[ 
https://issues.apache.org/jira/browse/GOBBLIN-1943?focusedWorklogId=887658&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-887658
 ]

ASF GitHub Bot logged work on GOBBLIN-1943:
-------------------------------------------

                Author: ASF GitHub Bot
            Created on: 27/Oct/23 23:11
            Start Date: 27/Oct/23 23:11
    Worklog Time Spent: 10m 
      Work Description: codecov-commenter commented on PR #3813:
URL: https://github.com/apache/gobblin/pull/3813#issuecomment-1783602149

   We're currently processing your upload.  This comment will be updated when 
the results are available.




Issue Time Tracking
-------------------

            Worklog Id:     (was: 887658)
    Remaining Estimate: 0h
            Time Spent: 10m

> Bump AWS SDK version to patch security vulnerability
> ----------------------------------------------------
>
>                 Key: GOBBLIN-1943
>                 URL: https://issues.apache.org/jira/browse/GOBBLIN-1943
>             Project: Apache Gobblin
>          Issue Type: Improvement
>            Reporter: William Lo
>            Priority: Major
>          Time Spent: 10m
>  Remaining Estimate: 0h
>
> In AWS Java SDK S3 there is a path traversal vulnerability that gets patched 
> in 1.12.261.
> aws-java-sdk-s3 is vulnerable to path traversal. The vulnerability exists due 
> to the insufficient guard logic used for the download directory in the 
> {{leavesRoot}} function of {{{}TransferManager.java{}}}, allowing an attacker 
> to access files from the S3 bucket that is one level up in the file system by 
> evading the validation logic by adding a UNIX double-dot to the bucket key 
> when the directory name prefix matches the destination director



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to