[ 
https://issues.apache.org/jira/browse/GOBBLIN-1943?focusedWorklogId=887897&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-887897
 ]

ASF GitHub Bot logged work on GOBBLIN-1943:
-------------------------------------------

                Author: ASF GitHub Bot
            Created on: 30/Oct/23 16:34
            Start Date: 30/Oct/23 16:34
    Worklog Time Spent: 10m 
      Work Description: Will-Lo merged PR #3813:
URL: https://github.com/apache/gobblin/pull/3813




Issue Time Tracking
-------------------

    Worklog Id:     (was: 887897)
    Time Spent: 20m  (was: 10m)

> Bump AWS SDK version to patch security vulnerability
> ----------------------------------------------------
>
>                 Key: GOBBLIN-1943
>                 URL: https://issues.apache.org/jira/browse/GOBBLIN-1943
>             Project: Apache Gobblin
>          Issue Type: Improvement
>            Reporter: William Lo
>            Priority: Major
>          Time Spent: 20m
>  Remaining Estimate: 0h
>
> In AWS Java SDK S3 there is a path traversal vulnerability that gets patched 
> in 1.12.261.
> aws-java-sdk-s3 is vulnerable to path traversal. The vulnerability exists due 
> to the insufficient guard logic used for the download directory in the 
> {{leavesRoot}} function of {{{}TransferManager.java{}}}, allowing an attacker 
> to access files from the S3 bucket that is one level up in the file system by 
> evading the validation logic by adding a UNIX double-dot to the bucket key 
> when the directory name prefix matches the destination director



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to