Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

[Snyk] Security upgrade org.apache.karaf.features:standard from 4.0.4 to 4.4.0 #16

Open
wants to merge 1 commit into
base: master-seeburger
Choose a base branch
from

Conversation

ecki
Copy link
Member

@ecki ecki commented Oct 2, 2023

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • features/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
critical severity 704/1000
Why? Has a fix available, CVSS 9.8
XML External Entity (XXE) Injection
SNYK-JAVA-C3P0-461017
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-C3P0-461018
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No Proof of Concept
high severity 654/1000
Why? Has a fix available, CVSS 8.8
Arbitrary File Read
SNYK-JAVA-ORGAPACHEKARAFSHELL-72392
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-1728264
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-1090340
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No Proof of Concept
low severity 359/1000
Why? Has a fix available, CVSS 2.9
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-1313686
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
medium severity 621/1000
Why? Mature exploit, Has a fix available, CVSS 4.7
Cross-site Scripting (XSS)
SNYK-JAVA-ORGECLIPSEJETTY-174479
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No Mature
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-174560
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
low severity 349/1000
Why? Has a fix available, CVSS 2.7
Improper Input Validation
SNYK-JAVA-ORGECLIPSEJETTY-2945453
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Timing Attack
SNYK-JAVA-ORGECLIPSEJETTY-32151
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
critical severity 704/1000
Why? Has a fix available, CVSS 9.8
Authorization Bypass
SNYK-JAVA-ORGECLIPSEJETTY-32384
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
critical severity 704/1000
Why? Has a fix available, CVSS 9.8
Authorization Bypass
SNYK-JAVA-ORGECLIPSEJETTY-32385
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Web Cache Poisoning
SNYK-JAVA-ORGECLIPSEJETTY-460763
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
medium severity 621/1000
Why? Mature exploit, Has a fix available, CVSS 4.7
Cross-site Scripting (XSS)
SNYK-JAVA-ORGECLIPSEJETTY-480557
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No Mature
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-5426159
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit
low severity 334/1000
Why? Has a fix available, CVSS 2.4
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-5426160
org.apache.karaf.features:standard:
4.0.4 -> 4.4.0
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 XML External Entity (XXE) Injection
🦉 Arbitrary File Read
🦉 Denial of Service (DoS)
🦉 More lessons are available in Snyk Learn

@MrEasy MrEasy force-pushed the master-seeburger branch 2 times, most recently from 7fd0fdb to 7e4c457 Compare February 27, 2025 07:35
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants