These two vulnerabilities ar not related at all to the version of SQ, but to the list of encryption cyphers that are allowed by the server. At least since
mid January 2015 and version 4.5.4), we can specify ciphers that are allowed in SonarQube. we have to configure properly
sonar.web.https.ciphers in
sonar.properties otherwise, as stated in the file, default values for the JVM will be used, which can lead to vulnerabilities.
@Simon, is there a specific reason for telling Tiger to update to 5.3 in this context? Isn't it sufficient to specify the ciphers that have to be allowed?