Skip to content

[Snyk] Fix for 54 vulnerabilities

Ghost User requested to merge snyk-fix-a1f84bcf8c9ea27c720e0a7d1c9e1afa into master

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this Merge Request

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • web-app/asqatasun-web-app/pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 624/1000
Why? Has a fix available, CVSS 8.2
XML External Entity (XXE) Injection
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302
No No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244
No No Known Exploit
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424
No Proof of Concept
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426
Yes Proof of Concept
low severity 486/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.3
Information Disclosure
SNYK-JAVA-COMGOOGLEGUAVA-1015415
org.seleniumhq.selenium:selenium-firefox-driver:
4.0.0-alpha-5 -> 4.0.0
org.seleniumhq.selenium:selenium-java:
4.0.0-alpha-5 -> 4.0.0
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
org.seleniumhq.selenium:selenium-support:
4.0.0-alpha-5 -> 4.0.0
No Proof of Concept
high severity 564/1000
Why? Has a fix available, CVSS 7
Deserialization of Untrusted Data
SNYK-JAVA-COMMONSBEANUTILS-460111
commons-validator:commons-validator:
1.6 -> 1.7
No No Known Exploit
high severity 731/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.2
Information Exposure
SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No Proof of Concept
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1070799
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082234
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082235
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082236
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 524/1000
Why? Has a fix available, CVSS 6.2
Information Disclosure
SNYK-JAVA-IONETTY-1082238
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 724/1000
Why? Mature exploit, Has a fix available, CVSS 5.9
HTTP Request Smuggling
SNYK-JAVA-IONETTY-1317097
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No Mature
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584063
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-IONETTY-1584064
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 539/1000
Why? Has a fix available, CVSS 6.5
HTTP Request Smuggling
SNYK-JAVA-IONETTY-2314893
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 489/1000
Why? Has a fix available, CVSS 5.5
Information Exposure
SNYK-JAVA-IONETTY-2812456
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
XML External Entity (XXE) Injection
SNYK-JAVA-MYSQL-1766958
mysql:mysql-connector-java:
8.0.25 -> 8.0.28
No Proof of Concept
medium severity 544/1000
Why? Has a fix available, CVSS 6.6
Improper Authorization
SNYK-JAVA-MYSQL-2386864
mysql:mysql-connector-java:
8.0.25 -> 8.0.28
No No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHETIKA-2825265
org.apache.tika:tika-core:
2.0.0 -> 2.4.1
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHETIKA-2936441
org.apache.tika:tika-core:
2.0.0 -> 2.4.1
No No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-1048292
No Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Information Disclosure
SNYK-JAVA-ORGAPACHETOMCATEMBED-1061939
No No Known Exploit
high severity 564/1000
Why? Has a fix available, CVSS 7
Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHETOMCATEMBED-1080637
No No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
HTTP Request Smuggling
SNYK-JAVA-ORGAPACHETOMCATEMBED-1080638
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGAPACHETOMCATEMBED-1728264
No No Known Exploit
medium severity 454/1000
Why? Has a fix available, CVSS 4.8
Improper Input Validation
SNYK-JAVA-ORGAPACHETOMCATEMBED-1728265
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
HTTP Request Smuggling
SNYK-JAVA-ORGAPACHETOMCATEMBED-1728266
No No Known Exploit
high severity 564/1000
Why? Has a fix available, CVSS 7
Privilege Escalation
SNYK-JAVA-ORGAPACHETOMCATEMBED-2414084
No No Known Exploit
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Information Exposure
SNYK-JAVA-ORGAPACHETOMCATEMBED-3035793
No No Known Exploit
low severity 399/1000
Why? Has a fix available, CVSS 3.7
HTTP Request Smuggling
SNYK-JAVA-ORGAPACHETOMCATEMBED-3097829
No No Known Exploit
high severity 635/1000
Why? Has a fix available, CVSS 8.2
SQL Injection
SNYK-JAVA-ORGHIBERNATE-1041788
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Locking
SNYK-JAVA-ORGJETBRAINSKOTLIN-2628385
org.jetbrains.kotlin:kotlin-stdlib-jdk8:
1.3.71 -> 1.6.0
org.seleniumhq.selenium:selenium-remote-driver:
4.0.0-alpha-5 -> 4.2.0
No No Known Exploit
low severity 364/1000
Why? Has a fix available, CVSS 3
XML External Entity (XXE) Injection
SNYK-JAVA-ORGOWASPESAPI-1088594
org.owasp.esapi:esapi:
2.1.0 -> 2.3.0.0
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Directory Traversal
SNYK-JAVA-ORGOWASPESAPI-2803305
org.owasp.esapi:esapi:
2.1.0 -> 2.3.0.0
No No Known Exploit
medium severity 519/1000
Why? Has a fix available, CVSS 6.1
Cross-site Scripting (XSS)
SNYK-JAVA-ORGOWASPESAPI-2805301
org.owasp.esapi:esapi:
2.1.0 -> 2.3.0.0
No No Known Exploit
medium severity 484/1000
Why? Has a fix available, CVSS 5.4
MAC validation Bypass
SNYK-JAVA-ORGOWASPESAPI-30143
org.owasp.esapi:esapi:
2.1.0 -> 2.3.0.0
No No Known Exploit
medium severity 434/1000
Why? Has a fix available, CVSS 4.4
Privilege Escalation
SNYK-JAVA-ORGSPRINGFRAMEWORK-1296829
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Output Neutralization for Logs
SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No No Known Exploit
medium severity 429/1000
Why? Has a fix available, CVSS 4.3
Improper Input Validation
SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No No Known Exploit
critical severity 919/1000
Why? Mature exploit, Has a fix available, CVSS 9.8
Remote Code Execution
SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No Mature
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Improper Handling of Case Sensitivity
SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No Proof of Concept
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGSPRINGFRAMEWORK-2823313
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No No Known Exploit
medium severity 439/1000
Why? Has a fix available, CVSS 4.5
Privilege Escalation
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-1078232
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No No Known Exploit
low severity 380/1000
Why? Has a fix available, CVSS 3.1
Timing Attack
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-1290497
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No No Known Exploit
high severity 731/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.2
Authorization Bypass
SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-2833359
org.springframework.security:spring-security-taglibs:
5.2.2.RELEASE -> 5.5.7
No Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGYAML-2806360
Yes No Known Exploit
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016888
Yes Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016889
Yes No Known Exploit
medium severity 536/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 4.3
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016891
Yes Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3113851
Yes No Known Exploit
medium severity 591/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.4
Denial of Service (DoS)
SNYK-JAVA-ORGYAML-537645
No Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Vulnerabilities that could not be fixed

  • Upgrade:
    • Could not upgrade org.apache.tomcat.embed:tomcat-embed-jasper@9.0.39 to org.apache.tomcat.embed:tomcat-embed-jasper@9.0.68; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.11.RELEASE/spring-boot-dependencies-2.2.11.RELEASE.pom
    • Could not upgrade org.hibernate:hibernate-c3p0@5.4.22.Final to org.hibernate:hibernate-c3p0@5.4.24.Final; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.11.RELEASE/spring-boot-dependencies-2.2.11.RELEASE.pom
    • Could not upgrade org.hibernate:hibernate-ehcache@5.4.22.Final to org.hibernate:hibernate-ehcache@5.4.24.Final; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.11.RELEASE/spring-boot-dependencies-2.2.11.RELEASE.pom
    • Could not upgrade org.hibernate:hibernate-entitymanager@5.4.22.Final to org.hibernate:hibernate-entitymanager@5.4.24.Final; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.11.RELEASE/spring-boot-dependencies-2.2.11.RELEASE.pom
    • Could not upgrade org.springframework.boot:spring-boot-starter-security@2.2.11.RELEASE to org.springframework.boot:spring-boot-starter-security@2.5.14; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.11.RELEASE/spring-boot-dependencies-2.2.11.RELEASE.pom
    • Could not upgrade org.springframework.boot:spring-boot-starter-web@2.2.11.RELEASE to org.springframework.boot:spring-boot-starter-web@3.0.0; Reason could not apply upgrade, dependency is managed externally ; Location: https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.2.11.RELEASE/spring-boot-dependencies-2.2.11.RELEASE.pom

Check the changes in this Merge Request to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 XML External Entity (XXE) Injection 🦉 Denial of Service (DoS) 🦉 Denial of Service (DoS) 🦉 More lessons are available in Snyk Learn

Merge request reports