-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Migrate atlas-web-core to the new skeleton-project for bulk #241
Comments
New repo has ben created: https://github.com/ebi-gene-expression-group/atlas-web-core2 |
Need to check the correct use of @Inject and @Autowired annotations. |
The same as the above with @nAmed ---> @component |
It looks like that we should have update to 9.x branch, but we just updated and replace 7.x last year. I am going to postpone this change for later. Here is the full report: Dependency maven:org.apache.solr:solr-core:8.7.0 is vulnerable Upgrade to 9.7.0 CVE-2021-27905, Score: 9.8 The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2. Read More: https://www.mend.io/vulnerability-database/CVE-2021-27905?utm_source=JetBrains CVE-2021-44548, Score: 9.8 An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows. Read More: https://www.mend.io/vulnerability-database/CVE-2021-44548?utm_source=JetBrains CVE-2024-45216, Score: 9.8 Solr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass. Read More: https://www.mend.io/vulnerability-database/CVE-2024-45216?utm_source=JetBrains CVE-2021-29943, Score: 9.1 When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts. Read More: https://www.mend.io/vulnerability-database/CVE-2021-29943?utm_source=JetBrains CVE-2023-50386, Score: 8.8 Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. In the affected versions, Solr ConfigSets accepted Java jar and class files to be uploaded through the ConfigSets API. When Solr is run in a secure way (Authorization enabled), as is strongly suggested, this vulnerability is limited to extending the Backup permissions with the ability to add libraries.
Read More: https://www.mend.io/vulnerability-database/CVE-2023-50386?utm_source=JetBrains CVE-2021-29262, Score: 7.5 When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs. Read More: https://www.mend.io/vulnerability-database/CVE-2021-29262?utm_source=JetBrains CVE-2023-50291, Score: 7.5 Insufficiently Protected Credentials vulnerability in Apache Solr. This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.3.0. This /admin/info/properties endpoint is protected under the "config-read" permission. Users who cannot upgrade can also use the following Java system property to fix the issue: Read More: https://www.mend.io/vulnerability-database/CVE-2023-50291?utm_source=JetBrains CVE-2023-50298, Score: 7.5 Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. Solr Streaming Expressions allows users to extract data from other Solr Clouds, using a "zkHost" parameter. Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue. Read More: https://www.mend.io/vulnerability-database/CVE-2023-50298?utm_source=JetBrains CVE-2024-45217, Score: 5.3 Insecure Default Initialization of Resource vulnerability in Apache Solr. New ConfigSets that are created via a Restore command, which copy a configSet from the backup and give it a new name, Read More: https://www.mend.io/vulnerability-database/CVE-2024-45217?utm_source=JetBrains Results powered by Mend.io |
If we are only using the |
|
|
|
I am going to continue with the next task: Add atlas-web-bulk for the skeleton project for bulk as it is needed to be done or at least done in a way to be able to execute the tests in the |
In this task I have to migrate our existing common library for Bulk and Single Cell Atlas to our new SpringBoot based project and fix all the broken code that might happen because of Java and Spring Framework version changes.
Steps:
HtmlExceptionHandlingController
looks like is not used and its env variable is@Autowired
but it looks like that is not a proper beanorg.jetbrains:annotations
library as a dependency if we are only using the @NotNull annotationAt the end of this task we should be able to execute successfully all the tests based on this library.
The text was updated successfully, but these errors were encountered: