chore(deps): update dependency com.github.tomakehurst:wiremock-jre8 to v2.35.1 [security]#42
Conversation
…o v2.35.1 [security]
|
Important Review skippedBot user detected. To trigger a single review, invoke the You can disable this status message by setting the Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #42 +/- ##
=========================================
Coverage 59.78% 59.78%
Complexity 175 175
=========================================
Files 67 67
Lines 1119 1119
Branches 90 90
=========================================
Hits 669 669
Misses 381 381
Partials 69 69 |
This PR contains the following updates:
2.33.2->2.35.1GitHub Vulnerability Alerts
CVE-2023-41329
Impact
The proxy mode of WireMock, can be protected by the network restrictions configuration, as documented in Preventing proxying to and recording from specific target addresses. These restrictions can be configured using the domain names, and in such a case the configuration is vulnerable to the DNS rebinding attacks. A similar patch was applied in WireMock 3.0.0-beta-15 for the WireMock Webhook Extensions.
The root cause of the attack is a defect in the logic which allows for a race condition triggered by a DNS server whose address expires in between the initial validation and the outbound network request that might go to a domain that was supposed to be prohibited. Control over a DNS service is required to exploit this attack, so it has high execution complexity and limited impact.
Affected versions
Patches
Workarounds
For WireMock:
For WireMock Studio: N/A. Switch to another distribution, there will be no fix provided. The vendor of former WireMock Studio recommends migration to WireMock Cloud
References
Release Notes
wiremock/wiremock (com.github.tomakehurst:wiremock-jre8)
v2.35.1: - Security ReleaseCompare Source
🔒 This is a security release that addresses the following issues
Rebinding in WireMock and WireMock Studio webhooks, proxy and recorder modes
NOTE: WireMock Studio, a proprietary distribution discontinued in 2022, is also affected by those issues and also affected by CVE-2023-39967 - Overall CVSS Score 8.6 - “Controlled and full-read SSRF through URL parameter when testing a request, webhooks and proxy mode”. The fixes will not be provided. The vendor recommends migrating to WireMock Cloud which is available as SaaS and private beta for on-premises deployments
Credits: @W0rty, @numacanedo, @Mahoney, @tomakehurst, @oleg-nenashev
v2.35.0Compare Source
Enhancements
Fixes
v2.34.0Compare Source
This will be the final 2.x.x release and also the last to support Java 8.
Fixes
Enhancements
All dependencies brought up to date including Jetty to 9.4.48.v20220622.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.