You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@drill.apache.org by "ASF GitHub Bot (Jira)" <ji...@apache.org> on 2021/04/27 01:41:00 UTC

[jira] [Commented] (DRILL-7910) Bumps commons-io from 2.4 to 2.7

    [ https://issues.apache.org/jira/browse/DRILL-7910?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17332831#comment-17332831 ] 

ASF GitHub Bot commented on DRILL-7910:
---------------------------------------

cgivre opened a new pull request #2205:
URL: https://github.com/apache/drill/pull/2205


   # [DRILL-7910](https://issues.apache.org/jira/browse/DRILL-7910): Bumps commons-io from 2.4 to 2.7
   
   ## Description
   This fix addresses CVE-2021-29425.
   
   In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like `"//../foo"`, or `"\..\foo"`, the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
   Simple solution is to update the library.
   
   ## Documentation
   N/A
   
   ## Testing


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


> Bumps commons-io from 2.4 to 2.7
> --------------------------------
>
>                 Key: DRILL-7910
>                 URL: https://issues.apache.org/jira/browse/DRILL-7910
>             Project: Apache Drill
>          Issue Type: Bug
>    Affects Versions: 1.18.0
>            Reporter: Charles Givre
>            Assignee: Charles Givre
>            Priority: Major
>             Fix For: 1.19.0
>
>
> This fix addresses CVE-2021-29425.
> In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
> Simple solution is to update the library. 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)