[ANNOUNCEMENT] Apache Commons VFS Project 2.4.1

2019-08-15 Thread Gary Gregory
The Apache Commons VFS Project team is pleased to announce the release of
Apache Commons VFS Project 2.4.1-SNAPSHOT.

Apache Commons VFS is a Virtual File System library.

New features and bug fix release.

Changes in this version include:

Fixed Bugs:
o VFS-725:  [Local]
org.apache.commons.vfs2.FileContent.getLastModifiedTime() is losing
milliseconds (always ends in 000). Thanks to Gary Gregory.
o VFS-724:  FileContent#getByteArray() throws IllegalArgumentException:
Buffer size <= 0 when file size is 0. Thanks to William R, Gary Gregory.
o   Javadoc fixes. Thanks to Gary Gregory.


Historical list of changes:
http://commons.apache.org/proper/commons-vfs/changes-report.html

For complete information on Apache Commons VFS Project, including
instructions on how to submit bug reports,
patches, or suggestions for improvement, see the Apache Apache Commons VFS
Project website:

Visit http://commons.apache.org/proper/commons-vfs/

Download it from
http://commons.apache.org/proper/commons-vfs/download_vfs.cgi

Gary Gregory
On behalf of the Apache Commons Team


[ANNOUNCEMENT] Apache HTTP Server 2.4.41 Released

2019-08-15 Thread Daniel Ruggeri
Apache HTTP Server 2.4.41 Released

   August 14, 2019

   The Apache Software Foundation and the Apache HTTP Server Project
   are pleased to announce the release of version 2.4.41 of the Apache
   HTTP Server ("Apache").  This version of Apache is our latest GA
   release of the new generation 2.4.x branch of Apache HTTPD and
   represents fifteen years of innovation by the project, and is
   recommended over all previous releases. This release of Apache is
   a security and bug fix release.

   We consider this release to be the best version of Apache available, and
   encourage users of all prior versions to upgrade.

   Apache HTTP Server 2.4.41 is available for download from:

 https://httpd.apache.org/download.cgi

   Apache 2.4 offers numerous enhancements, improvements, and performance
   boosts over the 2.2 codebase.  For an overview of new features
   introduced since 2.4 please see:

 https://httpd.apache.org/docs/trunk/new_features_2_4.html

   Please see the CHANGES_2.4 file, linked from the download page, for a
   full list of changes. A condensed list, CHANGES_2.4.41 includes only
   those changes introduced since the prior 2.4 release.  A summary of all 
   of the security vulnerabilities addressed in this and earlier releases 
   is available:

 https://httpd.apache.org/security/vulnerabilities_24.html

   This release requires the Apache Portable Runtime (APR), minimum
   version 1.5.x, and APR-Util, minimum version 1.5.x. Some features may
   require the 1.6.x version of both APR and APR-Util. The APR libraries
   must be upgraded for all features of httpd to operate correctly.

   This release builds on and extends the Apache 2.2 API.  Modules written
   for Apache 2.2 will need to be recompiled in order to run with Apache
   2.4, and require minimal or no source code changes.

 https://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING

   When upgrading or installing this version of Apache, please bear in mind
   that if you intend to use Apache with one of the threaded MPMs (other
   than the Prefork MPM), you must ensure that any modules you will be
   using (and the libraries they depend on) are thread-safe.

   Please note the 2.2.x branch has now passed the end of life at the Apache
   HTTP Server project and no further activity will occur including security
   patches.  Users must promptly complete their transitions to this 2.4.x
   release of httpd to benefit from further bug fixes or new features.



[ANN] [SECURITY] Corrected affected version ranges in historic Apache,Struts security bulletins and CVE entries

2019-08-15 Thread Rene Gielen
The Apache Struts Security Team would like to announce that a number of
historic Struts Security Bulletins [1] and related CVE database entries
contained incorrect affected release version ranges.

The issue was reported by Christopher Fearon and the Black Duck Research
Team within the Synopsys Cybersecurity Research Center. The reporting
entity conducted thorough investigations on this matter, leading to a
report to the Apache Struts Security Team. The Apache Struts Security
Team worked with the reporters to cross-check said issues and map them
to affected Apache Struts General Availability (GA) releases.

This effort led to the issue of Struts Security Bulletin S2-058,
referencing 15 historic Struts Security Bulletins and respective CVE
entries [2] that have been updated to reflect corrections in affected GA
version ranges as well as minimum GA versions to contain appropriate
fixes for the issues at hand.

