com.epam.reportportal:service-api@5.2.1 vulnerabilities
-
latest version
5.11.0
-
latest non vulnerable version
-
first published
3 years ago
-
latest version published
2 months ago
-
licenses detected
- [2.6.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the com.epam.reportportal:service-api package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
com.epam.reportportal:service-api is a Report portal. Main API Service Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when the Note:
This is only exploitable if the How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,5.11.0)
|
com.epam.reportportal:service-api is a Report portal. Main API Service Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. Starting from version 3.1.0 of the service-api XML parsing was introduced. Unfortunately the XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. How to fix XML External Entity (XXE) Injection? Upgrade |
[3.1.0,5.4.0)
|