📦 Bump versions of multiple dependencies to address vulnerabilities#4
Open
softforgeinc wants to merge 14 commits intomainfrom
Open
📦 Bump versions of multiple dependencies to address vulnerabilities#4softforgeinc wants to merge 14 commits intomainfrom
softforgeinc wants to merge 14 commits intomainfrom
Conversation
added 14 commits
September 12, 2025 23:23
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Lineaje has automatically created this pull request to resolve the following CVEs:
integer truncation issue when processing malicious XSLT
stylesheets. This can be used to corrupt Java class files
generated by the internal XSLTC compiler and execute
arbitrary Java bytecode. A fix for this issue was published
in September 2022 as part of an anticipated 2.7.3 release.
jackson-databind
serialization to serialize JsonNode
forgery, caused by improper input validation by the
NodePickerPanel. By using a specially-crafted argument, an
attacker could exploit this vulnerability to cause the
underlying server to make arbitrary GET requests.
properties to be dynamically evaluated and expanded. The
standard format for interpolation is "${prefix:name}", where
"prefix" is used to locate an instance of
org.apache.commons.text.lookup.StringLookup that performs the
interpolation. Starting with version 1.5 and continuing
through 1.9, the set of default Lookup instances included
interpolators that could result in arbitrary code execution
or contact with remote servers. These lookups are: - "script"
- execute expressions using the JVM script execution engine
(javax.script) - "dns" - resolve dns records - "url" - load
values from urls, including from remote servers Applications
using the interpolation defaults in the affected versions may
be vulnerable to remote code execution or unintentional
contact with remote servers if untrusted configuration values
are used. Users are recommended to upgrade to Apache Commons
Text 1.10.0, which disables the problematic interpolators by
default.
ListDelimiterHandler.flatten(Object, int) with a cyclical
object tree
property in AbstractListDelimiterHandler.flattenIterator()
request forgery, caused by improper input validation by the
XMPParser. By using a specially-crafted argument, an attacker
could exploit this vulnerability to cause the underlying
server to make arbitrary GET requests.
CVE-2021-44228
in Apache Log4j 2.15.0 was incomplete in certain non-default
configurations. This could allow attackers with control over
Thread Context Map (MDC) input data when the logging
configuration uses a non-default Pattern Layout with either a
Context Lookup (for example, $${ctx:loginId}) or a Thread
Context Map pattern (%X, %mdc, or %MDC) to craft malicious
input data using a JNDI Lookup pattern resulting in a remote
code execution (RCE) attack. ## Affected packages Only the
org.apache.logging.log4j:log4j-corepackage is directlyaffected by this vulnerability. The
org.apache.logging.log4j:log4j-apishould be kept at thesame version as the
org.apache.logging.log4j:log4j-corepackage to ensure compatability if in use. # Mitigation Log4j
2.16.0 fixes this issue by removing support for message
lookup patterns and disabling JNDI functionality by default.
This issue can be mitigated in prior releases (< 2.16.0) by
removing the JndiLookup class from the classpath (example:
zip -q -d log4j-core-*.jar
org/apache/logging/log4j/core/lookup/JndiLookup.class). Log4j
2.15.0 restricts JNDI LDAP lookups to localhost by default.
Note that previous mitigations involving configuration such
as to set the system property
log4j2.formatMsgNoLookupstotruedo NOT mitigate this specific vulnerability.remote code execution vulnerability via the ldap JNDI parser.
As per Apache's Log4j security
guide:
Apache Log4j2 <=2.14.1 JNDI features used in configuration,
log messages, and parameters do not protect against attacker
controlled LDAP and other JNDI related endpoints. An attacker
who can control log messages or log message parameters can
execute arbitrary code loaded from LDAP servers when message
lookup substitution is enabled. From log4j 2.16.0, this
behavior has been disabled by default. Log4j version 2.15.0
contained an earlier fix for the vulnerability, but that
patch did not disable attacker-controlled JNDI lookups in all
situations. For more information, see the
Updated advice for<br>version 2.16.0section of this advisory. # Impact Logginguntrusted or user controlled data with a vulnerable version
of Log4J may result in Remote Code Execution (RCE) against
your application. This includes untrusted data included in
logged errors such as exception traces, authentication
failures, and other unexpected vectors of user controlled
input. # Affected versions Any Log4J version prior to v2.15.0
is affected to this specific issue. The v1 branch of Log4J
which is considered End Of Life (EOL) is vulnerable to other
RCE vectors so the recommendation is to still update to
2.16.0 where possible. ## Security releases Additional
backports of this fix have been made available in versions
2.3.1, 2.12.2, and 2.12.3 ## Affected packages Only the
org.apache.logging.log4j:log4j-corepackage is directlyaffected by this vulnerability. The
org.apache.logging.log4j:log4j-apishould be kept at thesame version as the
org.apache.logging.log4j:log4j-corepackage to ensure compatability if in use. # Remediation
Advice ## Updated advice for version 2.16.0 The Apache
Logging Services team provided updated mitigation advice upon
the release of version 2.16.0, which disables JNDI by
default and completely removes support for message
lookups.
Even in version 2.15.0, lookups used in layouts to provide
specific pieces of context information will still recursively
resolve, possibly triggering JNDI lookups. This problem is
being tracked as
CVE-2021-45046.
More information is available on the GitHub Security
Advisory for
CVE-2021-45046.
Users who want to avoid attacker-controlled JNDI lookups but
cannot upgrade to 2.16.0 must ensure that no such lookups
resolve to attacker-provided data and ensure that the the
JndiLookup class is not
loaded.
Please note that Log4J v1 is End Of Life (EOL) and will not
receive patches for this issue. Log4J v1 is also vulnerable
to other RCE vectors and we recommend you migrate to Log4J
2.16.0 where possible.
Software Foundation Apache XML Graphics Batik.This issue
affects Apache XML Graphics Batik: 1.16. On version 1.16, a
malicious SVG could trigger loading external resources by
default, causing resource consumption or in some cases even
information disclosure. Users are recommended to upgrade to
version 1.17 or later.
Unauthorized Actor
OOXML File Parsing
Software Foundation Apache XML Graphics Batik.This issue
affects Apache XML Graphics Batik: 1.16. On version 1.16, a
malicious SVG could trigger loading external resources by
default, causing resource consumption or in some cases even
information disclosure. Users are recommended to upgrade to
version 1.17 or later.
prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the
"secureValidation" property is not passed correctly when
creating a KeyInfo from a KeyInfoReference element. This
allows an attacker to abuse an XPath Transform to extract any
local .xml files in a RetrievalMethod element.
prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API,
are vulnerable to an issue where a private key may be
disclosed in log files when generating an XML Signature and
logging with debug level is enabled. Users are recommended to
upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this
issue.
Software Foundation Apache XML Graphics Batik.This issue
affects Apache XML Graphics Batik: 1.16. On version 1.16, a
malicious SVG could trigger loading external resources by
default, causing resource consumption or in some cases even
information disclosure. Users are recommended to upgrade to
version 1.17 or later.
infinite loop for a corrupted DUMP file
Pack200 file
You can merge this PR once the tests pass and the changes are reviewed.
Thank you for reviewing the update! 🚀