Skip to content

[Snyk] Upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33#1

Open
DavidThomas-coder wants to merge 1 commit intomainfrom
snyk-upgrade-a517e634011221a14a4a57be4e893ce3
Open

[Snyk] Upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33#1
DavidThomas-coder wants to merge 1 commit intomainfrom
snyk-upgrade-a517e634011221a14a4a57be4e893ce3

Conversation

@DavidThomas-coder
Copy link
Copy Markdown
Owner

snyk-top-banner

Snyk has created this PR to upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 47 versions ahead of your current version.

  • The recommended version was released on a year ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802
415 No Known Exploit
high severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803
415 No Known Exploit
high severity Command Injection
SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611
415 Mature
high severity Insecure Defaults
SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418
415 No Known Exploit
high severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-5811864
415 No Known Exploit
high severity Server-side Template Injection (SSTI)
SNYK-JAVA-ORGFREEMARKER-1076795
415 Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-608098
415 Proof of Concept
high severity Unrestricted Upload of File with Dangerous Type
SNYK-JAVA-ORGAPACHESTRUTS-609765
415 No Known Exploit
high severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-2635340
415 Proof of Concept
high severity Manipulation of Struts' internals
SNYK-JAVA-ORGAPACHESTRUTS-30060
415 No Known Exploit
high severity Command Injection
SNYK-JAVA-ORGAPACHESTRUTS-30770
415 Mature
high severity Cross-site Request Forgery (CSRF)
SNYK-JAVA-ORGAPACHESTRUTS-30774
415 No Known Exploit
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30775
415 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-COMMONSFILEUPLOAD-30082
415 No Known Exploit
high severity Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-31495
415 Mature
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31500
415 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31501
415 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31502
415 No Known Exploit
high severity Remote Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-32477
415 Mature
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30776
415 No Known Exploit
medium severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801
415 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804
415 No Known Exploit
medium severity Allocation of Resources Without Limits or Throttling
SNYK-JAVA-ORGAPACHESTRUTS-5707101
415 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-608097
415 Mature
medium severity Denial of Service
SNYK-JAVA-ORGAPACHESTRUTS-6100744
415 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-6102825
415 Mature
high severity Parameter Alteration
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798
415 No Known Exploit
high severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799
415 No Known Exploit
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800
415 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-1049003
415 Mature
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30207
415 Mature
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30771
415 No Known Exploit
critical severity Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-30772
415 Mature
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTS-30773
415 No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-OGNL-30474
415 No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-COMMONSFILEUPLOAD-30401
415 No Known Exploit
medium severity Information Exposure
SNYK-JAVA-COMMONSFILEUPLOAD-31540
415 No Known Exploit
critical severity Directory Traversal
SNYK-JAVA-ORGAPACHESTRUTS-30778
415 No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-31503
415 Mature
critical severity Improper Action Name Cleanup
SNYK-JAVA-ORGAPACHESTRUTS-451610
415 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTS-460223
415 No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

Snyk has created this PR to upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33.

See this package in maven:
org.apache.struts:struts2-core

See this project in Snyk:
https://app.snyk.io/org/davidthomas-coder/project/1f84775f-da9c-43b5-86d1-935f74ceb230?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants