diff --git a/.trivyignore b/.trivyignore
index 1c22d31..bb627f3 100644
--- a/.trivyignore
+++ b/.trivyignore
@@ -1,55 +1,8 @@
-# CVE-2022-25857
-# The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of
-# Service (DoS) due missing to nested depth limitation for collections.
-#
-# org.yaml/snakeyaml is an indirect dependency we get from spring boot. A
-# spring boot maintainer stated that "Most Sping Boot applications only need
-# SnakeYaml to parse their own application.yml configuration. I don't
-# think we can consider this content as untrusted input." I take this to mean
-# we're likely not vulnerable to this issue. It should be fixed in Spring Boot
-# 2.7.4, which as of 9/15 is not yet released. Snyk will notify us when a fix
-# is available. At that time, we should remove this entry from the .trivyignore.
-CVE-2022-25857
-
-
-# CVE-2021-23840
-# Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow
-# the output length argument in some cases where the input length is close to the
-# maximum permissable length for an integer on the platform. In such cases the return
-# value from the function call will be 1 (indicating success), but the output length
-# value will be negative. This could cause applications to behave incorrectly or crash.
-# OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions
-# should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by
-# this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public
-# updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other
-# users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i).
-# Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
-#
-# We've determined that we are not impacted by this vulnerability because:
-# - we do not directly make any calls to the affected methods
-#
-# Performed by @daneleblanc, approved by @andytinkham
-CVE-2021-23840
-
-# CVE-2021-23840
-# The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a
-# unique hash value based on the issuer and serial number data contained within an X509
-# certificate. However it fails to correctly handle any errors that may occur while
-# parsing the issuer field (which might occur if the issuer field is maliciously
-# constructed). This may subsequently result in a NULL pointer deref and a crash
-# leading to a potential denial of service attack. The function
-# X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so
-# applications are only vulnerable if they use this function directly and they use
-# it on certificates that may have been obtained from untrusted sources. OpenSSL
-# versions 1.1.1i and below are affected by this issue. Users of these versions should
-# upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this
-# issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates.
-# Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should
-# upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y
-# (Affected 1.0.2-1.0.2x).
-#
-# We've determined that we are not impacted by this vulnerability because:
-# - we do not directly make any calls to the affected methods
-#
-# Performed by @daneleblanc, approved by @andytinkham
-CVE-2021-23841
+# The following 4 CVEs are in indirect dependencies. There is no easy workaround to avoid
+# them and they are not exploitable in our application. Additionally this application is only
+# used for demos so harm from DoS attacks is very limited. We will ignore them until they
+# are fixed in the indirect dependencies.
+CVE-2022-3510
+CVE-2022-3171
+CVE-2022-3509
+CVE-2022-1471
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 0c0f50e..0d7ccd3 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -5,8 +5,13 @@ The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
## [Unreleased]
+
+## [1.2.1] - 2023-04-24
+
### Security
-- Updated Springboot to 3.0.2 and Dockerfile to openjdk:21
+- Updated Spring boot to 3.0.6 and Dockerfile to eclipse-temurin
+ [conjurdemos/pet-store-demo#60](https://github.com/conjurdemos/pet-store-demo/pull/60)
+- Updated Spring boot to 3.0.2 and Dockerfile to openjdk:21
[conjurdemos/pet-store-demo#58](https://github.com/conjurdemos/pet-store-demo/pull/58)
- Updated postgresql to 42.5.1 to resolve CVE-2022-41946
[conjurdemos/pet-store-demo#57](https://github.com/conjurdemos/pet-store-demo/pull/57)
@@ -46,5 +51,6 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.
The first tagged version.
-[Unreleased]: https://github.com/cyberark/secretless-broker/compare/v1.2.0...HEAD
+[Unreleased]: https://github.com/cyberark/secretless-broker/compare/v1.2.1...HEAD
+[1.2.1]: https://github.com/cyberark/secretless-broker/compare/v1.2.0...v1.2.1
[1.2.0]: https://github.com/cyberark/secretless-broker/compare/v1.1.0...v1.2.0
diff --git a/Dockerfile b/Dockerfile
index 3254410..df130b4 100644
--- a/Dockerfile
+++ b/Dockerfile
@@ -35,12 +35,9 @@ RUN mvn package && cp target/petstore-*.jar app.jar
# This base is used for the final image
# It extracts the packaged application from the previous stage
# and builds the final image
-FROM openjdk:21-slim
+FROM eclipse-temurin:20-jre-alpine
LABEL org.opencontainers.image.authors="CyberArk"
-# Install the fix for CVE-2022-1271
-RUN apt-get update && apt-get dist-upgrade -y
-
COPY --from=summon /usr/local/lib/summon /usr/local/lib/summon
COPY --from=summon /usr/local/bin/summon /usr/local/bin/summon
COPY --from=maven /app/app.jar /app.jar
diff --git a/VERSION b/VERSION
index 26aaba0..6085e94 100644
--- a/VERSION
+++ b/VERSION
@@ -1 +1 @@
-1.2.0
+1.2.1
diff --git a/pom.xml b/pom.xml
index 3d4c05b..80cb95e 100644
--- a/pom.xml
+++ b/pom.xml
@@ -5,19 +5,19 @@
org.springframework
petstore
- 0.1.0
+ 0.2.1
org.springframework.boot
spring-boot-starter-parent
- 3.0.2
+ 3.0.6
org.springframework.boot
spring-boot-starter-web
- 3.0.2
+ 3.0.6
org.postgresql
@@ -41,7 +41,7 @@
org.springframework.boot
spring-boot-starter-data-jpa
- 3.0.2
+ 3.0.6
javax.xml.bind
@@ -51,7 +51,7 @@
org.springframework.boot
spring-boot-starter-validation
- 3.0.2
+ 3.0.6