com.epam.reportportal:service-api@4.1.1 vulnerabilities
-
latest version
5.11.0
-
latest non vulnerable version
-
first published
3 years ago
-
latest version published
2 months ago
-
licenses detected
- [2.6.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the com.epam.reportportal:service-api package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
com.epam.reportportal:service-api is a Report portal. Main API Service Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when the Note:
This is only exploitable if the How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,5.11.0)
|
com.epam.reportportal:service-api is a Report portal. Main API Service Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. Starting from version 3.1.0 of the How to fix XML External Entity (XXE) Injection? Upgrade |
[5.0.0,5.1.1)
[3.1.0,4.3.12)
|
com.epam.reportportal:service-api is a Report portal. Main API Service Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. Starting from version 3.1.0 of the service-api XML parsing was introduced. Unfortunately the XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. How to fix XML External Entity (XXE) Injection? Upgrade |
[3.1.0,5.4.0)
|