Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade io.jsonwebtoken:jjwt from 0.9.1 to 0.12.0 #12

Open
wants to merge 1 commit into
base: develop
Choose a base branch
from

Conversation

msant262
Copy link
Owner

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • webgoat-lessons/challenge/pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
high severity Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-7569538
  721   io.jsonwebtoken:jjwt:
0.9.1 -> 0.12.0
No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Denial of Service (DoS)

Copy link

guardrails bot commented Jul 27, 2024

⚠️ We detected 5 security issues in this pull request:

Vulnerable Libraries (5)
Severity Details
High pkg:maven/ch.qos.logback/[email protected] (t) upgrade to: 1.4.12,1.3.12
High pkg:maven/com.fasterxml.jackson.core/[email protected] (t) upgrade to: 2.13.2.1,2.12.6.1
High pkg:maven/ch.qos.logback/[email protected] (t) upgrade to: 1.4.12,1.3.12
High pkg:maven/org.springframework/[email protected] (t) upgrade to: 5.3.20,5.2.22.RELEASE
Medium pkg:maven/org.yaml/[email protected] (t) upgrade to: 1.31

More info on how to fix Vulnerable Libraries in Java.


👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.

Copy link

deepsource-io bot commented Jul 27, 2024

Here's the code health analysis summary for commits ec11eb6..715ade9. View details on DeepSource ↗.

Analysis Summary

AnalyzerStatusSummaryLink
DeepSource Java LogoJava✅ SuccessView Check ↗

💡 If you’re a repository administrator, you can configure the quality gates from the settings.

Copy link

sonarcloud bot commented Jul 27, 2024

@msant262
Copy link
Owner Author

Logo
Checkmarx One – Scan Summary & Detailsec11f615-46b4-4b3b-915d-2c0a8d606ee4

New Issues

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2024-5971 Maven-io.undertow:undertow-core-2.2.4.Final Vulnerable Package
MEDIUM CVE-2021-28169 Maven-org.eclipse.jetty:jetty-server-9.4.36.v20210114 Vulnerable Package
MEDIUM CVE-2021-28169 Maven-org.eclipse.jetty:jetty-http-9.4.36.v20210114 Vulnerable Package
MEDIUM CVE-2021-28169 Maven-org.eclipse.jetty:jetty-servlets-9.4.36.v20210114 Vulnerable Package
MEDIUM CVE-2024-3653 Maven-io.undertow:undertow-core-2.2.4.Final Vulnerable Package
MEDIUM CVE-2024-6484 Npm-bootstrap-3.1.1 Vulnerable Package
MEDIUM CVE-2024-6484 Maven-org.webjars:bootstrap-3.3.7 Vulnerable Package
MEDIUM CVE-2024-6485 Maven-org.webjars:bootstrap-3.3.7 Vulnerable Package
MEDIUM CVE-2024-6485 Npm-bootstrap-3.1.1 Vulnerable Package

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants