Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DTS-34986 Central AuthNAuth Spring Boot upgrade #1012

Open
wants to merge 82 commits into
base: develop
Choose a base branch
from

Conversation

tibi-iordache
Copy link

@tibi-iordache tibi-iordache commented May 27, 2024

Upgrading the Central AuthNAuth Spring Boot version to 3.2 and Java version to 17.
For full documentation of the upgrade, you can check the confluence page:
https://publicissapient.atlassian.net/wiki/spaces/SPDS/pages/307789878/Java+17+Upgrade

}else{
if(redirectUri.indexOf('?') === -1){
window.location.href = `${redirectUri}?authToken=${authToken}`;
window.location.href = `${redirectUri}`;

Check failure

Code scanning / CodeQL

Client-side cross-site scripting High

Cross-site scripting vulnerability due to
user-provided value
.
}else{
window.location.href = `${redirectUri}&authToken=${authToken}`;
window.location.href = `${redirectUri}`;

Check failure

Code scanning / CodeQL

Client-side cross-site scripting High

Cross-site scripting vulnerability due to
user-provided value
.
}else{
if(redirectUri.indexOf('?') === -1){
window.location.href = `${redirectUri}?authToken=${authToken}`;
window.location.href = `${redirectUri}`;

Check warning

Code scanning / CodeQL

Client-side URL redirect Medium

Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.
}else{
window.location.href = `${redirectUri}&authToken=${authToken}`;
window.location.href = `${redirectUri}`;

Check warning

Code scanning / CodeQL

Client-side URL redirect Medium

Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.
Untrusted URL redirection depends on a
user-provided value
.
* @throws ParseException
*/
private void apiCallToGetBranches(List<BambooBranchesResponseDTO> responseDTOList, String url, HttpEntity<?> httpEntity) throws ParseException {
ResponseEntity<String> response = restTemplate.exchange(url, HttpMethod.GET, httpEntity, String.class);

Check failure

Code scanning / CodeQL

Server-side request forgery Critical

Potential server-side request forgery due to a
user-provided value
.
String statusCode = response.getStatusCode().toString();
log.error("Error while fetching BambooBranchesNameAndKeys from {}. with status {}", url,
statusCode);
log.error("Invalid jobNameKey: {}", jobNameKey);

Check failure

Code scanning / CodeQL

Log Injection High

This log entry depends on a
user-provided value
.
parseBranchesResponse(responseDTOList, response);
} else {
String statusCode = response.getStatusCode().toString();
log.error("Error while fetching BambooBranchesNameAndKeys from {}. with status {}", url,

Check failure

Code scanning / CodeQL

Log Injection High

This log entry depends on a
user-provided value
.
try {
calculateAllKPIAggregatedMetrics(kpiRequest, responseList, kpiElement, treeAggregatorDetail);
} catch (Exception e) {
log.error("Error while KPI calculation for data {}", kpiRequest.getKpiList(), e);

Check failure

Code scanning / CodeQL

Log Injection High

This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
This log entry depends on a
user-provided value
.
.disable();
@Bean
protected SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
http.csrf(csrf -> csrf.disable());

Check failure

Code scanning / CodeQL

Disabled Spring CSRF protection High

CSRF vulnerability due to protection being disabled.
shunaray and others added 30 commits July 12, 2024 17:24
Qa master to Master - 10.0.0 Release
# Conflicts:
#	central-auth-service/central-login-ui-react/src/pages/login/index.jsx
Signed-off-by: rapkalya <74697698+rapkalya@users.noreply.github.com>
Signed-off-by: rapkalya <74697698+rapkalya@users.noreply.github.com>
Signed-off-by: rapkalya <74697698+rapkalya@users.noreply.github.com>
Signed-off-by: rapkalya <74697698+rapkalya@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

10 participants