Skip to content

[Snyk] Upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33 #1

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

kohei-frontend
Copy link
Owner

snyk-top-banner

Snyk has created this PR to upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 47 versions ahead of your current version.

  • The recommended version was released a year ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30776
525 No Known Exploit
critical severity Directory Traversal
SNYK-JAVA-ORGAPACHESTRUTS-30778
525 No Known Exploit
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802
525 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-608098
525 Proof of Concept
high severity Unrestricted Upload of File with Dangerous Type
SNYK-JAVA-ORGAPACHESTRUTS-609765
525 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-COMMONSFILEUPLOAD-30082
525 No Known Exploit
high severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-2635340
525 Proof of Concept
high severity Manipulation of Struts' internals
SNYK-JAVA-ORGAPACHESTRUTS-30060
525 No Known Exploit
high severity Command Injection
SNYK-JAVA-ORGAPACHESTRUTS-30770
525 Mature
high severity Cross-site Request Forgery (CSRF)
SNYK-JAVA-ORGAPACHESTRUTS-30774
525 No Known Exploit
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30775
525 No Known Exploit
high severity Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-31495
525 Mature
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31500
525 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31501
525 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31502
525 No Known Exploit
high severity Remote Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-32477
525 Mature
high severity Insecure Defaults
SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418
525 No Known Exploit
high severity Server-side Template Injection (SSTI)
SNYK-JAVA-ORGFREEMARKER-1076795
525 Proof of Concept
high severity Parameter Alteration
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798
525 No Known Exploit
high severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799
525 No Known Exploit
medium severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801
525 No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-OGNL-30474
525 No Known Exploit
medium severity Allocation of Resources Without Limits or Throttling
SNYK-JAVA-ORGAPACHESTRUTS-5707101
525 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-608097
525 Mature
critical severity Arbitrary Code Execution
SNYK-JAVA-COMMONSFILEUPLOAD-30401
525 No Known Exploit
medium severity Information Exposure
SNYK-JAVA-COMMONSFILEUPLOAD-31540
525 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-1049003
525 Mature
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30207
525 Mature
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30771
525 No Known Exploit
critical severity Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-30772
525 Mature
high severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803
525 No Known Exploit
high severity Command Injection
SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611
525 Mature
high severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-5811864
525 No Known Exploit
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTS-30773
525 No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-31503
525 Mature
critical severity Improper Action Name Cleanup
SNYK-JAVA-ORGAPACHESTRUTS-451610
525 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804
525 No Known Exploit
medium severity Denial of Service
SNYK-JAVA-ORGAPACHESTRUTS-6100744
525 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-6102825
525 Mature
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800
525 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTS-460223
525 No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

Snyk has created this PR to upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33.

See this package in maven:
org.apache.struts:struts2-core

See this project in Snyk:
https://app.snyk.io/org/koheishudo/project/2f5ef799-b3f3-458d-b805-7547c8b42e48?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants