You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@hc.apache.org by "Nagesh Arkalgud (Jira)" <ji...@apache.org> on 2019/10/22 19:11:00 UTC
[jira] [Created] (HTTPCLIENT-2018) Improper input validation
vulnerability in commons-codec version used by latest HttpClient
Nagesh Arkalgud created HTTPCLIENT-2018:
-------------------------------------------
Summary: Improper input validation vulnerability in commons-codec version used by latest HttpClient
Key: HTTPCLIENT-2018
URL: https://issues.apache.org/jira/browse/HTTPCLIENT-2018
Project: HttpComponents HttpClient
Issue Type: Bug
Components: HttpClient (async), HttpClient (classic)
Affects Versions: 5.0 Beta6, 4.5.10
Reporter: Nagesh Arkalgud
*Explanation*
The Apache {{commons-codec}} package contains an Improper Input Validation vulnerability. The {{decode()}} method in the {{Base32}}, {{Base64}}, and {{BCodec}} classes fails to reject malformed Base32 and Base64 encoded strings and consequently decodes them into arbitrary values. A remote attacker can leverage this vulnerability to potentially tunnel additional information via seemingly legitimate Base32 or Base64 encoded strings.
*Root Cause*
commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base64.class : [1.5.RC1, 1.13)
commons-codec-1.11.jar *<=* org/apache/commons/codec/net/BCodec.class : [1.5.RC1, 1.13)
commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base32.class : [1.5.RC1, 1.13)
*Advisories*
Project: https://issues.apache.org/jira/browse/CODEC-134
*Solution*
Please update commons-codec to 1.13 to fix this issue.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@hc.apache.org
For additional commands, e-mail: dev-help@hc.apache.org