[ 
https://issues.apache.org/jira/browse/JEXL-223?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15978258#comment-15978258
 ] 

Emmanuel Bourg commented on JEXL-223:
-------------------------------------

I'm not sure to understand, executing untrusted code in a scripting language is 
dangerous, that's not really new. The same happens with any implementation of 
the javax.script API.

> Apache Commons JEXL Expression Execute Command Vulnerabilitity
> --------------------------------------------------------------
>
>                 Key: JEXL-223
>                 URL: https://issues.apache.org/jira/browse/JEXL-223
>             Project: Commons JEXL
>          Issue Type: Bug
>            Reporter: cnbird
>            Priority: Critical
>
> 0x01 Summary
> Apache Commons JEXL Expression Execute Command Vulnerabilitity throught 
> groovy.
> 0x02 POC
> POC Report to Apache Security Email Address secur...@apache.org.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to