Skip to content
This repository has been archived by the owner on Mar 9, 2023. It is now read-only.

[Snyk] Fix for 37 vulnerabilities #62

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

snyk-bot
Copy link

@snyk-bot snyk-bot commented Dec 9, 2021

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • thunder-core/pom.xml
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 599/1000
Why? Has a fix available, CVSS 7.7
Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLECODEGSON-1730327
com.google.code.gson:gson:
2.5 -> 2.8.9
No No Known Exploit
medium severity 596/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.5
Information Disclosure
SNYK-JAVA-COMGOOGLEGUAVA-1015415
org.bitcoinj:bitcoinj-core:
0.13.1 -> 0.16
No Proof of Concept
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLEGUAVA-32236
org.bitcoinj:bitcoinj-core:
0.13.1 -> 0.16
No No Known Exploit
high severity 654/1000
Why? Has a fix available, CVSS 8.8
Integer Overflow
SNYK-JAVA-COMGOOGLEPROTOBUF-173761
org.bitcoinj:bitcoinj-core:
0.13.1 -> 0.16
No No Known Exploit
high severity 726/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 8.1
XML External Entity (XXE) Injection
SNYK-JAVA-COMH2DATABASE-1769238
com.h2database:h2:
1.3.176 -> 2.0.202
Yes Proof of Concept
high severity 826/1000
Why? Mature exploit, Has a fix available, CVSS 8.8
Remote Code Execution (RCE)
SNYK-JAVA-COMH2DATABASE-31685
com.h2database:h2:
1.3.176 -> 2.0.202
No Mature
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
SSL Certificate Bypass
SNYK-JAVA-COMSQUAREUPOKHTTP-30380
org.bitcoinj:bitcoinj-core:
0.13.1 -> 0.16
com.squareup.okhttp:okhttp:
2.6.0 -> 2.7.4
No No Known Exploit
medium severity 646/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.5
HTTP Request Smuggling
SNYK-JAVA-IONETTY-473214
io.netty:netty-all:
4.0.33.Final -> 4.1.44.Final
No Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
HTTP Request Smuggling
SNYK-JAVA-IONETTY-559515
io.netty:netty-all:
4.0.33.Final -> 4.1.44.Final
No Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
HTTP Request Smuggling
SNYK-JAVA-IONETTY-559516
io.netty:netty-all:
4.0.33.Final -> 4.1.44.Final
No Proof of Concept
low severity 466/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 2.9
Information Exposure
SNYK-JAVA-JUNIT-1017047
junit:junit:
4.12 -> 4.13.1
No Proof of Concept
medium severity 529/1000
Why? Has a fix available, CVSS 6.3
Privilege Escalation
SNYK-JAVA-MYSQL-174574
mysql:mysql-connector-java:
5.1.36 -> 8.0.27
Yes No Known Exploit
medium severity 616/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
XML External Entity (XXE) Injection
SNYK-JAVA-MYSQL-1766958
mysql:mysql-connector-java:
5.1.36 -> 8.0.27
Yes Proof of Concept
high severity 639/1000
Why? Has a fix available, CVSS 8.5
Improper Access Control
SNYK-JAVA-MYSQL-31399
mysql:mysql-connector-java:
5.1.36 -> 8.0.27
No No Known Exploit
low severity 379/1000
Why? Has a fix available, CVSS 3.3
Improper Access Control
SNYK-JAVA-MYSQL-31449
mysql:mysql-connector-java:
5.1.36 -> 8.0.27
No No Known Exploit
medium severity 534/1000
Why? Has a fix available, CVSS 6.4
Arbitrary Code Execution
SNYK-JAVA-MYSQL-31580
mysql:mysql-connector-java:
5.1.36 -> 8.0.27
No No Known Exploit
high severity 654/1000
Why? Has a fix available, CVSS 8.8
Access Control Bypass
SNYK-JAVA-MYSQL-451464
mysql:mysql-connector-java:
5.1.36 -> 8.0.27
Yes No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Input Validation
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-1048058
org.apache.httpcomponents:httpclient:
4.5 -> 4.5.13
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Directory Traversal
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
org.apache.httpcomponents:httpclient:
4.5 -> 4.5.13
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Information Exposure
SNYK-JAVA-ORGBOUNCYCASTLE-1035561
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Timing Attack
SNYK-JAVA-ORGBOUNCYCASTLE-1296075
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Information Exposure
SNYK-JAVA-ORGBOUNCYCASTLE-173771
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Insufficient Validation
SNYK-JAVA-ORGBOUNCYCASTLE-32340
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32361
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32362
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Timing Attack
SNYK-JAVA-ORGBOUNCYCASTLE-32363
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Signature Validation Bypass
SNYK-JAVA-ORGBOUNCYCASTLE-32364
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Insufficient Validation
SNYK-JAVA-ORGBOUNCYCASTLE-32365
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
high severity 584/1000
Why? Has a fix available, CVSS 7.4
Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32366
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Cryptographic Issues
SNYK-JAVA-ORGBOUNCYCASTLE-32367
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
high severity 584/1000
Why? Has a fix available, CVSS 7.4
Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32368
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Insecure Encryption
SNYK-JAVA-ORGBOUNCYCASTLE-32369
org.bouncycastle:bcprov-jdk15on:
1.54 -> 1.66
No No Known Exploit
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-1090340
org.eclipse.jetty.websocket:websocket-client:
9.3.2.v20150730 -> 9.4.39.v20210325
No Proof of Concept
medium severity 621/1000
Why? Mature exploit, Has a fix available, CVSS 4.7
Cross-site Scripting (XSS)
SNYK-JAVA-ORGECLIPSEJETTY-174479
org.eclipse.jetty.websocket:websocket-client:
9.3.2.v20150730 -> 9.4.39.v20210325
No Mature
critical severity 704/1000
Why? Has a fix available, CVSS 9.8
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-31117
org.eclipse.jetty.websocket:websocket-client:
9.3.2.v20150730 -> 9.4.39.v20210325
No No Known Exploit
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Timing Attack
SNYK-JAVA-ORGECLIPSEJETTY-32151
org.eclipse.jetty.websocket:websocket-client:
9.3.2.v20150730 -> 9.4.39.v20210325
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-461008
org.eclipse.jetty.websocket:websocket-client:
9.3.2.v20150730 -> 9.4.39.v20210325
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-32236
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-173761
- https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238
- https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-31685
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP-30380
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-473214
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-559515
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-559516
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-1766958
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-31399
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-31449
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-31580
- https://snyk.io/vuln/SNYK-JAVA-MYSQL-451464
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-1048058
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-31517
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-1035561
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-1296075
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-173771
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32340
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32361
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32362
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32363
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32364
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32365
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32366
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32367
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32368
- https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-32369
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-1090340
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-174479
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-31117
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-32151
- https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-461008
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant