Nagesh Arkalgud created HTTPCLIENT-2018:
-------------------------------------------

             Summary: Improper input validation vulnerability in commons-codec 
version used by latest HttpClient
                 Key: HTTPCLIENT-2018
                 URL: https://issues.apache.org/jira/browse/HTTPCLIENT-2018
             Project: HttpComponents HttpClient
          Issue Type: Bug
          Components: HttpClient (async), HttpClient (classic)
    Affects Versions: 5.0 Beta6, 4.5.10
            Reporter: Nagesh Arkalgud


*Explanation*

The Apache {{commons-codec}} package contains an Improper Input Validation 
vulnerability. The {{decode()}} method in the {{Base32}}, {{Base64}}, and 
{{BCodec}} classes fails to reject malformed Base32 and Base64 encoded strings 
and consequently decodes them into arbitrary values. A remote attacker can 
leverage this vulnerability to potentially tunnel additional information via 
seemingly legitimate Base32 or Base64 encoded strings.

 

 

*Root Cause*

commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base64.class : 
[1.5.RC1, 1.13)
commons-codec-1.11.jar *<=* org/apache/commons/codec/net/BCodec.class : 
[1.5.RC1, 1.13)
commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base32.class : 
[1.5.RC1, 1.13)

*Advisories*

Project: https://issues.apache.org/jira/browse/CODEC-134

*Solution*

Please update commons-codec to 1.13 to fix this issue.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to