Skip to content

Conversation

@tyleragypt
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • VMs/Dockerfile

We recommend upgrading to ubuntu:kinetic, as this image has only 11 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 364 Memory Leak
SNYK-UBUNTU2204-LIBCAP2-5538282
No Known Exploit
medium severity 514 CVE-2023-2603
SNYK-UBUNTU2204-LIBCAP2-5538296
No Known Exploit
medium severity 300 Out-of-bounds Write
SNYK-UBUNTU2204-NCURSES-5423142
No Known Exploit
medium severity 300 Out-of-bounds Write
SNYK-UBUNTU2204-NCURSES-5423142
No Known Exploit
medium severity 371 Allocation of Resources Without Limits or Throttling
SNYK-UBUNTU2204-OPENSSL-5661537
No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Allocation of Resources Without Limits or Throttling
🦉 Memory Leak

@tyleragypt
Copy link
Owner Author

Logo
Checkmarx One – Scan Summary & Details98599533-b56a-48b4-9426-ad7de87b471d

New Issues

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2016-10707 Npm-jquery-2.1.4 Vulnerable Package
HIGH CVE-2022-41853 Maven-org.hsqldb:hsqldb-2.3.6 Vulnerable Package
HIGH CVE-2023-20863 Maven-org.springframework:spring-expression-4.3.30.RELEASE Vulnerable Package
HIGH CVE-2023-24998 Maven-commons-fileupload:commons-fileupload-1.3.3 Vulnerable Package
HIGH Missing User Instruction /Dockerfile: 2 A user should be specified in the dockerfile, otherwise the image will run as root
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7 When installing a package, its pin version should be defined
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7 When installing a package, its pin version should be defined
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 6 When installing a package, its pin version should be defined
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7 When installing a package, its pin version should be defined
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7 When installing a package, its pin version should be defined
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7 When installing a package, its pin version should be defined
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7 When installing a package, its pin version should be defined
MEDIUM CVE-2007-2379 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2014-6071 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2015-9251 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2019-11358 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2020-11022 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2020-11023 Npm-jquery-2.1.4 Vulnerable Package
MEDIUM CVE-2023-20861 Maven-org.springframework:spring-expression-4.3.30.RELEASE Vulnerable Package
MEDIUM Cxf0b588a3-5c6f Npm-jquery-2.1.4 Vulnerable Package
MEDIUM Update Instruction Alone /Dockerfile: 5 Instruction 'RUN update' should always be followed by ' install' in the same RUN statement
LOW Healthcheck Instruction Missing /Dockerfile: 2 Ensure that HEALTHCHECK is being used. The HEALTHCHECK instruction tells Docker how to test a container to check that it is still working
LOW MAINTAINER Instruction Being Used /Dockerfile: 3 The MAINTAINER instruction sets the Author field of the generated images. The LABEL instruction is a much more flexible version of this and you sho...
LOW Multiple RUN, ADD, COPY, Instructions Listed /Dockerfile: 5 Multiple commands (RUN, COPY, ADD) should be grouped in order to reduce the number of layers.
LOW Unprotected_Cookie /src/main/webapp/js/testsuiteutils.js: 52 Attack Vector

Fixed Issues

Severity Issue Source File / Package Checkmarx Insight
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01444.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01191.java: 44 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01445.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02612.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01363.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01067.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02512.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00980.java: 59 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01066.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00570.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00309.java: 44 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01190.java: 44 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01192.java: 44 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02070.java: 44 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00823.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00827.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00495.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01608.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02515.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02516.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02517.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02155.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00982.java: 59 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01442.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02341.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02344.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00825.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01691.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01690.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02613.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01361.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02514.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01288.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00496.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00498.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01287.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00175.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00172.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00173.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00174.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00311.java: 44 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00306.java: 44 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00740.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02513.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02511.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02518.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00412.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00983.java: 59 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00574.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00573.java: 45 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00497.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00410.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00743.java: 43 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00092.java: 59 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00091.java: 59 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00007.java: 46 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/helpers/SeparateClassRequest.java: 31 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/helpers/SeparateClassRequest.java: 31 Attack Vector
HIGH Command_Injection /src/main/java/org/owasp/benchmark/helpers/SeparateClassRequest.java: 31 Attack Vector
HIGH Missing User Instruction /Dockerfile: 2 A user should be specified in the dockerfile, otherwise the image will run as root
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01005.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01883.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00111.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00997.java: 54 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00112.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01008.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01877.java: 54 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01000.java: 54 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01889.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01887.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01890.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01009.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00115.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01880.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01880.java: 53 Attack Vector
HIGH SQL_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01891.java: 53 Attack Vector
HIGH SQL_Injection

More results are available on AST platform

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants