代码拉取完成,页面将自动刷新
v2.2.6
https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/
在dev-api的pom文件中有引用
<dependency>
<groupId>com.aliyun.oss</groupId>
<artifactId>aliyun-sdk-oss</artifactId>
</dependency>
而aliyun-sdk-oss下依赖
<groupId>org.codehaus.jettison</groupId>
<artifactId>jettison</artifactId>
引起
升级jettison版本
修改project下pom中
<jettison.version>1.5.4</jettison.version>
修改dev-api下pom把
<dependency>
<groupId>com.aliyun.oss</groupId>
<artifactId>aliyun-sdk-oss</artifactId>
</dependency>
改为
<dependency>
<groupId>com.aliyun.oss</groupId>
<artifactId>aliyun-sdk-oss</artifactId>
<exclusions>
<exclusion>
<groupId>org.codehaus.jettison</groupId>
<artifactId>jettison</artifactId>
</exclusion>
</exclusions>
</dependency>
<!-- https://mvnrepository.com/artifact/org.codehaus.jettison/jettison -->
<dependency>
<groupId>org.codehaus.jettison</groupId>
<artifactId>jettison</artifactId>
</dependency>
即可