Vulnerability Fixes and POM adjustment
pom.xml
Vulnerability Fix: Updates to This report documents the resolution of vulnerabilities in the original pom.xml
file. The fixed version has reduced the number of vulnerabilities and addressed critical security issues. Below is a summary of the resolved and remaining vulnerabilities.
Key Improvements:
-
Reduced Vulnerabilities
- Original Total: 29 (Critical: 2, High: 6, Medium: 19, Low: 2)
- Fixed Total: 21 (Critical: 1, High: 5, Medium: 13, Low: 2)
-
Fixed Critical Issues
- Resolved CVE-2024-12798, an arbitrary code execution vulnerability in
ch.qos.logback:logback-core
.
- Resolved CVE-2024-12798, an arbitrary code execution vulnerability in
Details of Fixed Vulnerabilities:
-
ch.qos.logback:logback-core
- Vulnerability: CVE-2024-12798
- Severity: Medium
-
Issue: Arbitrary code execution via
JaninoEventEvaluator
. -
Resolution: Upgraded from
1.5.6
to1.5.13
.
-
commons-io:commons-io
- Vulnerability: CVE-2024-47554
- Severity: High
-
Issue: Denial of Service (DoS) through untrusted input to
XmlStreamReader
. -
Resolution: Upgrade to
2.14.0
.
-
org.springframework.security:spring-security-web
- Vulnerability: CVE-2024-38821
- Severity: Critical
- Issue: Authorization bypass in WebFlux static resources.
-
Resolution: Upgrade paths to versions
5.7.13
,5.8.15
,6.2.7
,6.0.13
,6.1.11
, or6.3.4
.
-
org.springframework.boot:spring-boot-loader
- Vulnerability: CVE-2024-38807
- Severity: High
-
Issue: Vulnerabilities in applications using
spring-boot-loader
. -
Resolution: Upgrade paths to versions
2.7.22
,3.0.17
,3.1.13
,3.2.9
, or3.3.3
.
Remaining Vulnerabilities:
Despite these fixes, a critical vulnerability remains, along with high, medium, and low severity issues that require attention in subsequent updates.
-
Critical:
-
software.amazon.ion:ion-java
– CVE-2024-21634
-
-
High:
-
org.springframework:spring-webmvc
– Path traversal vulnerabilities.
-
-
Medium:
-
io.lettuce:lettuce-core
– Vulnerabilities in Netty dependency.
-
Summary:
The fixes in this update address critical and high-severity vulnerabilities, improving the overall security posture of the project.
Edited by Daniel Scholl