[
https://issues.apache.org/jira/browse/JXPATH-200?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17616741#comment-17616741
]
ChenYuwang commented on JXPATH-200:
-----------------------------------
Looking forward to the community to fix this vulnerability as soon as possible
> CVE-2022-41852 Use of Externally-Controlled Input to Select Classes or Code
> ('Unsafe Reflection')
> -------------------------------------------------------------------------------------------------
>
> Key: JXPATH-200
> URL: https://issues.apache.org/jira/browse/JXPATH-200
> Project: Commons JXPath
> Issue Type: Bug
> Affects Versions: 1.3
> Reporter: Nicolò Mendola
> Priority: Blocker
> Fix For: 1.4
>
>
> There is a CVE detected in jxpath 1.3. and prior. Could you take a look?
> Use of Externally-Controlled Input to Select Classes or Code ('Unsafe
> Reflection')
> [https://avd.aquasec.com/nvd/2022/cve-2022-41852/]
> Best Regards
--
This message was sent by Atlassian Jira
(v8.20.10#820010)