File tree Expand file tree Collapse file tree
server/embedded/src/org/labkey/embedded Expand file tree Collapse file tree Original file line number Diff line number Diff line change 250250 <cpe >cpe:/a:vmware:server</cpe >
251251 <cpe >cpe:/a:vmware:vmware_server</cpe >
252252 </suppress >
253+
254+ <!--
255+ Some PDFBox example code (ExtractEmbeddedFiles) contains a path traversal vulnerability. The example code isn't
256+ packaged in any jars and we already have checks in place to prevent path traversal vulnerabilities.
257+ -->
258+ <suppress >
259+ <notes ><![CDATA[
260+ file name: pdfbox-3.0.4.jar
261+ ]]> </notes >
262+ <packageUrl regex =" true" >^pkg:maven/org\.apache\.pdfbox/pdfbox@.*$</packageUrl >
263+ <cve >CVE-2026-23907</cve >
264+ </suppress >
265+ <suppress >
266+ <notes ><![CDATA[
267+ file name: pdfbox-debugger-3.0.4.jar
268+ ]]> </notes >
269+ <packageUrl regex =" true" >^pkg:maven/org\.apache\.pdfbox/pdfbox-debugger@.*$</packageUrl >
270+ <cve >CVE-2026-23907</cve >
271+ </suppress >
272+ <suppress >
273+ <notes ><![CDATA[
274+ file name: pdfbox-io-3.0.4.jar
275+ ]]> </notes >
276+ <packageUrl regex =" true" >^pkg:maven/org\.apache\.pdfbox/pdfbox-io@.*$</packageUrl >
277+ <cve >CVE-2026-23907</cve >
278+ </suppress >
279+ <suppress >
280+ <notes ><![CDATA[
281+ file name: pdfbox-tools-3.0.4.jar
282+ ]]> </notes >
283+ <packageUrl regex =" true" >^pkg:maven/org\.apache\.pdfbox/pdfbox-tools@.*$</packageUrl >
284+ <cve >CVE-2026-23907</cve >
285+ </suppress >
253286</suppressions >
Original file line number Diff line number Diff line change @@ -79,16 +79,17 @@ public static void main(String[] args)
7979 script-src 'unsafe-eval' 'strict-dynamic' 'nonce-${REQUEST.SCRIPT.NONCE}' ${SCRIPT.SOURCES} ;
8080 base-uri 'self' ;
8181 frame-src 'self' ${FRAME.SOURCES} ;
82+ report-uri ${context.contextPath:}/admin-contentSecurityPolicyReport.api ;
8283 """ ;
8384 // Add upgrade_insecure_requests substitution, frame-ancestors, and enforce version
8485 String enforceCsp = baseCsp + """
8586 ${UPGRADE.INSECURE.REQUESTS}
8687 frame-ancestors 'self' ;
87- report-uri ${context.contextPath:}/admin-contentSecurityPolicyReport.api? cspVersion=e14 ;
88+ /* cspVersion=e15 */
8889 """ ;
8990 // Leave out upgrade_insecure_requests and frame-ancestors directives, since they produce warnings on some browsers
9091 String reportCsp = baseCsp + """
91- report-uri ${context.contextPath:}/admin-contentSecurityPolicyReport.api? cspVersion=r14 ;
92+ /* cspVersion=r15 */
9293 """ ;
9394
9495 application .setDefaultProperties (new HashMap <>()
You can’t perform that action at this time.
0 commit comments