[ 
https://issues.apache.org/jira/browse/JAMES-2570?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16660351#comment-16660351
 ] 

ASF GitHub Bot commented on JAMES-2570:
---------------------------------------

Github user trantienduchn closed the pull request at:

    https://github.com/apache/james-project/pull/138


> Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0
> ----------------------------------------------------
>
>                 Key: JAMES-2570
>                 URL: https://issues.apache.org/jira/browse/JAMES-2570
>             Project: James Server
>          Issue Type: Improvement
>            Reporter: Trần Tiến Đức
>            Priority: Major
>
> h5. CVE-2018-9159 [More 
> information|https://nvd.nist.gov/vuln/detail/CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159)
> moderate severity
> *Vulnerable versions:* < 2.7.2
> *Patched version:* 2.7.2
> In Spark before 2.7.2, a remote attacker can read unintended static files via 
> various representations of absolute or relative pathnames, as demonstrated by 
> file: URLs and directory traversal sequences. NOTE: this product is unrelated 
> to Ignite Realtime Spark.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org
For additional commands, e-mail: server-dev-h...@james.apache.org

Reply via email to