Skip to content

[Snyk] Security upgrade org.springframework.cloud:spring-cloud-starter-netflix-eureka-client from 1.4.0.RELEASE to 4.1.3#50

Open
Yuyang105 wants to merge 1 commit into
masterfrom
snyk-fix-0d438400004818e6350ed8e4df2feaa0
Open

[Snyk] Security upgrade org.springframework.cloud:spring-cloud-starter-netflix-eureka-client from 1.4.0.RELEASE to 4.1.3#50
Yuyang105 wants to merge 1 commit into
masterfrom
snyk-fix-0d438400004818e6350ed8e4df2feaa0

Conversation

@Yuyang105
Copy link
Copy Markdown
Owner

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123)

Snyk has created this PR to fix 5 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
medium severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897
  616   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLEGUAVA-32236
  509   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Known Exploit
low severity Information Disclosure
SNYK-JAVA-COMGOOGLEGUAVA-1015415
  486   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180
  479   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Known Exploit
low severity Creation of Temporary File in Directory with Insecure Permissions
SNYK-JAVA-COMGOOGLEGUAVA-5710356
  379   org.springframework.cloud:spring-cloud-starter-netflix-eureka-client:
1.4.0.RELEASE -> 4.1.3
Major version upgrade No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Creation of Temporary File in Directory with Insecure Permissions
🦉 Denial of Service (DoS)

@guardrails
Copy link
Copy Markdown

guardrails Bot commented Jul 13, 2024

⚠️ We detected 13 security issues in this pull request:

Vulnerable Libraries (13)
Severity Details
High pkg:maven/com.fasterxml.woodstox/[email protected] (t) upgrade to: 5.4.0,6.4.0
High pkg:maven/com.fasterxml.jackson.core/[email protected] (t) upgrade to: 2.6.7.4,2.9.10.7,2.10.5.1
Critical pkg:maven/org.apache.xmlbeans/[email protected] (t) upgrade to: 3.0.0
Critical pkg:maven/org.springframework/[email protected] (t) upgrade to: 5.2.20,5.3.18,2.5.12,2.6.6
High pkg:maven/org.springframework/[email protected] (t) upgrade to: 5.2.22.RELEASE,5.3.20
Medium pkg:maven/com.google.protobuf/[email protected] (t) upgrade to: 3.20.3,3.21.7,3.19.6,3.16.3
Medium pkg:maven/org.apache.tomcat.embed/[email protected] (t) upgrade to: 11.0.0-M11,10.1.13,9.0.80,8.5.93
High pkg:maven/org.springframework/[email protected] (t) upgrade to: 5.3.19,5.2.21
High pkg:maven/commons-beanutils/[email protected] (t) upgrade to: 1.9.4
High pkg:maven/org.springframework/[email protected] (t) upgrade to: 5.1.1,5.0.10,4.3.20
Medium pkg:maven/org.codehaus.groovy/[email protected] (t) upgrade to: 2.5.14,3.0.7,2.4.21
High pkg:maven/ch.qos.logback/[email protected] (t) upgrade to: 1.3.12,1.4.12,1.2.13
High pkg:maven/org.springframework/[email protected] (t) upgrade to: 5.3.34,6.0.19,6.1.6

More info on how to fix Vulnerable Libraries in Java.


👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants