[ 
https://issues.apache.org/jira/browse/HTTPCLIENT-2072?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17263794#comment-17263794
 ] 

Stephanie Wang commented on HTTPCLIENT-2072:
--------------------------------------------

Hi, this issue is still there for version 4.5.13 – it is still using 
commons-codec:commons-codec:jar:1.11.

This is currently a major blocker for our users. Is there an estimate on when 
this can be fixed? I am happy to contribute if no one has committed a fix.

Thanks!

> Security vulnerability with apache commons-code 1.11, upgrade to 1.13
> ---------------------------------------------------------------------
>
>                 Key: HTTPCLIENT-2072
>                 URL: https://issues.apache.org/jira/browse/HTTPCLIENT-2072
>             Project: HttpComponents HttpClient
>          Issue Type: Bug
>          Components: HttpClient (classic)
>    Affects Versions: 4.5.12
>            Reporter: James Holland
>            Priority: Major
>
> Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to 
> information disclosure due to Improper Input validation.
> See 
> https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113
>  
>  
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to