You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@velocity.apache.org by "Mark Symons (JIRA)" <de...@velocity.apache.org> on 2016/05/07 22:42:12 UTC

[jira] [Created] (VELTOOLS-170) Upgrade beanutils to 1.9.2

Mark Symons created VELTOOLS-170:
------------------------------------

             Summary: Upgrade beanutils to 1.9.2
                 Key: VELTOOLS-170
                 URL: https://issues.apache.org/jira/browse/VELTOOLS-170
             Project: Velocity Tools
          Issue Type: Bug
          Components: Build
    Affects Versions: 2.0
            Reporter: Mark Symons
            Priority: Critical


Update dependency on commons-beanutils:commons-beanutils to v1.9.2 to mitigate CVE-2014-0114.   See BEANUTILS-463 for fix info.

Velocity Tools v2.0 currently uses bean-utils v1.7.0

Whilst the CVE text references beanutils v1.8.0,  Black Duck Hub threat analysis have updated affected versions to include 1.7.0.

{quote}
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
{quote}

h5.CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type:
* Allows unauthorized disclosure of information
* Allows unauthorized modification
* Allows disruption of service 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@velocity.apache.org
For additional commands, e-mail: dev-help@velocity.apache.org