[ https://issues.apache.org/jira/browse/JAMES-2570?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16660350#comment-16660350 ]
ASF GitHub Bot commented on JAMES-2570: --------------------------------------- Github user trantienduchn commented on the issue: https://github.com/apache/james-project/pull/138 wrong destination repository. close! > Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0 > ---------------------------------------------------- > > Key: JAMES-2570 > URL: https://issues.apache.org/jira/browse/JAMES-2570 > Project: James Server > Issue Type: Improvement > Reporter: Trần Tiến Đức > Priority: Major > > h5. CVE-2018-9159 [More > information|https://nvd.nist.gov/vuln/detail/CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159) > moderate severity > *Vulnerable versions:* < 2.7.2 > *Patched version:* 2.7.2 > In Spark before 2.7.2, a remote attacker can read unintended static files via > various representations of absolute or relative pathnames, as demonstrated by > file: URLs and directory traversal sequences. NOTE: this product is unrelated > to Ignite Realtime Spark. -- This message was sent by Atlassian JIRA (v7.6.3#76005) --------------------------------------------------------------------- To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org For additional commands, e-mail: server-dev-h...@james.apache.org