Skip to content

[Snyk] Fix for 1 vulnerabilities#201

Open
snyk-io[bot] wants to merge 1 commit intomasterfrom
snyk-fix-3cc82883c7533b7f4851c0390990506a
Open

[Snyk] Fix for 1 vulnerabilities#201
snyk-io[bot] wants to merge 1 commit intomasterfrom
snyk-fix-3cc82883c7533b7f4851c0390990506a

Conversation

@snyk-io
Copy link
Copy Markdown

@snyk-io snyk-io bot commented Apr 5, 2026

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • samples/client/petstore/java/resttemplate-withXml/pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
high severity Allocation of Resources Without Limits or Throttling
SNYK-JAVA-COMFASTERXMLJACKSONCORE-15907551
  125   com.fasterxml.jackson.core:jackson-core:
2.10.1 -> 2.21.2
com.fasterxml.jackson.core:jackson-databind:
2.10.1 -> 2.21.2
com.fasterxml.jackson.dataformat:jackson-dataformat-xml:
2.10.1 -> 2.21.2
com.fasterxml.jackson.jaxrs:jackson-jaxrs-json-provider:
2.10.1 -> 2.21.2
No Path Found No Known Exploit

Breaking Change Risk

Merge Risk: High

Notice: This assessment is enhanced by AI.


Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Allocation of Resources Without Limits or Throttling

@snyk-io
Copy link
Copy Markdown
Author

snyk-io bot commented Apr 5, 2026

Merge Risk: High

This upgrade of the Jackson suite from version 2.10.1 to 2.21.2 is a high-risk change. It spans multiple minor versions and introduces several significant changes, including a raised Java version requirement, new processing limits for security, and behavioral modifications that require developer action and verification.

Key Breaking Changes:

  • Java 8 Baseline Required: Jackson 2.13 and later require Java 8 for most modules, including jackson-databind and jackson-core. [1, 3, 7] Projects running on older Java versions must upgrade their environment.

  • Javax to Jakarta Namespace Migration: The jackson-jaxrs-json-provider has been updated for Jakarta EE. If your project uses JAX-RS with Jakarta, you will need to update your dependencies from the old javax.* artifacts to the new jakarta.* artifacts. [3, 4, 9] Additionally, workarounds for the older JAX-RS 1.x were removed in version 2.13. [3, 9]

  • New Processing Limits: To mitigate Denial of Service (DoS) risks, version 2.15 introduced default limits on input size. [5, 6, 10] This includes maximums for string length, number length, and document nesting depth. Applications that process very large JSON documents may encounter StreamConstraintsException and will require configuration adjustments on the JsonFactory.

  • Behavioral Changes:

    • Annotation Precedence: In version 2.14, the handling of conflicting @JsonIgnore and @JsonProperty annotations changed. @JsonIgnore now has higher precedence, which could alter serialization output. [2, 19]
    • Record Deserialization: The mechanism for deserializing Java Records was modified in version 2.15 to align with POJOs, which could break deserialization for code relying on the previous field-based behavior. [14]

Recommendation:

Given the number of impactful changes, thorough testing is essential. Developers should:

  1. Verify the project is running on Java 8 or newer.
  2. Update build configurations to use the new jakarta artifacts for JAX-RS if applicable.
  3. Test applications that handle large JSON inputs to ensure they do not exceed the new default processing limits.
  4. Review models that use mixed @JsonIgnore/@JsonProperty annotations or Java Records for any unexpected serialization or deserialization behavior.

Notice 🤖: This content was augmented using artificial intelligence. AI-generated content may contain errors and should be reviewed for accuracy before use.

@snyk-io
Copy link
Copy Markdown
Author

snyk-io bot commented Apr 5, 2026

Snyk checks have passed. No issues have been found so far.

Status Scan Engine Critical High Medium Low Total (0)
Open Source Security 0 0 0 0 0 issues
Licenses 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants