tag:github.com,2008:https://github.com/anypointcloud/json-logger/releases Tags from json-logger 2025-09-04T10:14:35Z tag:github.com,2008:Repository/815291344/v3.0.2 2025-09-04T15:28:44Z v3.0.2 mtransier tag:github.com,2008:Repository/815291344/v3.0.1 2025-09-02T07:44:29Z v3.0.1 mtransier tag:github.com,2008:Repository/815291344/v3.0.0 2025-05-23T03:20:56Z v3.0.0 rhoegg tag:github.com,2008:Repository/815291344/v2.2.3 2025-05-23T06:29:17Z v2.2.3 mtransier tag:github.com,2008:Repository/815291344/2.2.2 2025-02-12T13:38:09Z 2.2.2 mtransier tag:github.com,2008:Repository/815291344/2.2.1 2025-02-12T13:38:22Z 2.2.1 mtransier tag:github.com,2008:Repository/815291344/v2.2.0 2024-04-10T14:16:48Z v2.2.0 mtransier tag:github.com,2008:Repository/815291344/mule4.3x-v2.1.0 2022-11-17T18:40:47Z mule4.3x-v2.1.0: Merge pull request #50 from mulesoft-consulting/mule-4.3.x+ <p>Merge pull request <a class="issue-link js-issue-link" href="https://github.com/anypointcloud/json-logger/pull/50">#50</a> from mulesoft-consulting/mule-4.3.x+</p> <p># JSON Logger 2.0.1 Vulnerabilities Fixed in this PR</p> <p>## Critical Severity</p> <p>- ✗ XML External Entity (XXE) Injection [Critical Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLWOODSTOX-2928754">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLWOODSTOX-2928754</a>] in com.fasterxml.woodstox:woodstox-core@5.0.2 <br /> introduced by org.mule.services:mule-service-weave:mule-service@2.1.2 &gt; org.mule.weave:runtime@2.1.2 &gt; org.mule.weave:core-modules@2.1.2 &gt; com.fasterxml.woodstox:woodstox-core@5.0.2 <br /> This issue was fixed in versions: 5.3.0 <br />- ✗ Remote Code Execution (RCE) [Critical Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089453">https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089453</a>] in org.mule.runtime:mule-core@4.1.1 <br /> introduced by org.mule.runtime:mule-core@4.1.1 <br /> This issue was fixed in versions: 4.3.0 <br />- ✗ XML External Entity (XXE) Injection [Critical Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089455">https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089455</a>] in org.mule.runtime:mule-core@4.1.1 <br /> introduced by org.mule.runtime:mule-core@4.1.1 <br /> This issue was fixed in versions: 4.3.0 <br />- ✗ Remote Code Execution [Critical Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751</a>] in org.springframework:spring-beans@5.1.6.RELEASE <br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 &gt; org.mule.connectors:mule-jms-client@1.6.2 &gt; org.springframework:spring-jms@5.1.6.RELEASE &gt; org.springframework:spring-beans@5.1.6.RELEASE <br /> This issue was fixed in versions: 5.2.20, 5.3.18</p> <p>## High Severity</p> <p>- ✗ Denial of Service (DoS) [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360</a>] in org.yaml:snakeyaml@1.18 <br /> introduced by org.mule.runtime:mule-core@4.1.1 &gt; org.yaml:snakeyaml@1.18 <br /> This issue was fixed in versions: 1.31 <br />- ✗ XML External Entity (XXE) Injection [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3 <br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3 <br />- ✗ Denial of Service (DoS) [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3 <br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3 <br />- ✗ Denial of Service (DoS) [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-1078499">https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-1078499</a>] in net.minidev:json-smart@2.3 <br /> introduced by com.jayway.jsonpath:json-path@2.4.0 &gt; net.minidev:json-smart@2.3 <br />- ✗ XML External Entity (XXE) Injection [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-DOM4J-174153">https://security.snyk.io/vuln/SNYK-JAVA-DOM4J-174153</a>] in dom4j:dom4j@1.6.1 <br /> introduced by org.mule.runtime:mule-module-extensions-spring-support@4.1.1 &gt; dom4j:dom4j@1.6.1 <br /> No upgrade or patch available <br />- ✗ Denial of Service (DoS) [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGJSON-2841369">https://security.snyk.io/vuln/SNYK-JAVA-ORGJSON-2841369</a>] in org.json:json@20160810 <br /> introduced by org.mule.runtime:mule-metadata-model-json@1.1.1 &gt; org.everit.json:org.everit.json.schema@1.5.0 &gt; org.json:json@20160810 <br /> This issue was fixed in versions: 20180130 <br />- ✗ XML External Entity (XXE) Injection [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-DOM4J-2812975">https://security.snyk.io/vuln/SNYK-JAVA-DOM4J-2812975</a>] in dom4j:dom4j@1.6.1 <br /> introduced by org.mule.runtime:mule-module-extensions-spring-support@4.1.1 &gt; dom4j:dom4j@1.6.1 <br /> No upgrade or patch available <br />- ✗ XML External Entity (XXE) Injection [High Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLBEANS-1060048">https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLBEANS-1060048</a>] in org.apache.xmlbeans:xmlbeans@2.6.0 <br /> introduced by org.mule.runtime:mule-metadata-model-xml@1.1.1 &gt; org.apache.xmlbeans:xmlbeans@2.6.0 <br /> This issue was fixed in versions: 3.0.0</p> <p>## Medium Severity</p> <p>- ✗ Denial of Service (DoS) (new) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3 <br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3 <br />- ✗ Denial of Service (DoS) (new) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3 <br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3 <br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698">https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698</a>] in com.fasterxml.jackson.core:jackson-databind@2.10.3 <br /> introduced by com.fasterxml.jackson.core:jackson-databind@2.10.3 <br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-1298655">https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-1298655</a>] in net.minidev:json-smart@2.3 <br /> introduced by com.jayway.jsonpath:json-path@2.4.0 &gt; net.minidev:json-smart@2.3 <br />- ✗ Deserialization of Untrusted Data [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327">https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327</a>] in com.google.code.gson:gson@2.8.5 <br /> introduced by com.mulesoft.muleesb.modules:anypoint-mq-rest-client@3.1.0 &gt; com.google.code.gson:gson@2.8.5 <br /> This issue was fixed in versions: 2.8.9 <br />- ✗ Directory Traversal [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMMONSIO-1277109">https://security.snyk.io/vuln/SNYK-JAVA-COMMONSIO-1277109</a>] in commons-io:commons-io@2.6 <br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 &gt; commons-io:commons-io@2.6 <br /> This issue was fixed in versions: 2.7 <br />- ✗ Server-side Request Forgery (SSRF) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089457">https://security.snyk.io/vuln/SNYK-JAVA-ORGMULERUNTIME-1089457</a>] in org.mule.runtime:mule-core@4.1.1 <br /> introduced by org.mule.runtime:mule-core@4.1.1 <br /> This issue was fixed in versions: 4.3.0 <br />- ✗ Improper Output Neutralization for Logs [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2329097</a>] in org.springframework:spring-core@5.0.4.RELEASE <br /> introduced by com.mulesoft.muleesb.modules:anypoint-mq-rest-client@3.1.0 &gt; org.springframework:spring-core@5.0.4.RELEASE <br /> This issue was fixed in versions: 5.3.12, 5.2.18 <br />- ✗ Improper Input Validation [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2330878</a>] in org.springframework:spring-core@5.0.4.RELEASE <br /> introduced by com.mulesoft.muleesb.modules:anypoint-mq-rest-client@3.1.0 &gt; org.springframework:spring-core@5.0.4.RELEASE <br /> This issue was fixed in versions: 5.2.19.RELEASE, 5.3.14 <br />- ✗ Multipart Content Pollution [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-460644">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-460644</a>] in