Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 10 vulnerabilities #6311

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

geoffsee
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123)

Snyk has created this PR to fix 10 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • pom.xml
  • parent-java/pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
critical severity Arbitrary Code Execution
SNYK-JAVA-CHQOSLOGBACK-30208
  704   ch.qos.logback:logback-classic:
1.1.7 -> 1.2.13
ch.qos.logback:logback-core:
1.1.7 -> 1.2.13
No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-CHQOSLOGBACK-31407
  704   ch.qos.logback:logback-classic:
1.1.7 -> 1.2.13
No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-CHQOSLOGBACK-6094942
  569   ch.qos.logback:logback-classic:
1.1.7 -> 1.2.13
No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-CHQOSLOGBACK-6094943
  569   ch.qos.logback:logback-classic:
1.1.7 -> 1.2.13
ch.qos.logback:logback-core:
1.1.7 -> 1.2.13
No Known Exploit
high severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JAVA-CHQOSLOGBACK-6097492
  569   ch.qos.logback:logback-classic:
1.1.7 -> 1.2.13
No Known Exploit
high severity Uncontrolled Resource Consumption ('Resource Exhaustion')
SNYK-JAVA-CHQOSLOGBACK-6097493
  569   ch.qos.logback:logback-classic:
1.1.7 -> 1.2.13
ch.qos.logback:logback-core:
1.1.7 -> 1.2.13
No Known Exploit
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLEGUAVA-32236
  509   com.google.guava:guava:
23.0 -> 32.0.0-android
No Known Exploit
low severity Information Disclosure
SNYK-JAVA-COMGOOGLEGUAVA-1015415
  486   com.google.guava:guava:
23.0 -> 32.0.0-android
Proof of Concept
medium severity Insufficient Hostname Verification
SNYK-JAVA-CHQOSLOGBACK-1726923
  454   ch.qos.logback:logback-classic:
1.1.7 -> 1.2.13
ch.qos.logback:logback-core:
1.1.7 -> 1.2.13
No Known Exploit
low severity Creation of Temporary File in Directory with Insecure Permissions
SNYK-JAVA-COMGOOGLEGUAVA-5710356
  379   com.google.guava:guava:
23.0 -> 32.0.0-android
No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Insufficient Hostname Verification
🦉 Arbitrary Code Execution
🦉 Denial of Service (DoS)
🦉 More lessons are available in Snyk Learn

[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"ch.qos.logback:logback-classic","from":"1.1.7","to":"1.2.13"},{"name":"ch.qos.logback:logback-core","from":"1.1.7","to":"1.2.13"},{"name":"com.google.guava:guava","from":"23.0","to":"32.0.0-android"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-1726923","priority_score":454,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"4.8","score":240},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Insufficient Hostname Verification"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-30208","priority_score":704,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-6094943","priority_score":569,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.1","score":355},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-6097493","priority_score":569,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.1","score":355},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Uncontrolled Resource Consumption ('Resource Exhaustion')"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-1726923","priority_score":454,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"4.8","score":240},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Insufficient Hostname Verification"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-30208","priority_score":704,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-6094943","priority_score":569,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.1","score":355},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-6097493","priority_score":569,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.1","score":355},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Uncontrolled Resource Consumption ('Resource Exhaustion')"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-31407","priority_score":704,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"9.8","score":490},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Arbitrary Code Execution"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-6094942","priority_score":569,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.1","score":355},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-CHQOSLOGBACK-6097492","priority_score":569,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"7.1","score":355},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Uncontrolled Resource Consumption ('Resource Exhaustion')"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-COMGOOGLEGUAVA-1015415","priority_score":486,"priority_score_factors":[{"type":"exploit","label":"Proof of Concept","score":107},{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"3.3","score":165},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Information Disclosure"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMGOOGLEGUAVA-32236","priority_score":509,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"5.9","score":295},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Deserialization of Untrusted Data"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMGOOGLEGUAVA-5710356","priority_score":379,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"cvssScore","label":"3.3","score":165},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"Creation of Temporary File in Directory with Insecure Permissions"}],"prId":"7c46fb97-6da9-408a-b1b6-b277e89970ae","prPublicId":"7c46fb97-6da9-408a-b1b6-b277e89970ae","packageManager":"maven","priorityScoreList":[454,704,569,569,704,569,569,486,509,379],"projectPublicId":"69f4f499-5e31-41b2-90ee-15607b9b8ffc","projectUrl":"https://app.snyk.io/org/geoffsee/project/69f4f499-5e31-41b2-90ee-15607b9b8ffc?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["priorityScore"],"type":"auto","upgrade":["SNYK-JAVA-CHQOSLOGBACK-1726923","SNYK-JAVA-CHQOSLOGBACK-30208","SNYK-JAVA-CHQOSLOGBACK-31407","SNYK-JAVA-CHQOSLOGBACK-6094942","SNYK-JAVA-CHQOSLOGBACK-6094943","SNYK-JAVA-CHQOSLOGBACK-6097492","SNYK-JAVA-CHQOSLOGBACK-6097493","SNYK-JAVA-COMGOOGLEGUAVA-1015415","SNYK-JAVA-COMGOOGLEGUAVA-32236","SNYK-JAVA-COMGOOGLEGUAVA-5710356"],"vulns":["SNYK-JAVA-CHQOSLOGBACK-1726923","SNYK-JAVA-CHQOSLOGBACK-30208","SNYK-JAVA-CHQOSLOGBACK-6094943","SNYK-JAVA-CHQOSLOGBACK-6097493","SNYK-JAVA-CHQOSLOGBACK-31407","SNYK-JAVA-CHQOSLOGBACK-6094942","SNYK-JAVA-CHQOSLOGBACK-6097492","SNYK-JAVA-COMGOOGLEGUAVA-1015415","SNYK-JAVA-COMGOOGLEGUAVA-32236","SNYK-JAVA-COMGOOGLEGUAVA-5710356"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants