Skip to content

📦 Bump versions of multiple dependencies to address vulnerabilities#4

Open
softforgeinc wants to merge 14 commits intomainfrom
devtask/LINEAJE-TASK-859
Open

📦 Bump versions of multiple dependencies to address vulnerabilities#4
softforgeinc wants to merge 14 commits intomainfrom
devtask/LINEAJE-TASK-859

Conversation

@softforgeinc
Copy link

Lineaje has automatically created this pull request to resolve the following CVEs:

Component CVE ID Severity Description
xalan:xalan:2.7.2 CVE-2022-34169 High The Apache Xalan Java XSLT library is vulnerable to an
integer truncation issue when processing malicious XSLT
stylesheets. This can be used to corrupt Java class files
generated by the internal XSLTC compiler and execute
arbitrary Java bytecode. A fix for this issue was published
in September 2022 as part of an anticipated 2.7.3 release.
com.fasterxml.jackson.core:jackson-databind:2.12.3 CVE-2022-42004 High Uncontrolled Resource Consumption in FasterXML
jackson-databind
com.fasterxml.jackson.core:jackson-databind:2.12.3 CVE-2022-42003 High Uncontrolled Resource Consumption in Jackson-databind
com.fasterxml.jackson.core:jackson-databind:2.12.3 CVE-2021-46877 High jackson-databind possible Denial of Service if using JDK
serialization to serialize JsonNode
com.fasterxml.jackson.core:jackson-databind:2.12.3 CVE-2020-36518 High Deeply nested json in jackson-databind
org.apache.xmlgraphics:batik-svgbrowser:1.13 CVE-2020-11987 High Apache Batik 1.13 is vulnerable to server-side request
forgery, caused by improper input validation by the
NodePickerPanel. By using a specially-crafted argument, an
attacker could exploit this vulnerability to cause the
underlying server to make arbitrary GET requests.
org.apache.commons:commons-text:1.9 CVE-2022-42889 Critical Apache Commons Text performs variable interpolation, allowing
properties to be dynamically evaluated and expanded. The
standard format for interpolation is "${prefix:name}", where
"prefix" is used to locate an instance of
org.apache.commons.text.lookup.StringLookup that performs the
interpolation. Starting with version 1.5 and continuing
through 1.9, the set of default Lookup instances included
interpolators that could result in arbitrary code execution
or contact with remote servers. These lookups are: - "script"
- execute expressions using the JVM script execution engine
(javax.script) - "dns" - resolve dns records - "url" - load
values from urls, including from remote servers Applications
using the interpolation defaults in the affected versions may
be vulnerable to remote code execution or unintentional
contact with remote servers if untrusted configuration values
are used. Users are recommended to upgrade to Apache Commons
Text 1.10.0, which disables the problematic interpolators by
default.
org.apache.commons:commons-configuration2:2.7 CVE-2024-29133 Medium Apache Commons Configuration: StackOverflowError calling
ListDelimiterHandler.flatten(Object, int) with a cyclical
object tree
org.apache.commons:commons-configuration2:2.7 CVE-2024-29131 High Apache Commons Configuration: StackOverflowError adding
property in AbstractListDelimiterHandler.flattenIterator()
org.apache.commons:commons-configuration2:2.7 CVE-2022-33980 Critical Code injection in Apache Commons Configuration
org.apache.xmlgraphics:xmlgraphics-commons:2.4 CVE-2020-11988 High Apache XmlGraphics Commons 2.4 is vulnerable to server-side
request forgery, caused by improper input validation by the
XMPParser. By using a specially-crafted argument, an attacker
could exploit this vulnerability to cause the underlying
server to make arbitrary GET requests.
org.apache.logging.log4j:log4j-core:2.14.1 CVE-2021-45046 Critical # Impact The fix to address
CVE-2021-44228
in Apache Log4j 2.15.0 was incomplete in certain non-default
configurations. This could allow attackers with control over
Thread Context Map (MDC) input data when the logging
configuration uses a non-default Pattern Layout with either a
Context Lookup (for example, $${ctx:loginId}) or a Thread
Context Map pattern (%X, %mdc, or %MDC) to craft malicious
input data using a JNDI Lookup pattern resulting in a remote
code execution (RCE) attack. ## Affected packages Only the
org.apache.logging.log4j:log4j-core package is directly
affected by this vulnerability. The
org.apache.logging.log4j:log4j-api should be kept at the
same version as the org.apache.logging.log4j:log4j-core
package to ensure compatability if in use. # Mitigation Log4j
2.16.0 fixes this issue by removing support for message
lookup patterns and disabling JNDI functionality by default.
This issue can be mitigated in prior releases (< 2.16.0) by
removing the JndiLookup class from the classpath (example:
zip -q -d log4j-core-*.jar
org/apache/logging/log4j/core/lookup/JndiLookup.class). Log4j
2.15.0 restricts JNDI LDAP lookups to localhost by default.
Note that previous mitigations involving configuration such
as to set the system property log4j2.formatMsgNoLookups to
true do NOT mitigate this specific vulnerability.
org.apache.logging.log4j:log4j-core:2.14.1 CVE-2021-44228 Critical # Summary Log4j versions prior to 2.16.0 are subject to a
remote code execution vulnerability via the ldap JNDI parser.
As per Apache's Log4j security
guide
:
Apache Log4j2 <=2.14.1 JNDI features used in configuration,
log messages, and parameters do not protect against attacker
controlled LDAP and other JNDI related endpoints. An attacker
who can control log messages or log message parameters can
execute arbitrary code loaded from LDAP servers when message
lookup substitution is enabled. From log4j 2.16.0, this
behavior has been disabled by default. Log4j version 2.15.0
contained an earlier fix for the vulnerability, but that
patch did not disable attacker-controlled JNDI lookups in all
situations. For more information, see the Updated advice for<br>version 2.16.0 section of this advisory. # Impact Logging
untrusted or user controlled data with a vulnerable version
of Log4J may result in Remote Code Execution (RCE) against
your application. This includes untrusted data included in
logged errors such as exception traces, authentication
failures, and other unexpected vectors of user controlled
input. # Affected versions Any Log4J version prior to v2.15.0
is affected to this specific issue. The v1 branch of Log4J
which is considered End Of Life (EOL) is vulnerable to other
RCE vectors so the recommendation is to still update to
2.16.0 where possible. ## Security releases Additional
backports of this fix have been made available in versions
2.3.1, 2.12.2, and 2.12.3 ## Affected packages Only the
org.apache.logging.log4j:log4j-core package is directly
affected by this vulnerability. The
org.apache.logging.log4j:log4j-api should be kept at the
same version as the org.apache.logging.log4j:log4j-core
package to ensure compatability if in use. # Remediation
Advice ## Updated advice for version 2.16.0 The Apache
Logging Services team provided updated mitigation advice upon
the release of version 2.16.0, which disables JNDI by
default and completely removes support for message
lookups
.
Even in version 2.15.0, lookups used in layouts to provide
specific pieces of context information will still recursively
resolve, possibly triggering JNDI lookups. This problem is
being tracked as
CVE-2021-45046.
More information is available on the GitHub Security
Advisory for
CVE-2021-45046
.
Users who want to avoid attacker-controlled JNDI lookups but
cannot upgrade to 2.16.0 must ensure that no such lookups
resolve to attacker-provided data and ensure that the the
JndiLookup class is not
loaded
.
Please note that Log4J v1 is End Of Life (EOL) and will not
receive patches for this issue. Log4J v1 is also vulnerable
to other RCE vectors and we recommend you migrate to Log4J
2.16.0 where possible.
org.apache.xmlgraphics:batik-transcoder:1.13 CVE-2022-44729 High Server-Side Request Forgery (SSRF) vulnerability in Apache
Software Foundation Apache XML Graphics Batik.This issue
affects Apache XML Graphics Batik: 1.16. On version 1.16, a
malicious SVG could trigger loading external resources by
default, causing resource consumption or in some cases even
information disclosure. Users are recommended to upgrade to
version 1.17 or later.
org.apache.commons:commons-vfs2:2.8.0 CVE-2025-27553 High Apache Commons VFS Has Relative Path Traversal Vulnerability
org.apache.commons:commons-vfs2:2.8.0 CVE-2025-30474 Medium Apache Commons VFS Exposure of Sensitive Information to an
Unauthorized Actor
org.apache.poi:poi-ooxml:5.0.0 CVE-2025-31672 Medium Apache POI OOXML Vulnerable to Improper Input Validation in
OOXML File Parsing
org.apache.xmlgraphics:batik-svgrasterizer:1.13 CVE-2022-44729 High Server-Side Request Forgery (SSRF) vulnerability in Apache
Software Foundation Apache XML Graphics Batik.This issue
affects Apache XML Graphics Batik: 1.16. On version 1.16, a
malicious SVG could trigger loading external resources by
default, causing resource consumption or in some cases even
information disclosure. Users are recommended to upgrade to
version 1.17 or later.
org.apache.santuario:xmlsec:2.2.1 CVE-2021-40690 High All versions of Apache Santuario - XML Security for Java
prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the
"secureValidation" property is not passed correctly when
creating a KeyInfo from a KeyInfoReference element. This
allows an attacker to abuse an XPath Transform to extract any
local .xml files in a RetrievalMethod element.
org.apache.santuario:xmlsec:2.2.1 CVE-2023-44483 Medium All versions of Apache Santuario - XML Security for Java
prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API,
are vulnerable to an issue where a private key may be
disclosed in log files when generating an XML Signature and
logging with debug level is enabled. Users are recommended to
upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this
issue.
org.apache.xmlgraphics:batik-bridge:1.13 CVE-2022-44729 High Server-Side Request Forgery (SSRF) vulnerability in Apache
Software Foundation Apache XML Graphics Batik.This issue
affects Apache XML Graphics Batik: 1.16. On version 1.16, a
malicious SVG could trigger loading external resources by
default, causing resource consumption or in some cases even
information disclosure. Users are recommended to upgrade to
version 1.17 or later.
org.apache.commons:commons-compress:1.21 CVE-2024-25710 High Apache Commons Compress: Denial of service caused by an
infinite loop for a corrupted DUMP file
org.apache.commons:commons-compress:1.21 CVE-2024-26308 Medium Apache Commons Compress: OutOfMemoryError unpacking broken
Pack200 file

You can merge this PR once the tests pass and the changes are reviewed.

Thank you for reviewing the update! 🚀

lineaje-autofix[bot] added 14 commits September 12, 2025 23:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant

Comments