Skip to content

Commit ea16ce1

Browse files
authored
Remove unnecessary OWASP suppressions (#1144)
1 parent 05211a5 commit ea16ce1

File tree

1 file changed

+3
-112
lines changed

1 file changed

+3
-112
lines changed

dependencyCheckSuppression.xml

Lines changed: 3 additions & 112 deletions
Original file line numberDiff line numberDiff line change
@@ -19,29 +19,6 @@
1919
<cve>CVE-2021-39491</cve>
2020
</suppress>
2121

22-
<!--
23-
GWT uses Protobuf internally but doesn't expose it, meaning the handful of CVEs in 2.5.0 are not a concern.
24-
https://github.com/gwtproject/gwt/issues/9778
25-
-->
26-
<suppress>
27-
<notes><![CDATA[
28-
file name: gwt-servlet-2.11.0.jar (shaded: com.google.protobuf:protobuf-java:2.5.0)
29-
]]></notes>
30-
<packageUrl regex="true">^pkg:maven/com\.google\.protobuf/protobuf\-java@.*$</packageUrl>
31-
<cpe>cpe:/a:google:protobuf-java</cpe>
32-
<vulnerabilityName>CVE-2022-3509</vulnerabilityName>
33-
<vulnerabilityName>CVE-2021-22569</vulnerabilityName>
34-
</suppress>
35-
36-
<suppress>
37-
<notes><![CDATA[
38-
file name: gwt-servlet-jakarta-2.11.0.jar (shaded: com.google.protobuf:protobuf-java:2.5.0)
39-
]]></notes>
40-
<packageUrl regex="true">^pkg:maven/com\.google\.protobuf/protobuf\-java@.*$</packageUrl>
41-
<cpe>cpe:/a:google:protobuf-java</cpe>
42-
<vulnerabilityName>CVE-2024-7254</vulnerabilityName>
43-
</suppress>
44-
4522
<!-- Tangled CVEs. See https://github.com/jeremylong/DependencyCheck/issues/4614 and https://github.com/OSSIndex/vulns/issues/316 -->
4623
<suppress>
4724
<notes><![CDATA[
@@ -111,7 +88,7 @@
11188
<!--
11289
This is a dependency of Java-FPDF, used by the WNPRC billing module for PDF generation, which hasn't been updated
11390
to reference the now-renamed Commons Imaging library instead of the old Sanselan incubator. The CVE is related
114-
to file parsing, not generation so we're not vulnerable
91+
to file parsing, not generation, so we're not vulnerable
11592
-->
11693
<suppress>
11794
<notes><![CDATA[
@@ -121,26 +98,6 @@
12198
<vulnerabilityName>CVE-2018-17201</vulnerabilityName>
12299
</suppress>
123100

124-
<!--
125-
The Tomcat jaspic-api and jsp-api jars are false positives, for some reason matching against Tomcat 3.0. See
126-
https://github.com/jeremylong/DependencyCheck/issues/5659, which has been raised, but no response.
127-
-->
128-
<suppress>
129-
<notes><![CDATA[
130-
file name: tomcat-jaspic-api-10.1.34.jar
131-
]]></notes>
132-
<packageUrl regex="true">^pkg:maven/org\.apache\.tomcat/tomcat\-jaspic\-api@.*$</packageUrl>
133-
<cpe>cpe:/a:apache:tomcat</cpe>
134-
</suppress>
135-
136-
<suppress>
137-
<notes><![CDATA[
138-
file name: tomcat-jsp-api-10.1.34.jar
139-
]]></notes>
140-
<packageUrl regex="true">^pkg:maven/org\.apache\.tomcat/tomcat\-jsp\-api@.*$</packageUrl>
141-
<cpe>cpe:/a:apache:tomcat</cpe>
142-
</suppress>
143-
144101
<!--
145102
suppress CVE-2023-52070 for jfreechart, may become moot after subsequent upgrades
146103
-->
@@ -152,72 +109,6 @@
152109
<vulnerabilityName>CVE-2023-52070</vulnerabilityName>
153110
</suppress>
154111

155-
<!-- We don't use the sun.io.useCanonCaches setting referenced by this CVE. -->
156-
<suppress>
157-
<notes><![CDATA[
158-
file name: tomcat-catalina-10.1.34.jar
159-
]]></notes>
160-
<packageUrl regex="true">^pkg:maven/org\.apache\.tomcat/tomcat-catalina@.*$</packageUrl>
161-
<vulnerabilityName>CVE-2024-56337</vulnerabilityName>
162-
</suppress>
163-
164-
<!--
165-
False positives: labkey-api-client.jar is getting tagged as an old version of LabKey Server
166-
-->
167-
<suppress>
168-
<notes><![CDATA[
169-
file name: labkey-client-api-6.2.0.jar
170-
]]></notes>
171-
<packageUrl regex="true">^pkg:maven/org\.labkey\.api/labkey-client-api@.*$</packageUrl>
172-
<cve>CVE-2019-3911</cve>
173-
</suppress>
174-
<suppress>
175-
<notes><![CDATA[
176-
file name: labkey-client-api-6.2.0.jar
177-
]]></notes>
178-
<packageUrl regex="true">^pkg:maven/org\.labkey\.api/labkey-client-api@.*$</packageUrl>
179-
<cve>CVE-2019-3912</cve>
180-
</suppress>
181-
<suppress>
182-
<notes><![CDATA[
183-
file name: labkey-client-api-6.2.0.jar
184-
]]></notes>
185-
<packageUrl regex="true">^pkg:maven/org\.labkey\.api/labkey-client-api@.*$</packageUrl>
186-
<cve>CVE-2019-3913</cve>
187-
</suppress>
188-
189-
<!-- False positive - mxparser is not XStream -->
190-
<suppress>
191-
<notes><![CDATA[
192-
file name: mxparser-1.2.2.jar
193-
]]></notes>
194-
<packageUrl regex="true">^pkg:maven/io\.github\.x-stream/mxparser@.*$</packageUrl>
195-
<cpe>cpe:/a:xstream:xstream</cpe>
196-
</suppress>
197-
198-
<!-- False positives - bzip2 from a different source -->
199-
<suppress>
200-
<notes><![CDATA[
201-
file name: bzip2-0.9.1.jar
202-
]]></notes>
203-
<packageUrl regex="true">^pkg:maven/org\.itadaki/bzip2@.*$</packageUrl>
204-
<cve>CVE-2019-12900</cve>
205-
</suppress>
206-
<suppress>
207-
<notes><![CDATA[
208-
file name: bzip2-0.9.1.jar
209-
]]></notes>
210-
<packageUrl regex="true">^pkg:maven/org\.itadaki/bzip2@.*$</packageUrl>
211-
<cve>CVE-2010-0405</cve>
212-
</suppress>
213-
<suppress>
214-
<notes><![CDATA[
215-
file name: bzip2-0.9.1.jar
216-
]]></notes>
217-
<packageUrl regex="true">^pkg:maven/org\.itadaki/bzip2@.*$</packageUrl>
218-
<cve>CVE-2005-1260</cve>
219-
</suppress>
220-
221112
<!-- Related to the setting of channel binding as required, which is not relevant to us. -->
222113
<suppress>
223114
<notes><![CDATA[
@@ -235,9 +126,9 @@
235126
<packageUrl regex="true">^pkg:maven/commons-lang/commons-lang@.*$</packageUrl>
236127
<vulnerabilityName>CVE-2025-48924</vulnerabilityName>
237128
</suppress>
238-
129+
239130
<!--
240-
GSON is getting flagged for "Connect2id Nimbus JOSE + JWT before 10.0.2 allows a remote attacker
131+
GSON is getting flagged for "Connect2id Nimbus JOSE + JWT before 10.0.2 allows a remote attacker
241132
to cause a denial of service via a deeply nested JSON object supplied in a JWT claim set, because of
242133
uncontrolled recursion." Seems like a case of mistaken identity, so suppress it.
243134
-->

0 commit comments

Comments
 (0)