You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@myfaces.apache.org by "Leonardo Uribe (JIRA)" <de...@myfaces.apache.org> on 2016/02/19 06:52:18 UTC

[jira] [Commented] (MYFACES-4032) upgrade common-beanutils to 1.9.2 to resolve security vulnerability

    [ https://issues.apache.org/jira/browse/MYFACES-4032?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15153753#comment-15153753 ] 

Leonardo Uribe commented on MYFACES-4032:
-----------------------------------------

MyFaces uses this library with commons-digester to read xml files like faces-config.xml, which is done at startup . In my understanding this is not a problem, because the issue mentioned in the CVE is related to the use of commons-beanutils to read a request values and then do some processing. The problem is more related to struts than to beanutils. Anyway I'll check that. 

> upgrade common-beanutils to 1.9.2 to resolve security vulnerability
> -------------------------------------------------------------------
>
>                 Key: MYFACES-4032
>                 URL: https://issues.apache.org/jira/browse/MYFACES-4032
>             Project: MyFaces Core
>          Issue Type: Bug
>    Affects Versions: 2.2.8, 2.2.9
>            Reporter: Santosh P
>            Priority: Critical
>
> Hello,
> We have been reported for security vulnerable library common-beanutils-1.8.3. Myfaces-impl is dependent on this library and which is downloaded to application WEB-INF/lib while packaging. 
> Clould you please upgrade to latest release 1.9.2 of common-beanutils and make use of 'SuppressPropertiesBeanIntrospector'.
> More details can be found here:
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
> http://openwall.com/lists/oss-security/2014/06/15/10
> http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt
> https://issues.apache.org/jira/browse/BEANUTILS-463



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)