spring-rsocket-demo icon indicating copy to clipboard operation
spring-rsocket-demo copied to clipboard

[Snyk] Fix for 30 vulnerabilities

Open benwilcock opened this issue 3 years ago • 0 comments

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • rsocket-client/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
medium severity 454/1000
Why? Has a fix available, CVSS 4.8
Insufficient Hostname Verification
SNYK-JAVA-CHQOSLOGBACK-1726923
No No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244
No No Known Exploit
medium severity 688/1000
Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424
No Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329
No No Known Exploit
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Denial of Service (DoS)
SNYK-JAVA-IONETTY-1020439
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1070799
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082234
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082235
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082236
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082238
No No Known Exploit
medium severity 724/1000
Why? Mature exploit, Has a fix available, CVSS 5.9
HTTP Request Smuggling
SNYK-JAVA-IONETTY-1083991
No Mature
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
HTTP Request Smuggling
SNYK-JAVA-IONETTY-1089809
No No Known Exploit
medium severity 724/1000
Why? Mature exploit, Has a fix available, CVSS 5.9
HTTP Request Smuggling
SNYK-JAVA-IONETTY-1317097
No Mature
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584063
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584064
No No Known Exploit
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
HTTP Request Smuggling
SNYK-JAVA-IONETTY-2314893
No No Known Exploit
medium severity 489/1000
Why? Has a fix available, CVSS 5.5
Information Exposure
SNYK-JAVA-IONETTY-2812456
No No Known Exploit
high severity 644/1000
Why? Has a fix available, CVSS 8.6
Improper Input Validation
SNYK-JAVA-ORGSPRINGFRAMEWORK-1009832
No No Known Exploit
medium severity 434/1000
Why? Has a fix available, CVSS 4.4
Privilege Escalation
SNYK-JAVA-ORGSPRINGFRAMEWORK-1296829
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Output Neutralization for Logs
SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Input Validation
SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
No No Known Exploit
critical severity 919/1000
Why? Mature exploit, Has a fix available, CVSS 9.8
Remote Code Execution
SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
org.springframework.shell:spring-shell-starter:
2.0.0.RELEASE -> 2.1.0
No Mature
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Improper Handling of Case Sensitivity
SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634
No Proof of Concept
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2823310
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2823313
org.springframework.shell:spring-shell-starter:
2.0.0.RELEASE -> 2.1.0
No No Known Exploit
medium severity 439/1000
Why? Has a fix available, CVSS 4.5
Privilege Escalation
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-1078232
No No Known Exploit
low severity 380/1000
Why? Has a fix available, CVSS 3.1
Timing Attack
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-1290497
No No Known Exploit
high severity 731/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.2
Authorization Bypass
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-2833359
No Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Vulnerabilities that could not be fixed

  • Upgrade:
    • Could not upgrade org.springframework.boot:[email protected] to org.springframework.boot:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.3.0.RELEASE/spring-boot-dependencies-2.3.0.RELEASE.pom
    • Could not upgrade org.springframework.boot:[email protected] to org.springframework.boot:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.3.0.RELEASE/spring-boot-dependencies-2.3.0.RELEASE.pom
    • Could not upgrade org.springframework.security:[email protected] to org.springframework.security:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/security/spring-security-bom/5.3.2.RELEASE/spring-security-bom-5.3.2.RELEASE.pom
    • Could not upgrade org.springframework.security:[email protected] to org.springframework.security:[email protected]; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/security/spring-security-bom/5.3.2.RELEASE/spring-security-bom-5.3.2.RELEASE.pom

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Denial of Service (DoS) 🦉 Denial of Service (DoS) 🦉 Remote Code Execution 🦉 More lessons are available in Snyk Learn

benwilcock avatar Oct 05 '22 11:10 benwilcock