The full Security Bulletin can be found here:
https://cwiki.apache.org/confluence/display/WW/S2-058

The Struts Security Team stresses that while the reporters reference
more affected issues and resulting affected version ranges, the Struts
Security Bulletins only cover GA versions designated for production use.
This led to less corrected Security Bulletins and CVE entries [2]
compared to the number of covered issues in the original report.

It is very important to understand that while the individual listed
bulletins contain updated minimum fix versions, it is strongly
recommended to update to the versions recommended by the latest Security
Bulletin, which is S2-057 [3] by the time of this announcement.
Following this advice, the recommended minimum Struts versions to
operate in production are Struts 2.3.35 or Struts 2.5.17.

The Apache Struts Security Team would like to thank the reporters for
their efforts and their practice of responsible disclosure, as well as
their help while investigating the report and coordinating public
disclosure.

[1] https://cwiki.apache.org/confluence/display/WW/Security+Bulletins
[2] https://github.com/CVEProject/cvelist/pull/2423/files
[3] https://cwiki.apache.org/confluence/display/WW/S2-057

-- 
René Gielen
http://twitter.com/rgielen


[SECURITY] CVE-2019-10086. Apache Commons Beanutils does not suppresses the class property in PropertyUtilsBean by default.

2019-08-15 Thread Rob Tompkins
CVE-2019-10086. Apache Commons Beanutils does not suppresses the class property 
in PropertyUtilsBean by default.

Severity: Medium

Vendor: The Apache Software Foundation

Versions Affected: commons-beanutils-1.9.3 and earlier

Description: A special BeanIntrospector class was added in version 1.9.2.
This can be used to stop attackers from using the class property of
Java objects to get access to the classloader.
However this protection was not enabled by default.
PropertyUtilsBean (and consequently BeanUtilsBean) now disallows class
level property access by default, thus protecting against
CVE-2014-0114.

Mitigation: 1.X users should migrate to 1.9.4.

Credit: This was discovered by Melloware (https://melloware.com/).

Example:

/**
 * Example displaying the new default behaviour such that
 * it is not possible to access class level properties utilizing the
 * BeanUtilsBean, which in turn utilizes the PropertyUtilsBean.
 */
public void testSuppressClassPropertyByDefault() throws Exception {
final BeanUtilsBean bub = new BeanUtilsBean();
final AlphaBean bean = new AlphaBean();
try {
bub.getProperty(bean, "class");
fail("Could access class property!");
} catch (final NoSuchMethodException ex) {
// ok
}
}

/**
 * Example showing how by which one would use to revert to the 
 * behaviour prior to the 1.9.4 release where class level properties were 
accessible by
 * the BeanUtilsBean and the PropertyUtilsBean.
 */
public void testAllowAccessToClassProperty() throws Exception {
final BeanUtilsBean bub = new BeanUtilsBean();

bub.getPropertyUtils().removeBeanIntrospector(SuppressPropertiesBeanIntrospector.SUPPRESS_CLASS);
final AlphaBean bean = new AlphaBean();
String result = bub.getProperty(bean, "class");
assertEquals("Class property should have been accessed", "class 
org.apache.commons.beanutils2.AlphaBean", result);
}

References.
[1] https://issues.apache.org/jira/browse/BEANUTILS-520
[2] http://commons.apache.org/proper/commons-beanutils/

[ANNOUNCE] Commons BeanUtils 1.9.4 Released

2019-08-15 Thread Rob Tompkins
The Apache Commons Team is pleased to announce the release of
Apache Commons BeanUtils 1.9.4.

The Apache Commons BeanUtils open source software library provides 
easy-to-use wrappers around the Java reflection and introspection APIs.

Source and binary distributions are available for download from the Apache
Commons download site:
  http://commons.apache.org/proper/commons-beanutils/download_beanutils.cgi

When downloading, please verify signatures using the KEYS file available at
the above location when downloading the release.

Alternatively the release can be pulled via maven:
  commons-beanutils
  commons-beanutils
  1.9.4

The release notes can be reviewed at:
  http://www.apache.org/dist/commons/beanutils/RELEASE-NOTES.txt

For complete information on Commons BeanUtils, including instructions on how to
submit bug reports, patches, or suggestions for improvement, see the Apache
Commons BeanUtils website:

http://commons.apache.org/proper/commons-beanutils/

Best regards,
Rob Tompkins
on behalf of the Apache Commons community