tag:github.com,2008:https://github.com/anypointcloud/json-logger/releasesTags from json-logger2025-09-04T10:14:35Ztag:github.com,2008:Repository/815291344/v3.0.22025-09-04T15:28:44Zv3.0.2mtransiertag:github.com,2008:Repository/815291344/v3.0.12025-09-02T07:44:29Zv3.0.1mtransiertag:github.com,2008:Repository/815291344/v3.0.02025-05-23T03:20:56Zv3.0.0rhoeggtag:github.com,2008:Repository/815291344/v2.2.32025-05-23T06:29:17Zv2.2.3mtransiertag:github.com,2008:Repository/815291344/2.2.22025-02-12T13:38:09Z2.2.2mtransiertag:github.com,2008:Repository/815291344/2.2.12025-02-12T13:38:22Z2.2.1mtransiertag:github.com,2008:Repository/815291344/v2.2.02024-04-10T14:16:48Zv2.2.0mtransiertag:github.com,2008:Repository/815291344/mule4.3x-v2.1.02022-11-17T18:40:47Zmule4.3x-v2.1.0: Merge pull request #50 from mulesoft-consulting/mule-4.3.x+<p>Merge pull request <a class="issue-link js-issue-link" href="https://github.com/anypointcloud/json-logger/pull/50">#50</a> from mulesoft-consulting/mule-4.3.x+</p>
<p># JSON Logger 2.0.1 Vulnerabilities Fixed in this PR</p>
<p>## Critical Severity</p>
<p>- ✗ XML External Entity (XXE) Injection [Critical Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLWOODSTOX-2928754">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLWOODSTOX-2928754</a>] in com.fasterxml.woodstox:woodstox-core@5.0.2
<br /> introduced by org.mule.services:mule-service-weave:mule-service@2.1.2 > org.mule.weave:runtime@2.1.2 > org.mule.weave:core-modules@2.1.2 > com.fasterxml.woodstox:woodstox-core@5.0.2
<br /> This issue was fixed in versions: 5.3.0
<br />- ✗ Remote Code Execution (RCE) [Critical Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089453">https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089453</a>] in org.mule.runtime:mule-core@4.1.1
<br /> introduced by org.mule.runtime:mule-core@4.1.1
<br /> This issue was fixed in versions: 4.3.0
<br />- ✗ XML External Entity (XXE) Injection [Critical Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089455">https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089455</a>] in org.mule.runtime:mule-core@4.1.1
<br /> introduced by org.mule.runtime:mule-core@4.1.1
<br /> This issue was fixed in versions: 4.3.0
<br />- ✗ Remote Code Execution [Critical Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751</a>] in org.springframework:spring-beans@5.1.6.RELEASE
<br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 > org.mule.connectors:mule-jms-client@1.6.2 > org.springframework:spring-jms@5.1.6.RELEASE > org.springframework:spring-beans@5.1.6.RELEASE
<br /> This issue was fixed in versions: 5.2.20, 5.3.18</p>
<p>## High Severity</p>
<p>- ✗ Denial of Service (DoS) [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360</a>] in org.yaml:snakeyaml@1.18
<br /> introduced by org.mule.runtime:mule-core@4.1.1 > org.yaml:snakeyaml@1.18
<br /> This issue was fixed in versions: 1.31
<br />- ✗ XML External Entity (XXE) Injection [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3
<br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3
<br />- ✗ Denial of Service (DoS) [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3
<br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3
<br />- ✗ Denial of Service (DoS) [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-1078499">https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-1078499</a>] in net.minidev:json-smart@2.3
<br /> introduced by com.jayway.jsonpath:json-path@2.4.0 > net.minidev:json-smart@2.3
<br />- ✗ XML External Entity (XXE) Injection [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-DOM4J-174153">https://security.snyk.io/vuln/SNYK-JAVA-DOM4J-174153</a>] in dom4j:dom4j@1.6.1
<br /> introduced by org.mule.runtime:mule-module-extensions-spring-support@4.1.1 > dom4j:dom4j@1.6.1
<br /> No upgrade or patch available
<br />- ✗ Denial of Service (DoS) [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGJSON-2841369">https://security.snyk.io/vuln/SNYK-JAVA-ORGJSON-2841369</a>] in org.json:json@20160810
<br /> introduced by org.mule.runtime:mule-metadata-model-json@1.1.1 > org.everit.json:org.everit.json.schema@1.5.0 > org.json:json@20160810
<br /> This issue was fixed in versions: 20180130
<br />- ✗ XML External Entity (XXE) Injection [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-DOM4J-2812975">https://security.snyk.io/vuln/SNYK-JAVA-DOM4J-2812975</a>] in dom4j:dom4j@1.6.1
<br /> introduced by org.mule.runtime:mule-module-extensions-spring-support@4.1.1 > dom4j:dom4j@1.6.1
<br /> No upgrade or patch available
<br />- ✗ XML External Entity (XXE) Injection [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLBEANS-1060048">https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLBEANS-1060048</a>] in org.apache.xmlbeans:xmlbeans@2.6.0
<br /> introduced by org.mule.runtime:mule-metadata-model-xml@1.1.1 > org.apache.xmlbeans:xmlbeans@2.6.0
<br /> This issue was fixed in versions: 3.0.0</p>
<p>## Medium Severity</p>
<p>- ✗ Denial of Service (DoS) (new) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3
<br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3
<br />- ✗ Denial of Service (DoS) (new) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3
<br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3
<br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3
<br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3
<br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-1298655">https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-1298655</a>] in net.minidev:json-smart@2.3
