Skip to content

Conversation

@snyk-bot
Copy link

Snyk has created this PR to upgrade org.apache.struts:struts2-spring-plugin from 2.3.20 to 2.5.22.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
  • The recommended version is 35 versions ahead of your current version.
  • The recommended version was released 3 months ago, on 2019-11-17.

The recommended version fixes:

Severity Issue Exploit Maturity
Insecure Defaults
SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418
No Known Exploit
Command Injection
SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611
Mature
Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803
No Known Exploit
Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802
No Known Exploit
Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799
No Known Exploit
Parameter Alteration
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798
No Known Exploit
Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30797
No Known Exploit
Improper Action Name Cleanup
SNYK-JAVA-ORGAPACHESTRUTS-451610
No Known Exploit
Remote Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-32477
Mature
Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-31503
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31502
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31501
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31500
No Known Exploit
Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-31495
Mature
Directory Traversal
SNYK-JAVA-ORGAPACHESTRUTS-30778
No Known Exploit
Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30776
No Known Exploit
Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30775
No Known Exploit
Cross-site Request Forgery (CSRF)
SNYK-JAVA-ORGAPACHESTRUTS-30774
No Known Exploit
Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-30772
Mature
Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30771
No Known Exploit
Command Injection
SNYK-JAVA-ORGAPACHESTRUTS-30770
Mature
Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30207
Mature
Manipulation of Struts' internals
SNYK-JAVA-ORGAPACHESTRUTS-30060
No Known Exploit
Arbitrary Code Execution
SNYK-JAVA-COMMONSFILEUPLOAD-30401
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-COMMONSFILEUPLOAD-30082
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804
No Known Exploit
Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801
No Known Exploit
Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800
No Known Exploit
Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTS-460223
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-30777
No Known Exploit
Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTS-30773
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-OGNL-30474
No Known Exploit
Information Disclosure
SNYK-JAVA-COMMONSFILEUPLOAD-31540
No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