org.springframework:spring-core@5.0.4.RELEASE <br /> introduced by com.mulesoft.muleesb.modules:anypoint-mq-rest-client@3.1.0 &gt; org.springframework:spring-core@5.0.4.RELEASE <br /> This issue was fixed in versions: 4.3.14.RELEASE, 5.0.5.RELEASE <br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2434828</a>] in org.springframework:spring-expression@4.1.9.RELEASE <br /> introduced by org.mule.runtime:mule-module-extensions-spring-support@4.1.1 &gt; org.mule.runtime:mule-module-spring-config@4.1.1 &gt; org.springframework:spring-context@4.1.9.RELEASE &gt; org.springframework:spring-expression@4.1.9.RELEASE <br /> This issue was fixed in versions: 5.2.20.RELEASE, 5.3.17 <br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2823313">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2823313</a>] in org.springframework:spring-beans@5.1.6.RELEASE <br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 &gt; org.mule.connectors:mule-jms-client@1.6.2 &gt; org.springframework:spring-jms@5.1.6.RELEASE &gt; org.springframework:spring-beans@5.1.6.RELEASE <br /> This issue was fixed in versions: 5.2.22.RELEASE, 5.3.20 <br />- ✗ Improper Handling of Case Sensitivity [Low Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2689634</a>] in org.springframework:spring-context@4.1.9.RELEASE <br /> introduced by org.mule.runtime:mule-module-extensions-spring-support@4.1.1 &gt; org.mule.runtime:mule-module-spring-config@4.1.1 &gt; org.springframework:spring-context@4.1.9.RELEASE <br /> This issue was fixed in versions: 5.2.21, 5.3.19 <br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2823310">https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORK-2823310</a>] in org.springframework:spring-messaging@5.1.6.RELEASE <br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 &gt; org.mule.connectors:mule-jms-client@1.6.2 &gt; org.springframework:spring-jms@5.1.6.RELEASE &gt; org.springframework:spring-messaging@5.1.6.RELEASE <br /> This issue was fixed in versions: 5.2.22.RELEASE, 5.3.20 <br />- ✗ Stack-based Buffer Overflow [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016891">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016891</a>] in org.yaml:snakeyaml@1.18 <br /> introduced by org.mule.runtime:mule-core@4.1.1 &gt; org.yaml:snakeyaml@1.18 <br /> This issue was fixed in versions: 1.31 <br />- ✗ Denial of Service (DoS) [Medium Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-537645">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-537645</a>] in org.yaml:snakeyaml@1.18 <br /> introduced by org.mule.runtime:mule-core@4.1.1 &gt; org.yaml:snakeyaml@1.18 <br /> This issue was fixed in versions: 1.26</p> <p>## Low Severity <br /> <br />- ✗ Information Disclosure [Low Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415">https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415</a>] in com.google.guava:guava@25.1-jre <br /> introduced by org.mule.connectors:mule-jms-connector:mule-plugin@1.6.3 &gt; com.google.guava:guava@25.1-jre <br /> This issue was fixed in versions: 30.0-android, 30.0-jre <br />- ✗ Stack-based Buffer Overflow [Low Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016888">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016888</a>] in org.yaml:snakeyaml@1.18 <br /> introduced by org.mule.runtime:mule-core@4.1.1 &gt; org.yaml:snakeyaml@1.18 <br /> This issue was fixed in versions: 1.32 <br />- ✗ Stack-based Buffer Overflow [Low Severity][<a href="https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016889">https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-3016889</a>] in org.yaml:snakeyaml@1.18 <br /> introduced by org.mule.runtime:mule-core@4.1.1 &gt; org.yaml:snakeyaml@1.18 <br /> This issue was fixed in versions: 1.31</p> sup-mule