You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@jena.apache.org by "rvesse (via GitHub)" <gi...@apache.org> on 2023/04/26 10:25:58 UTC
[GitHub] [jena-site] rvesse commented on a diff in pull request #157: Advisory and doc updates for CVE-2023-22665
rvesse commented on code in PR #157:
URL: https://github.com/apache/jena-site/pull/157#discussion_r1177674985
##########
source/about_jena/security-advisories.md:
##########
@@ -50,9 +50,23 @@ policy above we advise users to always utilise the latest Jena release available
Please refer to the individual CVE links for further details and mitigations.
+## CVE-2023-22665 - Exposure of arbitrary execution in script engine expressions.
+
+[CVE-2023](https://www.cve.org/CVERecord?id=CVE-2023-22665) affects Jena ?? through 4.7.0 and relates to the [Javascript
Review Comment:
- [ ] Need to go back through release notes to see when this feature was introduced
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: dev-unsubscribe@jena.apache.org
For queries about this service, please contact Infrastructure at:
users@infra.apache.org