Skip to content

Fix Security Vulnerabilities in Indexer-Queue Service

Summary

This PR addresses security vulnerabilities in the community Indexer-Queue service by updating dependencies to their secure versions.

Vulnerabilities Fixed

1. Netty Codec Vulnerabilities (HIGH SEVERITY)

  • CVEs: CVE-2025-58056, CVE-2025-58057, CVE-2025-55163
  • Resolution: Fixed via Spring Boot 3.4.10 upgrade

2. Apache Commons Lang3 Vulnerability (MEDIUM SEVERITY)

  • CVE: CVE-2025-48924
  • Previous Version: 3.9
  • Fixed Version: 3.18.0

3. Nimbus JOSE JWT Vulnerability (MEDIUM SEVERITY)

  • CVE: CVE-2025-53864
  • Previous Version: 9.47 (in Azure enqueue module)
  • Fixed Version: 10.0.2

4. Reactor Netty HTTP Vulnerability (MEDIUM SEVERITY)

  • CVE: CVE-2025-22227
  • Resolution: Fixed via Spring Boot 3.4.10

Changes Made

pom.xml (Root)

  • Upgraded spring-boot.version: 3.3.7 → 3.4.10
  • Updated commons-lang3 from 3.9 to 3.18.0 with security comment

indexer-queue-azure-enqueue/pom.xml

  • Updated nimbus-jose.version: 9.47 → 10.0.2

Dependency Resolution

The Spring Boot 3.4.10 upgrade provides:

  • Netty components at 4.1.127.Final
  • Reactor Netty HTTP at 1.2.8

The commons-lang3 override is explicitly set to 3.18.0 to fix the vulnerability, as Spring Boot 3.4.10 still includes 3.17.0.

Notes

  • The commons-lang3 override can be removed when Spring Boot updates to 3.18.0 or later
  • The nimbus-jose-jwt update in the Azure enqueue module addresses the specific vulnerability
Edited by Charles Zipp

Merge request reports

Loading