<br /> introduced by com.jayway.jsonpath:json-path@2.4.0 > net.minidev:json-smart@2.3
<br />- ✗ Deserialization of Untrusted Data [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327">https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327</a>] in com.google.code.gson:gson@2.8.5
<br /> introduced by com.mulesoft.muleesb.modules:anypoint-mq-rest-client@3.1.0 > com.google.code.gson:gson@2.8.5
<br /> This issue was fixed in versions: 2.8.9
<br />- ✗ Directory Traversal [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMMONSIO-1277109">https://security.snyk.io/vuln/SNYK-JAVA-COMMONSIO-1277109</a>] in commons-io:commons-io@2.6
<br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 > commons-io:commons-io@2.6
<br /> This issue was fixed in versions: 2.7
<br />- ✗ Server-side Request Forgery (SSRF) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089457">https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089457</a>] in org.mule.runtime:mule-core@4.1.1
<br /> introduced by org.mule.runtime:mule-core@4.1.1
<br /> This issue was fixed in versions: 4.3.0
<br />- ✗ Improper Output Neutralization for Logs [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097</a>] in org.springframework:spring-core@5.0.4.RELEASE
<br /> introduced by com.mulesoft.muleesb.modules:anypoint-mq-rest-client@3.1.0 > org.springframework:spring-core@5.0.4.RELEASE
<br /> This issue was fixed in versions: 5.3.12, 5.2.18
<br />- ✗ Improper Input Validation [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878</a>] in org.springframework:spring-core@5.0.4.RELEASE
<br /> introduced by com.mulesoft.muleesb.modules:anypoint-mq-rest-client@3.1.0 > org.springframework:spring-core@5.0.4.RELEASE
<br /> This issue was fixed in versions: 5.2.19.RELEASE, 5.3.14
<br />- ✗ Multipart Content Pollution [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-460644">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-460644</a>] in org.springframework:spring-core@5.0.4.RELEASE
<br /> introduced by com.mulesoft.muleesb.modules:anypoint-mq-rest-client@3.1.0 > org.springframework:spring-core@5.0.4.RELEASE
<br /> This issue was fixed in versions: 4.3.14.RELEASE, 5.0.5.RELEASE
<br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828</a>] in org.springframework:spring-expression@4.1.9.RELEASE
<br /> introduced by org.mule.runtime:mule-module-extensions-spring-support@4.1.1 > org.mule.runtime:mule-module-spring-config@4.1.1 > org.springframework:spring-context@4.1.9.RELEASE > org.springframework:spring-expression@4.1.9.RELEASE
<br /> This issue was fixed in versions: 5.2.20.RELEASE, 5.3.17
<br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2823313">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2823313</a>] in org.springframework:spring-beans@5.1.6.RELEASE
<br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 > org.mule.connectors:mule-jms-client@1.6.2 > org.springframework:spring-jms@5.1.6.RELEASE > org.springframework:spring-beans@5.1.6.RELEASE
<br /> This issue was fixed in versions: 5.2.22.RELEASE, 5.3.20
<br />- ✗ Improper Handling of Case Sensitivity [Low Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634</a>] in org.springframework:spring-context@4.1.9.RELEASE
<br /> introduced by org.mule.runtime:mule-module-extensions-spring-support@4.1.1 > org.mule.runtime:mule-module-spring-config@4.1.1 > org.springframework:spring-context@4.1.9.RELEASE
<br /> This issue was fixed in versions: 5.2.21, 5.3.19
<br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2823310">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2823310</a>] in org.springframework:spring-messaging@5.1.6.RELEASE
<br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 > org.mule.connectors:mule-jms-client@1.6.2 > org.springframework:spring-jms@5.1.6.RELEASE > org.springframework:spring-messaging@5.1.6.RELEASE
<br /> This issue was fixed in versions: 5.2.22.RELEASE, 5.3.20
<br />- ✗ Stack-based Buffer Overflow [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016891">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016891</a>] in org.yaml:snakeyaml@1.18
<br /> introduced by org.mule.runtime:mule-core@4.1.1 > org.yaml:snakeyaml@1.18
<br /> This issue was fixed in versions: 1.31
<br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-537645">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-537645</a>] in org.yaml:snakeyaml@1.18
<br /> introduced by org.mule.runtime:mule-core@4.1.1 > org.yaml:snakeyaml@1.18
<br /> This issue was fixed in versions: 1.26</p>
<p>## Low Severity
<br />
<br />- ✗ Information Disclosure [Low Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415">https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415</a>] in com.google.guava:guava@25.1-jre
<br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 > com.google.guava:guava@25.1-jre
<br /> This issue was fixed in versions: 30.0-android, 30.0-jre
<br />- ✗ Stack-based Buffer Overflow [Low Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016888">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016888</a>] in org.yaml:snakeyaml@1.18
<br /> introduced by org.mule.runtime:mule-core@4.1.1 > org.yaml:snakeyaml@1.18
<br /> This issue was fixed in versions: 1.32
<br />- ✗ Stack-based Buffer Overflow [Low Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016889">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016889</a>] in org.yaml:snakeyaml@1.18
<br /> introduced by org.mule.runtime:mule-core@4.1.1 > org.yaml:snakeyaml@1.18
<br /> This issue was fixed in versions: 1.31</p>sup-mule