[
https://issues.apache.org/jira/browse/HTTPCLIENT-2072?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17263794#comment-17263794
]
Stephanie Wang commented on HTTPCLIENT-2072:
--------------------------------------------
Hi, this issue is still there for version 4.5.13 – it is still using
commons-codec:commons-codec:jar:1.11.
This is currently a major blocker for our users. Is there an estimate on when
this can be fixed? I am happy to contribute if no one has committed a fix.
Thanks!
> Security vulnerability with apache commons-code 1.11, upgrade to 1.13
> ---------------------------------------------------------------------
>
> Key: HTTPCLIENT-2072
> URL: https://issues.apache.org/jira/browse/HTTPCLIENT-2072
> Project: HttpComponents HttpClient
> Issue Type: Bug
> Components: HttpClient (classic)
> Affects Versions: 4.5.12
> Reporter: James Holland
> Priority: Major
>
> Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to
> information disclosure due to Improper Input validation.
> See
> https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113
>
>
>
--
This message was sent by Atlassian Jira
(v8.3.4#803005)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]