You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ranger.apache.org by "Madhan Neethiraj (Jira)" <ji...@apache.org> on 2022/10/31 21:02:00 UTC
[jira] [Assigned] (RANGER-3956) Upgrade Commons Text to 1.10.0
[ https://issues.apache.org/jira/browse/RANGER-3956?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Madhan Neethiraj reassigned RANGER-3956:
----------------------------------------
Assignee: Madhan Neethiraj
> Upgrade Commons Text to 1.10.0
> ------------------------------
>
> Key: RANGER-3956
> URL: https://issues.apache.org/jira/browse/RANGER-3956
> Project: Ranger
> Issue Type: Bug
> Components: Ranger
> Reporter: Madhan Neethiraj
> Assignee: Madhan Neethiraj
> Priority: Critical
>
> Apache Commons Text versions prior to 1.10.0 are vulnerable to [CVE-2022-42889|https://nvd.nist.gov/vuln/detail/CVE-2022-42889], which involves potential script execution when processing untrusted input using {{{}StringLookup{}}}. Direct and transitive references to Apache Commons Text prior to 1.10.0 should be upgraded to avoid the default interpolation behavior.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)