[//]: # (snyk:metadata:{"dependencies":[{"name":"org.apache.struts:struts2-spring-plugin","from":"2.3.20","to":"2.5.22"}],"packageManager":"maven","type":"auto","projectUrl":"https://app.snyk.io/org/dansnyk/project/eeedcb5a-ab5a-46e8-a332-0d29660c155e?utm_source=github&utm_medium=upgrade-pr","projectPublicId":"eeedcb5a-ab5a-46e8-a332-0d29660c155e","env":"prod","prType":"upgrade","vulns":["SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418","SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30797","SNYK-JAVA-ORGAPACHESTRUTS-451610","SNYK-JAVA-ORGAPACHESTRUTS-32477","SNYK-JAVA-ORGAPACHESTRUTS-31503","SNYK-JAVA-ORGAPACHESTRUTS-31502","SNYK-JAVA-ORGAPACHESTRUTS-31501","SNYK-JAVA-ORGAPACHESTRUTS-31500","SNYK-JAVA-ORGAPACHESTRUTS-31495","SNYK-JAVA-ORGAPACHESTRUTS-30778","SNYK-JAVA-ORGAPACHESTRUTS-30776","SNYK-JAVA-ORGAPACHESTRUTS-30775","SNYK-JAVA-ORGAPACHESTRUTS-30774","SNYK-JAVA-ORGAPACHESTRUTS-30772","SNYK-JAVA-ORGAPACHESTRUTS-30771","SNYK-JAVA-ORGAPACHESTRUTS-30770","SNYK-JAVA-ORGAPACHESTRUTS-30207","SNYK-JAVA-ORGAPACHESTRUTS-30060","SNYK-JAVA-COMMONSFILEUPLOAD-30401","SNYK-JAVA-COMMONSFILEUPLOAD-30082","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800","SNYK-JAVA-ORGAPACHESTRUTS-460223","SNYK-JAVA-ORGAPACHESTRUTS-30777","SNYK-JAVA-ORGAPACHESTRUTS-30773","SNYK-JAVA-OGNL-30474","SNYK-JAVA-COMMONSFILEUPLOAD-31540"],"issuesToFix":[{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418","severity":"high","title":"Insecure Defaults","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611","severity":"high","title":"Command Injection","exploitMaturity":"mature"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803","severity":"high","title":"Arbitrary Code Execution","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802","severity":"high","title":"Improper Input Validation","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799","severity":"high","title":"Improper Input Validation","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798","severity":"high","title":"Parameter Alteration","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30797","severity":"high","title":"Arbitrary Code Execution","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-451610","severity":"high","title":"Improper Action Name Cleanup","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-32477","severity":"high","title":"Remote Code Execution","exploitMaturity":"mature"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-31503","severity":"high","title":"Arbitrary Code Execution","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-31502","severity":"high","title":"Denial of Service (DoS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-31501","severity":"high","title":"Denial of Service (DoS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-31500","severity":"high","title":"Denial of Service (DoS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-31495","severity":"high","title":"Arbitrary Command Execution","exploitMaturity":"mature"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30778","severity":"high","title":"Directory Traversal","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30776","severity":"high","title":"Access Restriction Bypass","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30775","severity":"high","title":"Access Restriction Bypass","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30774","severity":"high","title":"Cross-site Request Forgery (CSRF)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30772","severity":"high","title":"Arbitrary Command Execution","exploitMaturity":"mature"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30771","severity":"high","title":"Arbitrary Code Execution","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30770","severity":"high","title":"Command Injection","exploitMaturity":"mature"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30207","severity":"high","title":"Arbitrary Code Execution","exploitMaturity":"mature"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30060","severity":"high","title":"Manipulation of Struts' internals","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-COMMONSFILEUPLOAD-30401","severity":"high","title":"Arbitrary Code Execution","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-COMMONSFILEUPLOAD-30082","severity":"high","title":"Denial of Service (DoS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804","severity":"medium","title":"Regular Expression Denial of Service (ReDoS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801","severity":"medium","title":"Improper Input Validation","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800","severity":"medium","title":"Cross-site Scripting (XSS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-460223","severity":"medium","title":"Regular Expression Denial of Service (ReDoS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30777","severity":"medium","title":"Denial of Service (DoS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-ORGAPACHESTRUTS-30773","severity":"medium","title":"Cross-site Scripting (XSS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-OGNL-30474","severity":"medium","title":"Denial of Service (DoS)","exploitMaturity":"no-known-exploit"},{"issueId":"SNYK-JAVA-COMMONSFILEUPLOAD-31540","severity":"medium","title":"Information Disclosure","exploitMaturity":"no-known-exploit"}],"upgrade":["SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418","SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30797","SNYK-JAVA-ORGAPACHESTRUTS-451610","SNYK-JAVA-ORGAPACHESTRUTS-32477","SNYK-JAVA-ORGAPACHESTRUTS-31503","SNYK-JAVA-ORGAPACHESTRUTS-31502","SNYK-JAVA-ORGAPACHESTRUTS-31501","SNYK-JAVA-ORGAPACHESTRUTS-31500","SNYK-JAVA-ORGAPACHESTRUTS-31495","SNYK-JAVA-ORGAPACHESTRUTS-30778","SNYK-JAVA-ORGAPACHESTRUTS-30776","SNYK-JAVA-ORGAPACHESTRUTS-30775","SNYK-JAVA-ORGAPACHESTRUTS-30774","SNYK-JAVA-ORGAPACHESTRUTS-30772","SNYK-JAVA-ORGAPACHESTRUTS-30771","SNYK-JAVA-ORGAPACHESTRUTS-30770","SNYK-JAVA-ORGAPACHESTRUTS-30207","SNYK-JAVA-ORGAPACHESTRUTS-30060","SNYK-JAVA-COMMONSFILEUPLOAD-30401","SNYK-JAVA-COMMONSFILEUPLOAD-30082","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801","SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800","SNYK-JAVA-ORGAPACHESTRUTS-460223","SNYK-JAVA-ORGAPACHESTRUTS-30777","SNYK-JAVA-ORGAPACHESTRUTS-30773","SNYK-JAVA-OGNL-30474","SNYK-JAVA-COMMONSFILEUPLOAD-31540"],"upgradeInfo":{"versionsDiff":35,"publishedDate":"2019-11-17T19:23:37.000Z"},"templateVariants":[],"hasFixes":true,"isMajorUpgrade":false,"isBreakingChange":false})

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants