You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@velocity.apache.org by "Mark Symons (JIRA)" <de...@velocity.apache.org> on 2016/05/07 22:42:12 UTC
[jira] [Created] (VELTOOLS-170) Upgrade beanutils to 1.9.2
Mark Symons created VELTOOLS-170:
------------------------------------
Summary: Upgrade beanutils to 1.9.2
Key: VELTOOLS-170
URL: https://issues.apache.org/jira/browse/VELTOOLS-170
Project: Velocity Tools
Issue Type: Bug
Components: Build
Affects Versions: 2.0
Reporter: Mark Symons
Priority: Critical
Update dependency on commons-beanutils:commons-beanutils to v1.9.2 to mitigate CVE-2014-0114. See BEANUTILS-463 for fix info.
Velocity Tools v2.0 currently uses bean-utils v1.7.0
Whilst the CVE text references beanutils v1.8.0, Black Duck Hub threat analysis have updated affected versions to include 1.7.0.
{quote}
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
{quote}
h5.CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type:
* Allows unauthorized disclosure of information
* Allows unauthorized modification
* Allows disruption of service
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@velocity.apache.org
For additional commands, e-mail: dev-help@velocity.apache.org