[
https://issues.apache.org/jira/browse/DIGESTER-184?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15154179#comment-15154179
]
Sebb commented on DIGESTER-184:
-------------------------------
There is a work-round - replace the library with the more recent one.
Also, AFAIK exploitation of the issue depends on the application failing to
sanitise input before use.
> upgrade common-beanutils to 1.9.2 to resolve security vulnerability
> -------------------------------------------------------------------
>
> Key: DIGESTER-184
> URL: https://issues.apache.org/jira/browse/DIGESTER-184
> Project: Commons Digester
> Issue Type: Bug
> Affects Versions: 2.1, 3.2
> Reporter: Santosh P
> Priority: Minor
>
> Hello,
> We have been reported for security vulnerable library common-beanutils-1.8.3.
> common-digester is dependent on this library and which is downloaded to
> application WEB-INF/lib while packaging.
> Clould you please upgrade to latest release 1.9.2 of common-beanutils and
> make use of 'SuppressPropertiesBeanIntrospector'.
> More details can be found here:
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
> http://openwall.com/lists/oss-security/2014/06/15/10
> http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt
> https://issues.apache.org/jira/browse/BEANUTILS-463
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)