You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@myfaces.apache.org by "Leonardo Uribe (JIRA)" <de...@myfaces.apache.org> on 2016/02/19 06:52:18 UTC
[jira] [Commented] (MYFACES-4032) upgrade common-beanutils to 1.9.2
to resolve security vulnerability
[ https://issues.apache.org/jira/browse/MYFACES-4032?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15153753#comment-15153753 ]
Leonardo Uribe commented on MYFACES-4032:
-----------------------------------------
MyFaces uses this library with commons-digester to read xml files like faces-config.xml, which is done at startup . In my understanding this is not a problem, because the issue mentioned in the CVE is related to the use of commons-beanutils to read a request values and then do some processing. The problem is more related to struts than to beanutils. Anyway I'll check that.
> upgrade common-beanutils to 1.9.2 to resolve security vulnerability
> -------------------------------------------------------------------
>
> Key: MYFACES-4032
> URL: https://issues.apache.org/jira/browse/MYFACES-4032
> Project: MyFaces Core
> Issue Type: Bug
> Affects Versions: 2.2.8, 2.2.9
> Reporter: Santosh P
> Priority: Critical
>
> Hello,
> We have been reported for security vulnerable library common-beanutils-1.8.3. Myfaces-impl is dependent on this library and which is downloaded to application WEB-INF/lib while packaging.
> Clould you please upgrade to latest release 1.9.2 of common-beanutils and make use of 'SuppressPropertiesBeanIntrospector'.
> More details can be found here:
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
> http://openwall.com/lists/oss-security/2014/06/15/10
> http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt
> https://issues.apache.org/jira/browse/BEANUTILS-463
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)