[ https://issues.apache.org/jira/browse/JEXL-223?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15978258#comment-15978258 ]
Emmanuel Bourg commented on JEXL-223: ------------------------------------- I'm not sure to understand, executing untrusted code in a scripting language is dangerous, that's not really new. The same happens with any implementation of the javax.script API. > Apache Commons JEXL Expression Execute Command Vulnerabilitity > -------------------------------------------------------------- > > Key: JEXL-223 > URL: https://issues.apache.org/jira/browse/JEXL-223 > Project: Commons JEXL > Issue Type: Bug > Reporter: cnbird > Priority: Critical > > 0x01 Summary > Apache Commons JEXL Expression Execute Command Vulnerabilitity throught > groovy. > 0x02 POC > POC Report to Apache Security Email Address secur...@apache.org. -- This message was sent by Atlassian JIRA (v6.3.15#6346)