
5.1.0.Final -> 5.4.24.Final
org.hibernate:hibernate-entitymanager:
5.1.0.Final -> 5.4.24.Final
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Input Validation
SNYK-JAVA-ORGHIBERNATE-568162
org.hibernate:hibernate-validator:
5.2.5.Final -> 6.0.23.Final
Yes No Known Exploit
medium severity 550/1000
Why? Has a fix available, CVSS 6.5
Cross-site Scripting (XSS)
SNYK-JAVA-ORGHIBERNATE-569100
org.hibernate:hibernate-validator:
5.2.5.Final -> 6.0.23.Final
Yes No Known Exploit
high severity 619/1000
Why? Has a fix available, CVSS 8.1
SQL Injection
SNYK-JAVA-ORGHIBERNATE-584563
org.hibernate:hibernate-c3p0:
5.1.0.Final -> 5.4.24.Final
org.hibernate:hibernate-entitymanager:
5.1.0.Final -> 5.4.24.Final
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Locking
SNYK-JAVA-ORGJETBRAINSKOTLIN-2628385
org.springframework.security:spring-security-config:
5.5.0 -> 5.5.7
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Output Neutralization for Logs
SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
org.springframework.security:spring-security-config:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-core:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-web:
5.5.0 -> 5.5.7
org.springframework:spring-context-support:
5.3.7 -> 5.3.20
org.springframework:spring-expression:
5.3.7 -> 5.3.17
org.springframework:spring-orm:
5.3.7 -> 5.3.20
org.springframework:spring-web:
5.3.7 -> 5.3.20
org.springframework:spring-webmvc:
5.3.7 -> 5.3.20
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Input Validation
SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
org.springframework.security:spring-security-config:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-core:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-web:
5.5.0 -> 5.5.7
org.springframework:spring-context-support:
5.3.7 -> 5.3.20
org.springframework:spring-expression:
5.3.7 -> 5.3.17
org.springframework:spring-orm:
5.3.7 -> 5.3.20
org.springframework:spring-web:
5.3.7 -> 5.3.20
org.springframework:spring-webmvc:
5.3.7 -> 5.3.20
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
org.springframework.security:spring-security-core:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-web:
5.5.0 -> 5.5.7
org.springframework:spring-context-support:
5.3.7 -> 5.3.20
org.springframework:spring-expression:
5.3.7 -> 5.3.17
org.springframework:spring-webmvc:
5.3.7 -> 5.3.20
No No Known Exploit
critical severity 919/1000
Why? Mature exploit, Has a fix available, CVSS 9.8
Remote Code Execution
SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
org.springframework.security:spring-security-config:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-core:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-web:
5.5.0 -> 5.5.7
org.springframework:spring-context-support:
5.3.7 -> 5.3.20
org.springframework:spring-orm:
5.3.7 -> 5.3.20
org.springframework:spring-web:
5.3.7 -> 5.3.20
org.springframework:spring-webmvc:
5.3.7 -> 5.3.20
No Mature
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Improper Handling of Case Sensitivity
SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634
org.springframework.security:spring-security-config:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-core:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-web:
5.5.0 -> 5.5.7
org.springframework:spring-context-support:
5.3.7 -> 5.3.20
org.springframework:spring-webmvc:
5.3.7 -> 5.3.20
No Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2823313
org.springframework.security:spring-security-config:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-core:
5.5.0 -> 5.5.7
org.springframework.security:spring-security-web:
5.5.0 -> 5.5.7
org.springframework:spring-context-support:
5.3.7 -> 5.3.20
org.springframework:spring-orm:
5.3.7 -> 5.3.20
org.springframework:spring-web:
5.3.7 -> 5.3.20
org.springframework:spring-webmvc:
5.3.7 -> 5.3.20
No No Known Exploit
high severity 731/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.2
Authorization Bypass
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-2833359
org.springframework.security:spring-security-web:
5.5.0 -> 5.5.7
No Proof of Concept
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Integer Overflow or Wraparound
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-2833360
org.springframework.security:spring-security-core:
5.5.0 -> 5.5.7
No Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Denial of Service (DoS)
🦉 Remote Code Execution
🦉 Denial of Service (DoS)
🦉 More lessons are available in Snyk Learn

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants