-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[🐸 Frogbot] Update Maven dependencies #192
base: master
Are you sure you want to change the base?
Conversation
This comment has been minimized.
This comment has been minimized.
1221dfc
to
6cb7a6a
Compare
This comment has been minimized.
This comment has been minimized.
6cb7a6a
to
732c81e
Compare
Quality Gate passedIssues Measures |
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2021-3711 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2024-7254 ] com.google.protobuf:protobuf-java 3.6.1Description: [ CVE-2019-2435 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2021-3449 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2020-1967 ] mysql:mysql-connector-java 8.0.13Description: OpenSSL's Remediation: Development mitigations
[ CVE-2021-3712 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2021-3450 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2021-2471 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2022-21363 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2021-22570 ] com.google.protobuf:protobuf-java 3.6.1Description: [ CVE-2020-2875 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2019-2692 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2021-22569 ] com.google.protobuf:protobuf-java 3.6.1Description: [ CVE-2020-2934 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2021-44531 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2021-44532 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2023-21971 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2021-44533 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2022-21824 ] mysql:mysql-connector-java 8.0.13Description: [ CVE-2022-3509 ] com.google.protobuf:protobuf-java 3.6.1Description: Protocol Buffers is encoding and decoding the protocol buffer's own format called the wire format. The issue only occurs when parsing a text Protobuf message buffer (using the Moreover, an attacker must be able to send a crafted Protobuf message to the victim client/server. [ CVE-2022-3171 ] com.google.protobuf:protobuf-java 3.6.1Description: Protocol Buffers is encoding and decoding the protocol buffer's own format called the wire format. It was discovered that due to a design problem in the parsing procedure for binary data, a denial of service can occur, due to unknown fields causing objects to be converted constantly between mutable and immutable forms. The issue only occurs when a An example of a vulnerable protobuf message:
The attacker must be able to send a protobuf message with the [ CVE-2022-3510 ] com.google.protobuf:protobuf-java 3.6.1Description: Protocol Buffers is encoding and decoding the protocol buffer's own format called the wire format. It was discovered that due to a design problem in the parsing procedure for binary data, a denial of service can occur, due to unknown fields causing objects to be converted constantly between mutable and immutable forms, which may exhaust the CPU. The issue only occurs when a An example of a vulnerable protobuf message:
The attacker must be able to send a protobuf message with the |
❌ Build failed in 6m 19sBuild command: mvn clean verify -B -e -Daudit -Djs.no.sandbox -pl \
pentaho-aggdesigner-core,pentaho-aggdesigner-ui 👌 All tests passed! Tests run: 68, Failures: 0, Skipped: 0 Test Results ℹ️ This is an automatic message |
📦 Vulnerable Dependencies
✍️ Summary
High
Critical
🔬 Research Details
[ CVE-2018-3258 ] mysql:mysql-connector-java 6.0.6
Description:
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[ CVE-2022-41853 ] org.hsqldb:hsqldb 2.3.2
Description:
Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.
🐸 JFrog Frogbot