Skip to content

[Snyk] Security upgrade tomcat from latest to 11.0.21-jdk25-temurin-noble#17

Open
kartikdedhia wants to merge 2 commits into
masterfrom
snyk-fix-d94fa66633e1019e20eac1892e20104c
Open

[Snyk] Security upgrade tomcat from latest to 11.0.21-jdk25-temurin-noble#17
kartikdedhia wants to merge 2 commits into
masterfrom
snyk-fix-d94fa66633e1019e20eac1892e20104c

Conversation

@kartikdedhia
Copy link
Copy Markdown
Owner

snyk-top-banner

Snyk has created this PR to fix 2 vulnerabilities in the dockerfile dependencies of this project.

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Snyk changed the following file(s):

  • Dockerfile

We recommend upgrading to tomcat:11.0.21-jdk25-temurin-noble, as this image has only 13 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
medium severity Directory Traversal
SNYK-UBUNTU2404-PAM-11936905
  231  
medium severity Directory Traversal
SNYK-UBUNTU2404-PAM-11936905
  231  
medium severity Directory Traversal
SNYK-UBUNTU2404-PAM-11936905
  231  
medium severity Directory Traversal
SNYK-UBUNTU2404-PAM-11936905
  231  
medium severity Out-of-Bounds
SNYK-UBUNTU2404-BINUTILS-13570212
  159  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Directory Traversal
🦉 Out-of-Bounds

@secure-code-warrior-for-github
Copy link
Copy Markdown

Micro-Learning Topic: Directory traversal (Detected by phrase)

Matched on "Directory Traversal"

What is this? (2min video)

Path traversal vulnerabilities occur when inputs that have not been sufficiently validated or sanitised are used to build directory or file paths. If an attacker can influence the path being accessed by the server, they may be able to gain unauthorised access to files or even execute arbitrary code on the server (when coupled with file upload functionality).

Try a challenge in Secure Code Warrior

Helpful references
  • OWASP Input Validation Cheat Sheet - This cheatsheet is focused on providing clear, simple, actionable guidance for preventing injection and input validation flaws in your applications, including defence against path traversal.
  • OWASP Path Traversal - OWASP community page with comprehensive information about path traversal, and links to various OWASP resources to help detect or prevent it.

@kartikdedhia
Copy link
Copy Markdown
Owner Author

kartikdedhia commented Apr 8, 2026

Snyk checks have passed. No issues have been found so far.

Status Scan Engine Critical High Medium Low Total (0)
Open Source Security 0 0 0 0 0 issues
Licenses 0 0 0 0 0 issues
Code Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants