Describe the bug I recently encountered a vulnerability in my Maven project while adding a dependency to my pom.xml. The vulnerability is reported as CVE-2023-2976 with a severity level of High, indicating a "Files or Directories Accessible to External Parties" vulnerability. The problematic dependency is com.google.guava:guava:31.1-jre.

To Reproduce Steps to reproduce the behavior.

Expected behavior I attempted to mitigate the vulnerability by excluding the problematic dependency as follows:

<dependency>
    <groupId>org.springframework.security</groupId>
    <artifactId>spring-security-saml2-service-provider</artifactId>
    <exclusions>
        <exclusion>
            <groupId>org.opensaml</groupId>
            <artifactId>opensaml-core</artifactId>
        </exclusion>
    </exclusions>
</dependency

Comment From: sjohnr

@doukhahmed thanks for reaching out.

From our perspective, com.google.guava:guava:31.1-jre is a transitive dependency of org.opensaml:opensaml-core:4.3.0 which is the latest available, so you would want to direct your query to the OpenSAML team. You may also try managing the version of guava yourself to a higher version, but you may encounter compatibility issues.