You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@commons.apache.org by "Sebb (JIRA)" <ji...@apache.org> on 2016/02/19 13:49:18 UTC
[jira] [Commented] (DIGESTER-184) upgrade common-beanutils to 1.9.2
to resolve security vulnerability
[ https://issues.apache.org/jira/browse/DIGESTER-184?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15154179#comment-15154179 ]
Sebb commented on DIGESTER-184:
-------------------------------
There is a work-round - replace the library with the more recent one.
Also, AFAIK exploitation of the issue depends on the application failing to sanitise input before use.
> upgrade common-beanutils to 1.9.2 to resolve security vulnerability
> -------------------------------------------------------------------
>
> Key: DIGESTER-184
> URL: https://issues.apache.org/jira/browse/DIGESTER-184
> Project: Commons Digester
> Issue Type: Bug
> Affects Versions: 2.1, 3.2
> Reporter: Santosh P
> Priority: Minor
>
> Hello,
> We have been reported for security vulnerable library common-beanutils-1.8.3. common-digester is dependent on this library and which is downloaded to application WEB-INF/lib while packaging.
> Clould you please upgrade to latest release 1.9.2 of common-beanutils and make use of 'SuppressPropertiesBeanIntrospector'.
> More details can be found here:
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
> http://openwall.com/lists/oss-security/2014/06/15/10
> http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt
> https://issues.apache.org/jira/browse/BEANUTILS-463
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)