Skip to content

Bump io.undertow:undertow-core from 2.0.9.Final to 2.3.21.Final#108

Open
dependabot[bot] wants to merge 1 commit into
masterfrom
dependabot/maven/io.undertow-undertow-core-2.3.21.Final
Open

Bump io.undertow:undertow-core from 2.0.9.Final to 2.3.21.Final#108
dependabot[bot] wants to merge 1 commit into
masterfrom
dependabot/maven/io.undertow-undertow-core-2.3.21.Final

Conversation

@dependabot
Copy link
Copy Markdown

@dependabot dependabot Bot commented on behalf of github Jan 21, 2026

Bumps io.undertow:undertow-core from 2.0.9.Final to 2.3.21.Final.

Release notes

Sourced from io.undertow:undertow-core's releases.

v2.3.21.Final

Release 2.3.21.Final fixes CVE-2024-3884 CVE-2024-4027 CVE-2025-12543 Full list of Jiras: view in Jira

    Release Notes - Undertow - Version 2.3.21.Final

... (truncated)

Commits
  • 791c908 Prepare 2.3.21.Final
  • 5374f57 Merge pull request #1862 from fl4via/backport-fixes_2.3.x
  • 7e25c8f [UNDERTOW-2609] Fix the since version in the @​Deprecated annotation at HttpSe...
  • bd97428 [UNDERTOW-2662] Remove the option to disable the RFC 6265 cookie parsing and ...
  • e45da52 Revert "[UNDERTOW-2675] Replace the new UndertowOptions by system properties ...
  • f60b476 Temporarily revert "[UNDERTOW-2662] Remove the option to disable the RFC 6265...
  • e47fed7 Temporarily revert "[UNDERTOW-2609] Fix the since version in the @​Deprecated ...
  • 6484e91 Merge pull request #1861 from fl4via/backport-fixes_2.3.x
  • 6e4b999 [UNDERTOW-2609] Fix the since version in the @​Deprecated annotation at HttpSe...
  • 2a7d993 [UNDERTOW-2421] Consolidate cookie attrib code and add support to attributes ...
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [io.undertow:undertow-core](https://github.com/undertow-io/undertow) from 2.0.9.Final to 2.3.21.Final.
- [Release notes](https://github.com/undertow-io/undertow/releases)
- [Commits](undertow-io/undertow@2.0.9.Final...2.3.21.Final)

---
updated-dependencies:
- dependency-name: io.undertow:undertow-core
  dependency-version: 2.3.21.Final
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file java Pull requests that update java code labels Jan 21, 2026
@juegge
Copy link
Copy Markdown
Contributor

juegge commented Jan 21, 2026

Logo
Checkmarx One – Scan Summary & Details5cdb21ea-904a-4020-9c0e-8846b2b3de18

New Issues (318)

Checkmarx found the following issues in this Pull Request

# Severity Issue Source File / Package Checkmarx Insight
1 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/XPathQuery.java: 36
detailsThe application's Messages method executes an SQL query with executeQuery, at line 14 of /src/main/webapp/vulnerability/Messages.jsp. The applica...
Attack Vector
2 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/XPathQuery.java: 35
detailsThe application's Messages method executes an SQL query with executeQuery, at line 14 of /src/main/webapp/vulnerability/Messages.jsp. The applica...
Attack Vector
3 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/sqs.java: 25
detailsThe application's getId method executes an SQL query with executeQuery, at line 37 of /src/main/java/org/cysecurity/cspf/jvl/controller/sqs.java....
Attack Vector
4 CRITICAL SQL_Injection /src/main/webapp/vulnerability/csrf/changepassword.jsp: 33
detailsThe application's changepassword method executes an SQL query with executeUpdate, at line 40 of /src/main/webapp/vulnerability/csrf/changepassword...
Attack Vector
5 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 60
detailsThe application's setup method executes an SQL query with executeUpdate, at line 127 of /src/main/java/org/cysecurity/cspf/jvl/controller/Install....
Attack Vector
6 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 58
detailsThe application's setup method executes an SQL query with executeUpdate, at line 119 of /src/main/java/org/cysecurity/cspf/jvl/controller/Install....
Attack Vector
7 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java: 58
detailsThe application's setup method executes an SQL query with executeUpdate, at line 117 of /src/main/java/org/cysecurity/cspf/jvl/controller/Install....
Attack Vector
8 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/Register.java: 47
detailsThe application's processRequest method executes an SQL query with executeUpdate, at line 58 of /src/main/java/org/cysecurity/cspf/jvl/controller/R...
Attack Vector
9 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/EmailCheck.java: 44
detailsThe application's processRequest method executes an SQL query with executeQuery, at line 52 of /src/main/java/org/cysecurity/cspf/jvl/controller/Em...
Attack Vector
10 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 44
detailsThe application's processRequest method executes an SQL query with executeQuery, at line 52 of /src/main/java/org/cysecurity/cspf/jvl/controller/Lo...
Attack Vector
11 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/UsernameCheck.java: 43
detailsThe application's processRequest method executes an SQL query with executeQuery, at line 52 of /src/main/java/org/cysecurity/cspf/jvl/controller/Us...
Attack Vector
12 CRITICAL SQL_Injection /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator.java: 43
detailsThe application's processRequest method executes an SQL query with executeQuery, at line 52 of /src/main/java/org/cysecurity/cspf/jvl/controller/Lo...
Attack Vector
13 CRITICAL SQL_Injection /src/main/webapp/changeCardDetails.jsp: 39
detailsThe application's changeCardDetails method executes an SQL query with executeUpdate, at line 43 of /src/main/webapp/changeCardDetails.jsp. The ap...
Attack Vector
14 CRITICAL SQL_Injection /src/main/webapp/changeCardDetails.jsp: 38
detailsThe application's changeCardDetails method executes an SQL query with executeUpdate, at line 43 of /src/main/webapp/changeCardDetails.jsp. The ap...
Attack Vector
15 CRITICAL SQL_Injection /src/main/webapp/changeCardDetails.jsp: 37
detailsThe application's changeCardDetails method executes an SQL query with executeUpdate, at line 43 of /src/main/webapp/changeCardDetails.jsp. The ap...
Attack Vector
16 CRITICAL SQL_Injection /src/main/webapp/vulnerability/idor/change-email.jsp: 27
detailsThe application's changeemail method executes an SQL query with executeUpdate, at line 32 of /src/main/webapp/vulnerability/idor/change-email.jsp...
Attack Vector

More results are available on the CxOne platform

Fixed Issues (82) Great job! The following issues were fixed in this Pull Request
Severity Issue Source File / Package
CRITICAL CVE-2019-10212 Maven-io.undertow:undertow-core-2.0.9.Final
CRITICAL CVE-2019-3888 Maven-io.undertow:undertow-core-2.0.9.Final
CRITICAL CVE-2020-1745 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2019-14888 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2020-10705 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2020-1757 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2020-27782 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2021-3690 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2021-3859 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2022-0084 Maven-org.jboss.xnio:xnio-api-3.3.8.Final
HIGH CVE-2022-1319 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2022-2053 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2022-4492 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2023-1108 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2023-1973 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2023-3223 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2023-4639 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2023-5379 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2023-5685 Maven-org.jboss.xnio:xnio-api-3.3.8.Final
HIGH CVE-2024-1635 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2024-5971 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2024-6162 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH CVE-2024-7885 Maven-io.undertow:undertow-core-2.0.9.Final
HIGH Remote Desktop Port Open To Internet /AJP_Open_Port.tf: 1
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Sensitive Port Is Exposed To Entire Network /AJP_Open_Port.tf: 6
HIGH Unknown Port Exposed To Internet /AJP_Open_Port.tf: 11
HIGH Unrestricted Security Group Ingress /AJP_Open_Port.tf: 11
MEDIUM CVE-2020-10687 Maven-io.undertow:undertow-core-2.0.9.Final
MEDIUM CVE-2020-10719 Maven-io.undertow:undertow-core-2.0.9.Final
MEDIUM CVE-2020-14340 Maven-org.jboss.xnio:xnio-nio-3.3.8.Final
MEDIUM CVE-2021-20220 Maven-io.undertow:undertow-core-2.0.9.Final
MEDIUM CVE-2021-3597 Maven-io.undertow:undertow-core-2.0.9.Final
MEDIUM CVE-2021-3629 Maven-io.undertow:undertow-core-2.0.9.Final
MEDIUM CVE-2022-2764 Maven-io.undertow:undertow-core-2.0.9.Final
MEDIUM CVE-2024-1459 Maven-io.undertow:undertow-core-2.0.9.Final
MEDIUM CVE-2024-3653 Maven-io.undertow:undertow-core-2.0.9.Final
MEDIUM HTTP Port Open To Internet /AJP_Open_Port.tf: 1
MEDIUM SQL Analysis Services Port 2383 (TCP) Is Publicly Accessible /AJP_Open_Port.tf: 6
MEDIUM Security Group With Unrestricted Access To SSH /AJP_Open_Port.tf: 11

Use @Checkmarx to interact with Checkmarx PR Assistant.
Examples:
@Checkmarx how are you able to help me?
@Checkmarx rescan this PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file java Pull requests that update java code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant