Skip to content

Commit 87858ef

Browse files
Merge 26.3 to develop
2 parents 14b4619 + 41f0053 commit 87858ef

2 files changed

Lines changed: 36 additions & 2 deletions

File tree

dependencyCheckSuppression.xml

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -250,4 +250,37 @@
250250
<cpe>cpe:/a:vmware:server</cpe>
251251
<cpe>cpe:/a:vmware:vmware_server</cpe>
252252
</suppress>
253+
254+
<!--
255+
Some PDFBox example code (ExtractEmbeddedFiles) contains a path traversal vulnerability. The example code isn't
256+
packaged in any jars and we already have checks in place to prevent path traversal vulnerabilities.
257+
-->
258+
<suppress>
259+
<notes><![CDATA[
260+
file name: pdfbox-3.0.4.jar
261+
]]></notes>
262+
<packageUrl regex="true">^pkg:maven/org\.apache\.pdfbox/pdfbox@.*$</packageUrl>
263+
<cve>CVE-2026-23907</cve>
264+
</suppress>
265+
<suppress>
266+
<notes><![CDATA[
267+
file name: pdfbox-debugger-3.0.4.jar
268+
]]></notes>
269+
<packageUrl regex="true">^pkg:maven/org\.apache\.pdfbox/pdfbox-debugger@.*$</packageUrl>
270+
<cve>CVE-2026-23907</cve>
271+
</suppress>
272+
<suppress>
273+
<notes><![CDATA[
274+
file name: pdfbox-io-3.0.4.jar
275+
]]></notes>
276+
<packageUrl regex="true">^pkg:maven/org\.apache\.pdfbox/pdfbox-io@.*$</packageUrl>
277+
<cve>CVE-2026-23907</cve>
278+
</suppress>
279+
<suppress>
280+
<notes><![CDATA[
281+
file name: pdfbox-tools-3.0.4.jar
282+
]]></notes>
283+
<packageUrl regex="true">^pkg:maven/org\.apache\.pdfbox/pdfbox-tools@.*$</packageUrl>
284+
<cve>CVE-2026-23907</cve>
285+
</suppress>
253286
</suppressions>

server/embedded/src/org/labkey/embedded/LabKeyServer.java

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,16 +79,17 @@ public static void main(String[] args)
7979
script-src 'unsafe-eval' 'strict-dynamic' 'nonce-${REQUEST.SCRIPT.NONCE}' ${SCRIPT.SOURCES} ;
8080
base-uri 'self' ;
8181
frame-src 'self' ${FRAME.SOURCES} ;
82+
report-uri ${context.contextPath:}/admin-contentSecurityPolicyReport.api ;
8283
""";
8384
// Add upgrade_insecure_requests substitution, frame-ancestors, and enforce version
8485
String enforceCsp = baseCsp + """
8586
${UPGRADE.INSECURE.REQUESTS}
8687
frame-ancestors 'self' ;
87-
report-uri ${context.contextPath:}/admin-contentSecurityPolicyReport.api?cspVersion=e14 ;
88+
/* cspVersion=e15 */
8889
""";
8990
// Leave out upgrade_insecure_requests and frame-ancestors directives, since they produce warnings on some browsers
9091
String reportCsp = baseCsp + """
91-
report-uri ${context.contextPath:}/admin-contentSecurityPolicyReport.api?cspVersion=r14 ;
92+
/* cspVersion=r15 */
9293
""";
9394

9495
application.setDefaultProperties(new HashMap<>()

0 commit comments

Comments
 (0)