Re: CVE-2023-32200

2023-07-20 Thread Brandon Sara
Awesome! Thanks for the quick response > On Jul 20, 2023, at 11:13 AM, Andy Seaborne wrote: > > "EXTERNAL EMAIL" – Always use caution when reviewing mail from outside of the > organization. > > > > On 20/07/2023 17:18, Brandon Sara wrote: >> I just came

Re: CVE-2023-32200

2023-07-20 Thread Andy Seaborne
On 20/07/2023 17:18, Brandon Sara wrote: I just came across CVE-2023-32200 and was wondering, is it different than CVE-2023-22665 and, if so, how is it different? Jena 4.8.0 addresses CVE-2023-22665 by requiring the Java system property "jena:scripting" to enable scripting.

CVE-2023-32200

2023-07-20 Thread Brandon Sara
I just came across CVE-2023-32200 and was wondering, is it different than CVE-2023-22665 and, if so, how is it different? No PHI in Email: PointClickCare and Collective Medical, A PointClickCare Company, policies prohibit sending protected health information (PHI) by email, which may violate

Re: CVE-2023-32200: Apache Jena: Exposure of execution in script engine expressions.

2023-07-11 Thread Laura Morales
Is there a demonstration of the exploit? I'd like to try it > Sent: Tuesday, July 11, 2023 at 6:44 PM > From: "Andy Seaborne" > To: annou...@apache.org, users@jena.apache.org > Subject: CVE-2023-32200: Apache Jena: Exposure of execution in script engine > expressions

CVE-2023-32200: Apache Jena: Exposure of execution in script engine expressions.

2023-07-11 Thread Andy Seaborne
: from 3.7.0 through 4.8.0. Credit: s3gundo of Alibaba (reporter) References: https://www.cve.org/CVERecord?id=CVE-2023-22665 https://jena.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-32200