You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@uima.apache.org by cw...@apache.org on 2019/05/01 14:24:09 UTC
svn commit: r1858489 - in /uima/site/trunk/uima-website:
docs/security_report.html xdocs/security_report.xml
Author: cwiklik
Date: Wed May 1 14:24:08 2019
New Revision: 1858489
URL: http://svn.apache.org/viewvc?rev=1858489&view=rev
Log:
Updated security_report with ducc changes to address CVE-2018-8035
Modified:
uima/site/trunk/uima-website/docs/security_report.html
uima/site/trunk/uima-website/xdocs/security_report.xml
Modified: uima/site/trunk/uima-website/docs/security_report.html
URL: http://svn.apache.org/viewvc/uima/site/trunk/uima-website/docs/security_report.html?rev=1858489&r1=1858488&r2=1858489&view=diff
==============================================================================
--- uima/site/trunk/uima-website/docs/security_report.html (original)
+++ uima/site/trunk/uima-website/docs/security_report.html Wed May 1 14:24:08 2019
@@ -231,6 +231,33 @@
<blockquote class="sectionBody">
<p>Here are the known Security Vulnerabilities for Apache UIMA, listed by CVE number.</p>
<ul>
+ <li id="CVE-2018-8035">
+<pre>CVE-2018-8035: Apache UIMA DUCC webserver cross-site scripting (XSS) vulnerability due to unintended execution of user supplied javascript code.
+
+Severity: Important
+
+Vendor:
+The Apache Software Foundation
+
+Versions Affected:
+ - Apache UIMA DUCC releases including and prior to 2.2.2
+
+Description.
+The details of this vulnerability were reported to the Apache UIMA Private mailing list.
+
+This vulnerability relates to the user's browser processing of DUCC web page input data.
+
+The javascript comprising Apache UIMA DUCC which runs in the user's browser does not sufficiently filter user supplied inputs, which may result in unintended execution of user supplied javascript code.
+
+Mitigation:
+Users are advised to upgrade these UIMA components to the following levels:
+ - Apache UIMA DUCC: upgrade to 3.0.0 or later
+
+Credit: Marshall Schor
+</pre>
+</li>
+</ul>
+ <ul>
<li id="CVE-2017-15691">
<pre>CVE-2017-15691: Apache UIMA XML external entity expansion (XXE) attack exposure
Modified: uima/site/trunk/uima-website/xdocs/security_report.xml
URL: http://svn.apache.org/viewvc/uima/site/trunk/uima-website/xdocs/security_report.xml?rev=1858489&r1=1858488&r2=1858489&view=diff
==============================================================================
--- uima/site/trunk/uima-website/xdocs/security_report.xml (original)
+++ uima/site/trunk/uima-website/xdocs/security_report.xml Wed May 1 14:24:08 2019
@@ -30,6 +30,36 @@ under the License.
<section name="Security Update List by CVEs">
<p>Here are the known Security Vulnerabilities for Apache UIMA, listed by CVE number.</p>
+
+<ul>
+ <li id="CVE-2018-8035">
+<pre>CVE-2018-8035: Apache UIMA DUCC webserver cross-site scripting (XSS) vulnerability due to unintended execution of user supplied javascript code.
+
+Severity: Important
+
+Vendor:
+The Apache Software Foundation
+
+Versions Affected:
+ - Apache UIMA DUCC releases including and prior to 2.2.2
+
+Description.
+The details of this vulnerability were reported to the Apache UIMA Private mailing list.
+
+This vulnerability relates to the user's browser processing of DUCC web page input data.
+
+The javascript comprising Apache UIMA DUCC which runs in the user's browser does not sufficiently filter user supplied inputs, which may result in unintended execution of user supplied javascript code.
+
+Mitigation:
+Users are advised to upgrade these UIMA components to the following levels:
+ - Apache UIMA DUCC: upgrade to 3.0.0 or later
+
+Credit: Marshall Schor
+</pre>
+</li>
+</ul>
+
+
<ul>
<li id="CVE-2017-15691">
<pre>CVE-2017-15691: Apache UIMA XML external entity expansion (XXE) attack exposure