Skip to content

Conversation

@tyleragypt
Copy link
Owner

snyk-top-banner

Snyk has created this PR to fix 2 vulnerabilities in the dockerfile dependencies of this project.

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Snyk changed the following file(s):

  • VMs/Dockerfile

We recommend upgrading to ubuntu:24.10, as this image has only 10 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
medium severity CVE-2025-8058
SNYK-UBUNTU2404-GLIBC-11031045
  586  
medium severity CVE-2025-8058
SNYK-UBUNTU2404-GLIBC-11031045
  586  
medium severity Directory Traversal
SNYK-UBUNTU2404-PAM-11936905
  371  
medium severity Directory Traversal
SNYK-UBUNTU2404-PAM-11936905
  371  
medium severity Directory Traversal
SNYK-UBUNTU2404-PAM-11936905
  371  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Directory Traversal

@tyleragypt
Copy link
Owner Author

Logo
Checkmarx One – Scan Summary & Detailsd2b6f423-6a49-414f-94a6-2250eae8ed69

New Issues (56)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2022-41853 Maven-org.hsqldb:hsqldb-2.3.6
detailsRecommended version: 2.7.1
Description: Those using "java.sql.Statement" or "java.sql.PreparedStatement" in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a Re...
Attack Vector: NETWORK
Attack Complexity: LOW
Exploitable Path: executeBatch@...e/BenchmarkTest02647.java - ... - executeCompiledStatement@.../Session.java

ID: c9vsWh7QBfFytM%2F3ZG2WeooCIFW6NxIbYntcrP5cRFU%3D
Vulnerable Package
CRITICAL CVE-2024-52046 Maven-org.apache.mina:mina-core-2.0.0-RC1
detailsRecommended version: 2.0.27
Description: The "ObjectSerializationDecoder" in Apache MINA uses Java's native deserialization protocol to process incoming serialized data but lacks the neces...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: na4%2FueD7%2F3WeiMWFOEaCdE1nH%2BobzR24Ulfltznm5r0%3D
Vulnerable Package
HIGH CVE-2023-24998 Maven-commons-fileupload:commons-fileupload-1.3.3
detailsRecommended version: 1.6.0
Description: Apache Commons FileUpload prior to 1.5 does not limit the number of request parts to be processed, resulting in the possibility of an attacker trig...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: cmehL4M%2F31llZreRZf0YHq1cekaLST5EMwGsFusXqhA%3D
Vulnerable Package
HIGH CVE-2023-26464 Maven-log4j:log4j-1.2.17
detailsDescription: When using the Chainsaw or SocketAppender components with Log4j versions 1.0.4 prior to 2.0, an attacker that manages to cause a logging entry invo...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: ebzs4upyP7%2Fur8ILM7%2BxFSZBtg5T%2BSDqcn8L6iUFRGA%3D
Vulnerable Package
HIGH CVE-2024-22243 Maven-org.springframework:spring-web-4.3.30.RELEASE
detailsRecommended version: 5.3.31-wso2v1
Description: Applications that use "UriComponentsBuilder" to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 9ADuGoN1V1%2BfEU2%2BINVUN0wwYvwClclI421epW6Pc3o%3D
Vulnerable Package
HIGH CVE-2024-22259 Maven-org.springframework:spring-web-4.3.30.RELEASE
detailsRecommended version: 5.3.31-wso2v1
Description: Applications that use "UriComponentsBuilder" in Spring Framework to parse an externally provided URL (e.g. through a query parameter) AND perform v...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: NE4gkFBh1FxFCxiFuBYmLtc57T9b%2F0WkfJ2uM%2Bn22QY%3D
Vulnerable Package
HIGH CVE-2024-22262 Maven-org.springframework:spring-web-4.3.30.RELEASE
detailsRecommended version: 5.3.31-wso2v1
Description: Applications that use "UriComponentsBuilder" to parse an externally provided URL (e.g. through a query parameter) and perform validation checks on ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: Ljh8qFnD2NshBD1plyygkUw3Hdu247qbYtHd9EkIDSM%3D
Vulnerable Package
HIGH CVE-2024-38819 Maven-org.springframework:spring-webmvc-4.3.30.RELEASE
detailsRecommended version: 6.2.10
Description: Applications serving static resources through the functional web frameworks "WebMvc.fn" or "WebFlux.fn" are vulnerable to path traversal attacks. A...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: JvYmdorJR46E9BtREVErwE1BVZfNIbjSE5r4aDa2iuo%3D
Vulnerable Package
HIGH CVE-2024-47554 Maven-commons-io:commons-io-2.6
detailsRecommended version: 2.11.0.redhat-00004
Description: Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The "org.apache.commons.io.input.XmlStreamReader" class may excessively consu...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: uzs8VfJTfTqmjihGjrzwG3H25yTZ1PYlxxyhju%2BbplY%3D
Vulnerable Package
HIGH CVE-2025-48734 Maven-commons-beanutils:commons-beanutils-1.9.4
detailsRecommended version: 1.11.0
Description: An Improper Access Control vulnerability exists in Apache Commons. A special "BeanIntrospector" class was added in version 1.9.2. This can be used ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 8UL%2B6T4AcZbBYNZzgCnVpyRtdWsMg3939sr6LI2bDV8%3D
Vulnerable Package
HIGH CVE-2025-48976 Maven-commons-fileupload:commons-fileupload-1.3.3
detailsRecommended version: 1.6.0
Description: Allocation of resources for multipart headers with insufficient limits enabled a Denial of Service (DoS) vulnerability in Apache Commons FileUpload...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: vNT84l77wkuBaedrVlioAh1qCAGaoYXCqGubEK2lgr0%3D
Vulnerable Package
HIGH Missing User Instruction /Dockerfile: 2
detailsA user should be specified in the dockerfile, otherwise the image will run as root
ID: 3uNREHv%2BDDbvdgO3zXt2v%2B5TciA%3D
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7
detailsWhen installing a package, its pin version should be defined
ID: 11OvNQPW5FvbtwrPtjJQ%2BbOafEA%3D
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7
detailsWhen installing a package, its pin version should be defined
ID: QVUutnnOFcIgCoNlU%2FBBltWm8%2B8%3D
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7
detailsWhen installing a package, its pin version should be defined
ID: JkVP8rPetYlX6YxrOci4%2Bd75zF8%3D
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7
detailsWhen installing a package, its pin version should be defined
ID: mThcugFZggodZOG4nQrrx31RwFA%3D
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 6
detailsWhen installing a package, its pin version should be defined
ID: VMYo0bqYbjN4MCx4TTXPSJkhrhs%3D
MEDIUM Apt Get Install Pin Version Not Defined /Dockerfile: 7
detailsWhen installing a package, its pin version should be defined
ID: J63MAcrbI6wSRXJP1eW7aYZUunc%3D

