Skip to content

[Snyk] Upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33#180

Open
Daniel-Snyk wants to merge 2 commits into
mainfrom
snyk-upgrade-a517e634011221a14a4a57be4e893ce3
Open

[Snyk] Upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33#180
Daniel-Snyk wants to merge 2 commits into
mainfrom
snyk-upgrade-a517e634011221a14a4a57be4e893ce3

Conversation

@Daniel-Snyk
Copy link
Copy Markdown
Owner

snyk-top-banner

Snyk has created this PR to upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 47 versions ahead of your current version.

  • The recommended version was released 2 years ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-1049003
691 Mature
high severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-2635340
691 Proof of Concept
high severity Manipulation of Struts' internals
SNYK-JAVA-ORGAPACHESTRUTS-30060
691 No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30207
691 Mature
high severity Command Injection
SNYK-JAVA-ORGAPACHESTRUTS-30770
691 Mature
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30771
691 No Known Exploit
critical severity Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-30772
691 Mature
high severity Cross-site Request Forgery (CSRF)
SNYK-JAVA-ORGAPACHESTRUTS-30774
691 No Known Exploit
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30775
691 No Known Exploit
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30776
691 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31500
691 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31501
691 No Known Exploit
high severity Unrestricted Upload of File with Dangerous Type
SNYK-JAVA-ORGAPACHESTRUTS-609765
691 Proof of Concept
high severity Parameter Alteration
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798
691 No Known Exploit
high severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799
691 No Known Exploit
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802
691 No Known Exploit
high severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803
691 No Known Exploit
high severity Command Injection
SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611
691 Mature
high severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-5811864
691 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-COMMONSFILEUPLOAD-30082
691 No Known Exploit
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTS-30773
691 No Known Exploit
critical severity Directory Traversal
SNYK-JAVA-ORGAPACHESTRUTS-30778
691 No Known Exploit
high severity Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-31495
691 Mature
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31502
691 No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-31503
691 Mature
high severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-32477
691 Mature
critical severity Improper Action Name Cleanup
SNYK-JAVA-ORGAPACHESTRUTS-451610
691 No Known Exploit
high severity Allocation of Resources Without Limits or Throttling
SNYK-JAVA-ORGAPACHESTRUTS-5707102
691 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-608098
691 Proof of Concept
high severity Server-side Template Injection (SSTI)
SNYK-JAVA-ORGFREEMARKER-1076795
691 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTS-460223
691 No Known Exploit
medium severity Allocation of Resources Without Limits or Throttling
SNYK-JAVA-ORGAPACHESTRUTS-5707101
691 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-608097
691 Mature
medium severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-6100744
691 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-6102825
691 Mature
high severity Insecure Defaults
SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418
691 No Known Exploit
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800
691 No Known Exploit
medium severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801
691 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804
691 No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-COMMONSFILEUPLOAD-30401
691 No Known Exploit
medium severity Information Exposure
SNYK-JAVA-COMMONSFILEUPLOAD-31540
691 No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-OGNL-30474
691 No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

Snyk has created this PR to upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33.

See this package in maven:
org.apache.struts:struts2-core

See this project in Snyk:
https://app.snyk.io/org/daniel.venkitachalam/project/224553ff-3873-4817-959f-4803c04405be?utm_source=github&utm_medium=referral&page=upgrade-pr
….5.33

Snyk has created this PR to upgrade org.apache.struts:struts2-spring-plugin from 2.3.20 to 2.5.33.

See this package in maven:
org.apache.struts:struts2-spring-plugin

See this project in Snyk:
https://app.snyk.io/org/daniel.venkitachalam/project/224553ff-3873-4817-959f-4803c04405be?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants