You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@hc.apache.org by "Gary D. Gregory (Jira)" <ji...@apache.org> on 2019/10/23 22:21:00 UTC

[jira] [Comment Edited] (HTTPCLIENT-2018) Improper input validation vulnerability in commons-codec version used by latest HttpClient

    [ https://issues.apache.org/jira/browse/HTTPCLIENT-2018?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16958297#comment-16958297 ] 

Gary D. Gregory edited comment on HTTPCLIENT-2018 at 10/23/19 10:20 PM:
------------------------------------------------------------------------

Hi [~olegk],

I am quite busy at work and also behind in releasing other Commons Components that I don't think I'll get around to creating such a one-off release. Feel free to ping the Commons developer's mailing list though, maybe someone will pick up the request.

From my POV, I think requiring Java 7 is a much simpler and reasonable way forward in the year 2020 when Java is up to version 13.

Gary


was (Author: garydgregory):
Hi [~olegk],

I am quite busy at work and also behind in releasing other Commons Components that I don't think I'll get around to creating a such a one-off release. Feel free to ping the Commons developer's mailing list though, maybe someone will pick up the request.

From my POV, I think requiring Java 7 is a much simpler and reasonable way forward in the year 2020 when Java is up to version 13.

Gary

> Improper input validation vulnerability in commons-codec version used by latest HttpClient
> ------------------------------------------------------------------------------------------
>
>                 Key: HTTPCLIENT-2018
>                 URL: https://issues.apache.org/jira/browse/HTTPCLIENT-2018
>             Project: HttpComponents HttpClient
>          Issue Type: Bug
>          Components: HttpClient (async), HttpClient (classic)
>    Affects Versions: 4.5.10, 5.0 Beta6
>            Reporter: Nagesh Arkalgud
>            Priority: Major
>              Labels: security
>
> *Explanation*
> The Apache {{commons-codec}} package contains an Improper Input Validation vulnerability. The {{decode()}} method in the {{Base32}}, {{Base64}}, and {{BCodec}} classes fails to reject malformed Base32 and Base64 encoded strings and consequently decodes them into arbitrary values. A remote attacker can leverage this vulnerability to potentially tunnel additional information via seemingly legitimate Base32 or Base64 encoded strings.
>  
> *Root Cause*
> commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base64.class : [1.5.RC1, 1.13)
>  commons-codec-1.11.jar *<=* org/apache/commons/codec/net/BCodec.class : [1.5.RC1, 1.13)
>  commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base32.class : [1.5.RC1, 1.13)
> *Advisories*
> Project: https://issues.apache.org/jira/browse/CODEC-134
> *Solution*
> Please update commons-codec to 1.13 to fix this issue.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@hc.apache.org
For additional commands, e-mail: dev-help@hc.apache.org