chore: upgrade org.apache.poi:poi #7
Draft
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Upgrade
org.apache.poi:poi
from3.10-FINAL
to4.1.1
This pull request upgrades
org.apache.poi:poi
from version3.10-FINAL
to4.1.1
to address multiple security vulnerabilities and ensure compliance with security best practices. The upgrade has been tested locally to confirm compatibility with existing functionality.Vulnerabilities Addressed
| CVE-2014-3529 | Improper Restriction of XML External Entity Reference in Apache POI. Improper Restriction of XML External Entity Reference in Apache POI |
| CVE-2014-9527 | Loop with Unreachable Exit Condition in Apache POI. Loop with Unreachable Exit Condition in Apache POI |
| CVE-2017-5644 | Improper Restriction of Recursive Entity References in DTDs in Apache POI. Improper Restriction of Recursive Entity References in DTDs in Apache POI |
| CVE-2017-12626 | Denial of Service in Apache POI. Denial of Service in Apache POI |
| CVE-2019-12415 | Improper Restriction of XML External Entity Reference in Apache POI. Improper Restriction of XML External Entity Reference in Apache POI |
This upgrade enhances the security and stability of the
org.apache.poi:poi
dependency.