[
https://issues.apache.org/jira/browse/TINKERPOP-2032?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16612055#comment-16612055
]
ASF GitHub Bot commented on TINKERPOP-2032:
-------------------------------------------
Github user spmallette commented on the issue:
https://github.com/apache/tinkerpop/pull/930
I felt like I tried this once before and I got all kinda hella build
failures....maybe I'm mistaken. Seems to build now. I would try to merge
forward to the other branches and see what happens there - assuming it all
builds down the line then VOTE +1 - thanks for monitoring this kind of stuff.
> Update jython-standalone
> ------------------------
>
> Key: TINKERPOP-2032
> URL: https://issues.apache.org/jira/browse/TINKERPOP-2032
> Project: TinkerPop
> Issue Type: Bug
> Components: python
> Affects Versions: 3.3.3, 3.2.9
> Reporter: Robert Dale
> Assignee: Robert Dale
> Priority: Major
>
> [https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451]
> Overview
> org.python:jython-standalone Affected versions of this package are
> vulnerable to Arbitrary Code Execution by sending a serialized function to
> the deserializer, which in turn will execute the code.
> References
> [ CVE|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000]
> [Jython Bug Report|http://bugs.jython.org/issue2454]
> [ Fix Commit|https://hg.python.org/jython/rev/d06e29d100c0]
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)