GreenButtonAlliance / OpenESPI-ThirdParty-java

Spring Framework implementation of a Green Button Third Party OpenESPI Application
https://sandbox.greenbuttonalliance.org:8443/ThirdParty/
Apache License 2.0
11 stars 28 forks source link

[Snyk] Fix for 1 vulnerabilities #187

Open snyk-bot opened 2 years ago

snyk-bot commented 2 years ago

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 798/1000
Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 8.1
Remote Code Execution
SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751
org.springframework.data:spring-data-jpa:
1.4.3.RELEASE -> 1.5.0.RELEASE
org.springframework.security:spring-security-config:
3.2.3.RELEASE -> 4.0.1.RELEASE
org.springframework.security:spring-security-core:
3.2.3.RELEASE -> 4.0.1.RELEASE
org.springframework.security:spring-security-taglibs:
3.2.3.RELEASE -> 4.0.1.RELEASE
org.springframework.security:spring-security-web:
3.2.3.RELEASE -> 4.0.1.RELEASE
org.springframework:spring-jdbc:
4.0.6.RELEASE -> 5.3.18
org.springframework:spring-orm:
4.0.6.RELEASE -> 5.3.18
org.springframework:spring-oxm:
4.0.6.RELEASE -> 5.3.18
org.springframework:spring-tx:
4.0.6.RELEASE -> 5.3.18
org.springframework:spring-web:
4.0.6.RELEASE -> 5.3.18
Yes Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Remote Code Execution