Vulnerabilities and POM updates.
pom.xml
Vulnerability Fix: Updated Libraries in This PR addresses several critical, high, and medium-severity vulnerabilities by updating dependencies in the pom.xml
file. Below are the resolved issues and the details of the updates:
Fixed Vulnerabilities:
-
com.azure:azure-identity
- Vulnerability: CVE-2024-35255
- Severity: Medium
- Issue: Elevation of privilege in Azure Identity Libraries.
-
Resolution: Upgraded from
1.0.1
to1.12.2
.
-
com.google.protobuf:protobuf-java
- Vulnerability: CVE-2024-7254
- Severity: High
- Issue: StackOverflow vulnerability in Protocol Buffers.
-
Resolution: Upgraded from
3.24.4
to3.25.5
.
-
com.nimbusds:nimbus-jose-jwt
- Vulnerability: CVE-2023-52428
- Severity: High
-
Issue: Denial of Service due to large
p2c
header values. -
Resolution: Upgraded from
7.9
to9.37.2
.
-
com.squareup.okio:okio
- Vulnerability: CVE-2023-3635
- Severity: Medium
-
Issue: Improper exception handling in
GzipSource
class. -
Resolution: Upgraded from
2.7.0
to3.4.0
.
-
org.apache.commons:commons-compress
-
Vulnerabilities:
-
CVE-2024-25710
- Severity: High
- Issue: Denial of Service caused by infinite loops with corrupted input.
-
CVE-2024-26308
- Severity: Medium
- Issue: OutOfMemoryError when unpacking broken Pack200 files.
-
CVE-2024-25710
-
Resolution: Upgraded from
1.21
to1.26.0
.
-
Vulnerabilities:
-
io.lettuce:lettuce-core
- Vulnerability: GHSA-q4h9-7rxj-7gx2
- Severity: Medium
- Issue: Vulnerability in Netty included with Redis Lettuce.
-
Resolution: Upgraded from
6.3.2.RELEASE
to6.5.1.RELEASE
.
-
io.netty:netty-common
- Vulnerability: CVE-2024-47535
- Severity: Medium
- Issue: Denial of Service attack on Windows apps using Netty.
-
Resolution: Upgraded from
4.1.114.Final
to4.1.115
.
-
software.amazon.ion:ion-java
- Vulnerability: CVE-2024-21634
- Severity: High
- Issue: StackOverflow vulnerability in Ion Java.
-
Resolution: Upgraded from
1.2.0
to1.10.5
.
-
org.springframework:spring-beans
- Vulnerability: CVE-2024-38827
- Severity: Medium
- Issue: Authorization bypass for case-sensitive comparisons in Spring Security.
-
Resolution: Upgraded to
6.1.14
.
-
org.xerial.snappy:snappy-java
-
Vulnerabilities:
-
CVE-2023-34455
- Severity: High
- Issue: Unchecked chunk length leading to DoS.
-
CVE-2023-43642
- Severity: High
- Issue: Missing upper-bound check on chunk length.
-
CVE-2023-34453
- Severity: Medium
- Issue: Integer overflow in shuffle leading to DoS.
-
CVE-2023-34455
-
Resolution: Upgraded from
1.1.8.4
to1.1.10.4
.
-
Vulnerabilities:
Summary
The updates have successfully reduced the total vulnerabilities resolving critical issues and several high and medium-severity vulnerabilities. This significantly enhances the project's security posture.