Skip to content

[Snyk] Security upgrade com.squareup.retrofit2:retrofit from 2.11.0 to 3.0.0 #416

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

officialmofabs
Copy link

@officialmofabs officialmofabs commented May 20, 2025

snyk-top-banner

Snyk has created this PR to fix 2 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • samples/client/petstore/java/retrofit2rx2/pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
medium severity Denial of Service (DoS)
SNYK-JAVA-COMSQUAREUPOKIO-5773320
  616   com.squareup.retrofit2:retrofit:
2.11.0 -> 3.0.0
Major version upgrade Proof of Concept
medium severity Information Exposure
SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
  561   com.squareup.retrofit2:retrofit:
2.11.0 -> 3.0.0
Major version upgrade Proof of Concept

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Denial of Service (DoS)

Summary by Sourcery

Upgrade Retrofit dependency to version 3.0.0 in the sample project to address medium-severity security vulnerabilities.

Bug Fixes:

  • Fix Denial of Service vulnerability by upgrading Retrofit
  • Fix Information Exposure vulnerability by upgrading Retrofit

Build:

  • Bump com.squareup.retrofit2:retrofit from 2.11.0 to 3.0.0 in sample client pom

Copy link

sourcery-ai bot commented May 20, 2025

Reviewer's Guide

Bumps the Retrofit Maven property in the sample project from 2.11.0 to 3.0.0 to remediate two medium-severity vulnerabilities (DoS and information exposure), entailing a major version upgrade in the POM file.

File-Level Changes

Change Details Files
Upgrade Retrofit dependency to version 3.0.0
  • Updated <retrofit-version> property from 2.11.0 to 3.0.0
samples/client/petstore/java/retrofit2rx2/pom.xml

Tips and commands

Interacting with Sourcery

  • Trigger a new review: Comment @sourcery-ai review on the pull request.
  • Continue discussions: Reply directly to Sourcery's review comments.
  • Generate a GitHub issue from a review comment: Ask Sourcery to create an
    issue from a review comment by replying to it. You can also reply to a
    review comment with @sourcery-ai issue to create an issue from it.
  • Generate a pull request title: Write @sourcery-ai anywhere in the pull
    request title to generate a title at any time. You can also comment
    @sourcery-ai title on the pull request to (re-)generate the title at any time.
  • Generate a pull request summary: Write @sourcery-ai summary anywhere in
    the pull request body to generate a PR summary at any time exactly where you
    want it. You can also comment @sourcery-ai summary on the pull request to
    (re-)generate the summary at any time.
  • Generate reviewer's guide: Comment @sourcery-ai guide on the pull
    request to (re-)generate the reviewer's guide at any time.
  • Resolve all Sourcery comments: Comment @sourcery-ai resolve on the
    pull request to resolve all Sourcery comments. Useful if you've already
    addressed all the comments and don't want to see them anymore.
  • Dismiss all Sourcery reviews: Comment @sourcery-ai dismiss on the pull
    request to dismiss all existing Sourcery reviews. Especially useful if you
    want to start fresh with a new review - don't forget to comment
    @sourcery-ai review to trigger a new review!

Customizing Your Experience

Access your dashboard to:

  • Enable or disable review features such as the Sourcery-generated pull request
    summary, the reviewer's guide, and others.
  • Change the review language.
  • Add, remove or edit custom review instructions.
  • Adjust other review settings.

Getting Help

Copy link

Warning

Review the following alerts detected in dependencies.

According to your organization's Security Policy, it is recommended to resolve "Warn" alerts. Learn more about Socket for GitHub.

Action Severity Alert (click for details)
Warn Critical
maven/com.h2database/h2@1.4.200 has a Critical CVE.

CVE: GHSA-h376-j262-vhq6 RCE in H2 Console (CRITICAL)

Affected versions: >= 1.1.100, < 2.0.206

Patched version: 2.0.206

From: ?maven/com.h2database/h2@1.4.200

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.h2database/h2@1.4.200. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
maven/com.h2database/h2@1.4.200 has a Critical CVE.

CVE: GHSA-45hx-wfhj-473x Arbitrary code execution in H2 Console (CRITICAL)

Affected versions: < 2.1.210

Patched version: 2.1.210

From: ?maven/com.h2database/h2@1.4.200

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.h2database/h2@1.4.200. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn Critical
maven/com.hazelcast/hazelcast@4.1.9 has a Critical CVE.

CVE: GHSA-c5hg-mr8r-f6jp Hazelcast connection caching (CRITICAL)

Affected versions: >= 4.1, <= 4.1.9

Patched version: 4.1.10

From: ?maven/com.hazelcast/hazelcast@4.1.9

ℹ Read more on: This package | This alert | What is a critical CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known critical CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore maven/com.hazelcast/hazelcast@4.1.9. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants