The project contains a json.org dependency with CVE-2022-45688 but does not invoke the vulnerable class. The vulnerability can therefore not be exploited for a DoS attack.
Metadata-based software composition analyses will produce a false positive, while callgraph-based analyses will not flag this application as vulnerable.
There are several sh scripts to run different analyses, result resports can be found in scan-results
.
The pom.xml
has a plugin to generate a SBOM in CycloneDX format.
To do this, run mvn cyclonedx:makePackageBom
, the SBOM can be found in
target/
in json
and xml
format.