More results are available on the CxOne platform

Fixed Issues (960) Great job! The following issues were fixed in this Pull Request
Severity Issue Source File / Package
HIGH Client_DOM_Stored_XSS /src/main/webapp/js/testsuiteutils.js: 107
HIGH Client_DOM_Stored_XSS /src/main/webapp/js/testsuiteutils.js: 83
HIGH Client_DOM_Stored_XSS /src/main/webapp/js/testsuiteutils.js: 82
HIGH Client_DOM_Stored_XSS /src/main/webapp/js/testsuiteutils.js: 141
HIGH Client_DOM_Stored_XSS /src/main/webapp/js/testsuiteutils.js: 140
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01182.java: 44
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02058.java: 44
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02610.java: 43
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00558.java: 45
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02335.java: 45
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01600.java: 43
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01937.java: 45
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00494.java: 43
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00307.java: 44
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01865.java: 59
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01289.java: 43
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00741.java: 43
HIGH Command_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00093.java: 59
HIGH Command_Injection /src/main/java/org/owasp/benchmark/helpers/SeparateClassRequest.java: 31
HIGH LDAP_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02104.java: 43
HIGH LDAP_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02114.java: 43
HIGH LDAP_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00959.java: 53
HIGH LDAP_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest02572.java: 43
HIGH LDAP_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01831.java: 53
HIGH LDAP_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest01832.java: 53
HIGH LDAP_Injection /src/main/java/org/owasp/benchmark/testcode/BenchmarkTest00947.java: 53

More results are available on the CxOne platform

Policy Management Violations (2)
Policy Name: Global Policy The following violations of your team's AppSec policy rules were identified in this project. Since 'Break Build' is enabled for these rules, you must resolve these issues before the Pull Request can be merged. This is the default policy that applies to all projects in your account.
  • Rule Name: DemoRule
    Scanner: SCA

  • Rule Name: AGPL
    Scanner: SCA

Policy Name: No highs or mediums

More results are available on the CxOne platform


Use @Checkmarx to reach out to us for assistance.

Just send a PR comment with @Checkmarx followed by a natural language request.

Examples: @Checkmarx how are you able to help me? @Checkmarx rescan this PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants