kitodo-production icon indicating copy to clipboard operation
kitodo-production copied to clipboard

[Snyk] Security upgrade org.apache.xmlgraphics:fop from 2.3 to 2.4

Open Kathrin-Huber opened this issue 2 years ago • 0 comments

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 651/1000
Why? Recently disclosed, Has a fix available, CVSS 7.3
Server-side Request Forgery (SSRF)
SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031728
org.apache.xmlgraphics:fop:
2.3 -> 2.4
No No Known Exploit
high severity 651/1000
Why? Recently disclosed, Has a fix available, CVSS 7.3
Server-side Request Forgery (SSRF)
SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031729
org.apache.xmlgraphics:fop:
2.3 -> 2.4
No No Known Exploit
medium severity 611/1000
Why? Recently disclosed, Has a fix available, CVSS 6.5
Server-side Request Forgery (SSRF)
SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031730
org.apache.xmlgraphics:fop:
2.3 -> 2.4
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Server-side Request Forgery (SSRF) 🦉 Server-side Request Forgery (SSRF) 🦉 Server-side Request Forgery (SSRF)

Kathrin-Huber avatar Sep 23 '22 18:09 Kathrin-Huber