Skip to content

[Snyk] Security upgrade org.springframework.boot:spring-boot-starter-test from 2.0.0.RELEASE to 3.4.0#42

Open
weinrich15 wants to merge 1 commit intomasterfrom
snyk-fix-e90ffbf81fff551b91a731d670fb0218
Open

[Snyk] Security upgrade org.springframework.boot:spring-boot-starter-test from 2.0.0.RELEASE to 3.4.0#42
weinrich15 wants to merge 1 commit intomasterfrom
snyk-fix-e90ffbf81fff551b91a731d670fb0218

Conversation

@weinrich15
Copy link
Copy Markdown
Collaborator

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
medium severity Insecure Default Variable Initialization
SNYK-JAVA-ORGXMLUNIT-6751676
  616   org.springframework.boot:spring-boot-starter-test:
2.0.0.RELEASE -> 3.4.0
Major version upgrade Proof of Concept

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Insecure Default Variable Initialization

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-ORGXMLUNIT-6751676
@weinrich15
Copy link
Copy Markdown
Collaborator Author

Logo
Checkmarx One – Scan Summary & Details2976df56-ec32-48a8-9680-7e752a1abed8

New Issues

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2023-1973 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2023-3223 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2023-4639 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2024-1635 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH CVE-2024-38286 Maven-org.apache.tomcat:tomcat-coyote-9.0.22 Vulnerable Package
HIGH CVE-2024-7885 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
HIGH Reflected_XSS_All_Clients /src/main/webapp/admin/adminlogin.jsp: 68 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/xss/search.jsp: 16 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/Injection/xpath_login.jsp: 9 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/SendMessage.jsp: 11 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/SendMessage.jsp: 18 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/login.jsp: 26 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/xss/xss4.jsp: 2 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/xss/xss4.jsp: 2 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/vulnerability/UserDetails.jsp: 8 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/login.jsp: 7 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/webapp/login.jsp: 7 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/java/org/cysecurity/cspf/jvl/controller/xxe.java: 44 Attack Vector
HIGH Reflected_XSS_All_Clients /src/main/java/org/cysecurity/cspf/jvl/controller/AddPage.java: 39 Attack Vector
HIGH Unsafe_Reflection /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 55 Attack Vector
HIGH XPath_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/XPathQuery.java: 36 Attack Vector
HIGH XPath_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/XPathQuery.java: 35 Attack Vector
MEDIUM CSRF /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43 Attack Vector
MEDIUM CSRF /src/main/webapp/admin/adminlogin.jsp: 12 Attack Vector
MEDIUM CSRF /src/main/webapp/admin/adminlogin.jsp: 12 Attack Vector
MEDIUM CSRF /src/main/webapp/admin/adminlogin.jsp: 11 Attack Vector
MEDIUM CVE-2021-20220 Maven-io.undertow:undertow-core-2.0.9.Final Vulnerable Package
MEDIUM HttpOnlyCookies /src/main/webapp/admin/adminlogin.jsp: 37 Attack Vector
MEDIUM HttpOnlyCookies /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 59 Attack Vector
MEDIUM HttpOnlyCookies /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 63 Attack Vector
MEDIUM HttpOnlyCookies /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 64 Attack Vector
MEDIUM Parameter_Tampering /src/main/java/org/cysecurity/cspf/jvl/controller/EmailCheck.java: 44 Attack Vector
MEDIUM Parameter_Tampering /src/main/java/org/cysecurity/cspf/jvl/controller/UsernameCheck.java: 43 Attack Vector
MEDIUM Parameter_Tampering /src/main/webapp/vulnerability/DisplayMessage.jsp: 16 Attack Vector
MEDIUM Parameter_Tampering /src/main/webapp/vulnerability/idor/change-email.jsp: 28 Attack Vector
MEDIUM Parameter_Tampering /src/main/webapp/admin/manageusers.jsp: 13 Attack Vector
MEDIUM Parameter_Tampering /src/main/webapp/vulnerability/forumposts.jsp: 9 Attack Vector
MEDIUM Plaintext_Storage_of_a_Password /src/main/java/org/cysecurity/cspf/jvl/model/DBConnect.java: 26 Attack Vector
MEDIUM Relative_Path_Traversal /src/main/java/org/cysecurity/cspf/jvl/controller/ForwardMe.java: 39 Attack Vector
MEDIUM Relative_Path_Traversal /src/main/java/org/cysecurity/cspf/jvl/controller/AddPage.java: 39 Attack Vector
MEDIUM Relative_Path_Traversal /src/main/webapp/vulnerability/idor/download.jsp: 11 Attack Vector
MEDIUM Relative_Path_Traversal /src/main/webapp/vulnerability/sqli/download_id_union.jsp: 18 Attack Vector
MEDIUM Relative_Path_Traversal /src/main/webapp/vulnerability/sqli/download_id.jsp: 18 Attack Vector
MEDIUM Relative_Path_Traversal /src/main/webapp/vulnerability/sqli/download_id_union.jsp: 18 Attack Vector
MEDIUM Relative_Path_Traversal /src/main/webapp/vulnerability/sqli/download_id.jsp: 18 Attack Vector
MEDIUM SSRF /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 58 Attack Vector
MEDIUM SSRF /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 54 Attack Vector
MEDIUM SSRF /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 54 Attack Vector
MEDIUM Unchecked_Input_for_Loop_Condition /src/main/java/org/cysecurity/cspf/jvl/controller/xxe.java: 44 Attack Vector
LOW Heap_Inspection /src/main/java/org/cysecurity/cspf/jvl/model/DBConnect.java: 28 Attack Vector
LOW Heap_Inspection /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 33 Attack Vector
LOW Heap_Inspection /src/main/webapp/vulnerability/Injection/orm.jsp: 31 Attack Vector
LOW Heap_Inspection /src/main/webapp/vulnerability/csrf/changepassword.jsp: 33 Attack Vector
LOW Heap_Inspection /src/main/webapp/login.jsp: 6 Attack Vector
LOW Heap_Inspection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 64 Attack Vector
LOW Heap_Inspection /src/main/java/org/cysecurity/cspf/jvl/controller/XPathQuery.java: 36 Attack Vector
LOW Heap_Inspection /src/main/java/org/cysecurity/cspf/jvl/controller/Register.java: 44 Attack Vector
LOW Heap_Inspection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 44 Attack Vector
LOW Heap_Inspection /src/main/java/org/cysecurity/cspf/jvl/controller/rds.java: 8 Attack Vector
LOW Open_Redirect /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 44 Attack Vector
LOW Open_Redirect /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43 Attack Vector
LOW Open_Redirect /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 44 Attack Vector
LOW Open_Redirect /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43 Attack Vector
LOW Open_Redirect /src/main/java/org/cysecurity/cspf/jvl/controller/Open.java: 36 Attack Vector
LOW Trust_Boundary_Violation_in_Session_Variables /src/main/java/org/cysecurity/cspf/jvl/controller/XPathQuery.java: 36 Attack Vector
LOW Trust_Boundary_Violation_in_Session_Variables /src/main/java/org/cysecurity/cspf/jvl/controller/XPathQuery.java: 35 Attack Vector
LOW Use_Of_Hardcoded_Password /src/main/java/org/cysecurity/cspf/jvl/controller/rds.java: 8 Attack Vector
LOW Use_of_Broken_or_Risky_Cryptographic_Algorithm /src/main/java/org/cysecurity/cspf/jvl/model/HashMe.java: 16 Attack Vector

