[
https://issues.apache.org/jira/browse/HTTPCLIENT-2018?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Nagesh Arkalgud updated HTTPCLIENT-2018:
----------------------------------------
Description:
*Explanation*
The Apache {{commons-codec}} package contains an Improper Input Validation
vulnerability. The {{decode()}} method in the {{Base32}}, {{Base64}}, and
{{BCodec}} classes fails to reject malformed Base32 and Base64 encoded strings
and consequently decodes them into arbitrary values. A remote attacker can
leverage this vulnerability to potentially tunnel additional information via
seemingly legitimate Base32 or Base64 encoded strings.
*Root Cause*
commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base64.class :
[1.5.RC1, 1.13)
commons-codec-1.11.jar *<=* org/apache/commons/codec/net/BCodec.class :
[1.5.RC1, 1.13)
commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base32.class :
[1.5.RC1, 1.13)
*Advisories*
Project: https://issues.apache.org/jira/browse/CODEC-134
*Solution*
Please update commons-codec to 1.13 to fix this issue.
was:
*Explanation*
The Apache {{commons-codec}} package contains an Improper Input Validation
vulnerability. The {{decode()}} method in the {{Base32}}, {{Base64}}, and
{{BCodec}} classes fails to reject malformed Base32 and Base64 encoded strings
and consequently decodes them into arbitrary values. A remote attacker can
leverage this vulnerability to potentially tunnel additional information via
seemingly legitimate Base32 or Base64 encoded strings.
*Root Cause*
commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base64.class :
[1.5.RC1, 1.13)
commons-codec-1.11.jar *<=* org/apache/commons/codec/net/BCodec.class :
[1.5.RC1, 1.13)
commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base32.class :
[1.5.RC1, 1.13)
*Advisories*
Project: https://issues.apache.org/jira/browse/CODEC-134
*Solution*
Please update commons-codec to 1.13 to fix this issue.
> Improper input validation vulnerability in commons-codec version used by
> latest HttpClient
> ------------------------------------------------------------------------------------------
>
> Key: HTTPCLIENT-2018
> URL: https://issues.apache.org/jira/browse/HTTPCLIENT-2018
> Project: HttpComponents HttpClient
> Issue Type: Bug
> Components: HttpClient (async), HttpClient (classic)
> Affects Versions: 4.5.10, 5.0 Beta6
> Reporter: Nagesh Arkalgud
> Priority: Major
> Labels: security
>
> *Explanation*
> The Apache {{commons-codec}} package contains an Improper Input Validation
> vulnerability. The {{decode()}} method in the {{Base32}}, {{Base64}}, and
> {{BCodec}} classes fails to reject malformed Base32 and Base64 encoded
> strings and consequently decodes them into arbitrary values. A remote
> attacker can leverage this vulnerability to potentially tunnel additional
> information via seemingly legitimate Base32 or Base64 encoded strings.
>
> *Root Cause*
> commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base64.class :
> [1.5.RC1, 1.13)
> commons-codec-1.11.jar *<=* org/apache/commons/codec/net/BCodec.class :
> [1.5.RC1, 1.13)
> commons-codec-1.11.jar *<=* org/apache/commons/codec/binary/Base32.class :
> [1.5.RC1, 1.13)
> *Advisories*
> Project: https://issues.apache.org/jira/browse/CODEC-134
> *Solution*
> Please update commons-codec to 1.13 to fix this issue.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]