Skip to content

Commit a5e0dcd

Browse files
committed
Eliminate vulnerabilita' librerie terze parti.
1 parent 03a9d86 commit a5e0dcd

File tree

5 files changed

+32
-14
lines changed

5 files changed

+32
-14
lines changed

pom.xml

+22-11
Original file line numberDiff line numberDiff line change
@@ -48,26 +48,27 @@
4848

4949
<!-- swagger -->
5050
<swagger-codegen-maven-plugin.version>3.0.18-gov4j-4</swagger-codegen-maven-plugin.version>
51-
<swagger.version>1.6.9</swagger.version>
52-
<swagger.v3.version>2.2.8</swagger.v3.version>
53-
<swagger.parser.v3.version>2.1.11</swagger.parser.v3.version>
51+
<swagger.version>1.6.11</swagger.version>
52+
<swagger.v3.version>2.2.12</swagger.v3.version>
53+
<swagger.parser.v3.version>2.1.15</swagger.parser.v3.version>
5454
<snakeyaml.version>1.33</snakeyaml.version>
55+
<guava.version>32.0.1-android</guava.version>
5556

5657
<!-- cxf -->
57-
<cxf.version>3.5.5</cxf.version>
58+
<cxf.version>3.5.6</cxf.version>
5859
<cxf.xjc.runtime.version>2.7.0</cxf.xjc.runtime.version>
5960

6061
<!-- jackson -->
61-
<jackson.version>2.14.2</jackson.version>
62+
<jackson.version>2.15.2</jackson.version>
6263

6364
<!-- Jersey -->
6465
<jersey.version>2.38</jersey.version>
6566

6667
<!-- Spring -->
67-
<spring.version>5.3.25</spring.version>
68+
<spring.version>5.3.28</spring.version>
6869

6970
<!-- Spring Security -->
70-
<spring.security.version>5.8.1</spring.security.version>
71+
<spring.security.version>5.8.3</spring.security.version>
7172

7273
<!-- Spring Security Ldap plugin -->
7374
<spring.ldap.version>2.4.1</spring.ldap.version>
@@ -79,7 +80,7 @@
7980
<commons-jcs-core.version>2.2</commons-jcs-core.version>
8081
<commons.csv.version>1.5</commons.csv.version>
8182
<commons.codec.version>1.11</commons.codec.version>
82-
<commons.io.version>2.7</commons.io.version>
83+
<commons.io.version>2.13.0</commons.io.version>
8384
<commons.lang.version>2.6</commons.lang.version>
8485
<commons.lang3.version>3.12.0</commons.lang3.version>
8586
<commons.pool2.version>2.6.0</commons.pool2.version>
@@ -107,7 +108,7 @@
107108
<networknt_json-schema-validator.version>1.0.76</networknt_json-schema-validator.version>
108109

109110
<!-- org.json -->
110-
<org.json.json.version>20230227</org.json.json.version>
111+
<org.json.json.version>20230618</org.json.json.version>
111112

112113
<!-- xercesImpl -->
113114
<xercesImpl.version>2.12.2</xercesImpl.version>
@@ -129,7 +130,7 @@
129130

130131
<!-- Json Path -->
131132
<json-path.version>2.4.0</json-path.version>
132-
<json-smart.version>2.4.8</json-smart.version>
133+
<json-smart.version>2.4.11</json-smart.version>
133134
<accessors-smart.version>1.3</accessors-smart.version>
134135

135136
<!-- Base64 java8 migration class. -->
@@ -161,7 +162,7 @@
161162
<!-- dynamicreports-core -->
162163
<dynamicreports-core.version>4.1.1</dynamicreports-core.version>
163164
<!-- jasperreports -->
164-
<jasperreports.version>6.20.0</jasperreports.version>
165+
<jasperreports.version>6.20.5</jasperreports.version>
165166

166167
<jaxb.api.version>2.3.1</jaxb.api.version>
167168
<jaxb.core.version>2.3.0.1</jaxb.core.version>
@@ -814,8 +815,18 @@
814815
<groupId>org.yaml</groupId>
815816
<artifactId>snakeyaml</artifactId>
816817
</exclusion>
818+
<exclusion>
819+
<groupId>com.google.guava</groupId>
820+
<artifactId>guava</artifactId>
821+
</exclusion>
817822
</exclusions>
818823
</dependency>
824+
825+
<dependency>
826+
<groupId>com.google.guava</groupId>
827+
<artifactId>guava</artifactId>
828+
<version>${guava.version}</version>
829+
</dependency>
819830

820831
<dependency>
821832
<groupId>org.apache.cxf</groupId>

src/main/resources/owasp/falsePositives/CVE-2022-45688.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
33
<suppress>
44
<notes><![CDATA[
5-
file name: json-20230227.jar
5+
file name: json-20230618.jar
66
]]></notes>
77
<packageUrl regex="true">^pkg:maven/org\.json/json@.*$</packageUrl>
88
<cve>CVE-2022-45688</cve>

src/main/resources/owasp/falsePositives/installer.xml

+7
Original file line numberDiff line numberDiff line change
@@ -344,4 +344,11 @@
344344
<filePath regex="true">.*xercesImpl-2.9.1.jar.*</filePath>
345345
<cve>CVE-2018-2799</cve>
346346
</suppress>
347+
<suppress>
348+
<notes><![CDATA[
349+
file name: jboss-client.jar (shaded: org.jboss.netty:netty:3.2.6.Final)
350+
]]></notes>
351+
<packageUrl regex="true">^pkg:maven/org\.jboss\.netty/netty@.*$</packageUrl>
352+
<vulnerabilityName>CVE-2020-11612</vulnerabilityName>
353+
</suppress>
347354
</suppressions>

src/main/resources/owasp/falsePositives/spring-security-crypto.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
22
<suppress>
33
<notes><![CDATA[
4-
file name: spring-security-crypto-5.8.1.jar
4+
file name: spring-security-crypto-5.8.3.jar
55
La vulnerabilità indicata viene descritta come:
66
"Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16
77
use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor.

src/main/resources/owasp/falsePositives/spring-web.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
22
<suppress>
33
<notes><![CDATA[
4-
file name: spring-web-5.3.25.jar
4+
file name: spring-web-5.3.28.jar
55
La vulnerabilità indicata viene descritta come:
66
"Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data."
77
La versione utilizzata è superiore alla '5.3.16' quindi sembrerebbe un falso positivo.

0 commit comments

Comments
 (0)