Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[Snyk] Security upgrade org.springframework.boot:spring-boot-starter-…
…security from 3.0.5 to 3.0.9 (#679) <p>This PR was automatically created by Snyk using the credentials of a real user.</p><br /><h3>Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.</h3> #### Changes included in this PR - Changes to the following files to upgrade the vulnerable dependencies to a fixed version: - backend/pom.xml #### Vulnerabilities that will be fixed ##### With an upgrade: Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity | Reachability :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png "high severity") | **575/1000** <br/> **Why?** Recently disclosed, Has a fix available, CVSS 7.5 | Improper Authorization <br/>[SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777882](https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777882) | `org.springframework.boot:spring-boot-starter-security:` <br> `3.0.5 -> 3.0.9` <br> | No | No Known Exploit | No Path Found ![critical severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png "critical severity") | **730/1000** <br/> **Why?** Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 9.1 | Access Control Bypass <br/>[SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893](https://snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893) | `org.springframework.boot:spring-boot-starter-security:` <br> `3.0.5 -> 3.0.9` <br> | No | Proof of Concept | No Path Found (*) Note that the real score may have changed since the PR was raised. Check the changes in this PR to ensure they won't cause issues with your project. ------------ **Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.* For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiJkZDRkZGM3ZS1mZTExLTQ5OGQtOTE5OC05ZGIwYWMxNzJiNzIiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6ImRkNGRkYzdlLWZlMTEtNDk4ZC05MTk4LTlkYjBhYzE3MmI3MiJ9fQ==" width="0" height="0"/> 🧐 [View latest project report](https://app.snyk.io/org/mtes-mct/project/fd91601b-7a21-4a8c-8183-f398b019dc86?utm_source=github&utm_medium=referral&page=fix-pr) 🛠 [Adjust project settings](https://app.snyk.io/org/mtes-mct/project/fd91601b-7a21-4a8c-8183-f398b019dc86?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read more about Snyk's upgrade and patch logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) [//]: # (snyk:metadata:{"prId":"dd4ddc7e-fe11-498d-9198-9db0ac172b72","prPublicId":"dd4ddc7e-fe11-498d-9198-9db0ac172b72","dependencies":[{"name":"org.springframework.boot:spring-boot-starter-security","from":"3.0.5","to":"3.0.9"}],"packageManager":"maven","projectPublicId":"fd91601b-7a21-4a8c-8183-f398b019dc86","projectUrl":"https://app.snyk.io/org/mtes-mct/project/fd91601b-7a21-4a8c-8183-f398b019dc86?utm_source=github&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777882","SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893"],"upgrade":["SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777882","SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893"],"isBreakingChange":false,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[575,730],"remediationStrategy":"vuln"}) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Access Control Bypass](https://learn.snyk.io/lesson/broken-access-control/?loc=fix-pr)
- Loading branch information