[ 
https://issues.apache.org/jira/browse/AIRAVATA-2297?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15801399#comment-15801399
 ] 

ASF subversion and git services commented on AIRAVATA-2297:
-----------------------------------------------------------

Commit 166f18a9bfaef8aa8d8c1f436034c99c77c18e19 in airavata-php-gateway's 
branch refs/heads/develop from [~marcuschristie]
[ https://git-wip-us.apache.org/repos/asf?p=airavata-php-gateway.git;h=166f18a ]

AIRAVATA-2297 Upgrade PHPMailer and swiftmailer

Note: for the upgrade to take effect, `composer update` must be run in
an existing PGA installation.


> Upgrade PHPMailer to >= 5.2.20 to address CVE-2016-10045
> --------------------------------------------------------
>
>                 Key: AIRAVATA-2297
>                 URL: https://issues.apache.org/jira/browse/AIRAVATA-2297
>             Project: Airavata
>          Issue Type: Bug
>          Components: PGA PHP Web Gateway
>            Reporter: Marcus Christie
>            Assignee: Marcus Christie
>            Priority: Critical
>             Fix For: 0.17
>
>
> PGA uses [PHPMailer version 
> 5.2.13|https://github.com/apache/airavata-php-gateway/blob/8a7330c205d9e37bf8fbf9a062bdcf24d44d95c1/composer.json#L9].
>  Looks like a new release, [5.2.20| 
> https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20], fixes the 
> security exploit mentioned in [this security 
> bulletin|https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html].



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to