Fixed Issues

Severity Issue Source File / Package
HIGH CVE-2017-18640 Maven-org.yaml:snakeyaml-1.19
HIGH CVE-2018-1272 Maven-org.springframework:spring-core-5.0.4.RELEASE
HIGH CVE-2021-31684 Maven-net.minidev:json-smart-2.3
HIGH CVE-2022-1471 Maven-org.yaml:snakeyaml-1.19
HIGH CVE-2022-22965 Maven-org.springframework:spring-beans-5.0.4.RELEASE
HIGH CVE-2022-25857 Maven-org.yaml:snakeyaml-1.19
HIGH CVE-2022-27772 Maven-org.springframework.boot:spring-boot-2.0.0.RELEASE
HIGH CVE-2023-1370 Maven-net.minidev:json-smart-2.3
HIGH CVE-2023-20883 Maven-org.springframework.boot:spring-boot-autoconfigure-2.0.0.RELEASE
HIGH CVE-2023-6378 Maven-ch.qos.logback:logback-core-1.2.3
HIGH CVE-2023-6378 Maven-ch.qos.logback:logback-classic-1.2.3
HIGH CVE-2023-6481 Maven-ch.qos.logback:logback-core-1.2.3
HIGH CVE-2024-31573 Maven-org.xmlunit:xmlunit-core-2.5.1
HIGH Client_DOM_Stored_XSS /src/main/webapp/vulnerability/Injection/xxe.jsp: 15
HIGH Client_DOM_Stored_XSS /src/main/webapp/vulnerability/Injection/xxe.jsp: 15
HIGH Client_DOM_Stored_XSS /src/main/webapp/vulnerability/Injection/xxe.jsp: 15
MEDIUM CVE-2018-1257 Maven-org.springframework:spring-test-5.0.4.RELEASE
MEDIUM CVE-2021-22060 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2021-22096 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2021-27568 Maven-net.minidev:json-smart-2.3
MEDIUM CVE-2021-42550 Maven-ch.qos.logback:logback-core-1.2.3
MEDIUM CVE-2021-42550 Maven-ch.qos.logback:logback-classic-1.2.3
MEDIUM CVE-2022-22950 Maven-org.springframework:spring-expression-5.0.4.RELEASE
MEDIUM CVE-2022-22950 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2022-22968 Maven-org.springframework:spring-context-5.0.4.RELEASE
MEDIUM CVE-2022-22970 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2022-22970 Maven-org.springframework:spring-beans-5.0.4.RELEASE
MEDIUM CVE-2022-22971 Maven-org.springframework:spring-core-5.0.4.RELEASE
MEDIUM CVE-2022-38749 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-38750 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-38751 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-38752 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2022-41854 Maven-org.yaml:snakeyaml-1.19
MEDIUM CVE-2023-20861 Maven-org.springframework:spring-expression-5.0.4.RELEASE
MEDIUM CVE-2023-20863 Maven-org.springframework:spring-expression-5.0.4.RELEASE
MEDIUM CVE-2023-34055 Maven-org.springframework.boot:spring-boot-2.0.0.RELEASE
MEDIUM CVE-2023-51074 Maven-com.jayway.jsonpath:json-path-2.4.0
LOW S3 Bucket Without Enabled MFA Delete /s3_with_all_permissions.tf: 1
LOW S3 Bucket Without Enabled MFA Delete /Unsecure_Storage_of_Encryption_Key.tf: 1
LOW S3 Bucket Without Enabled MFA Delete /s3.tf: 1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants