Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bump commons-io due to security vulnerabilities in that library #26

Merged
merged 1 commit into from
May 4, 2018
Merged

bump commons-io due to security vulnerabilities in that library #26

merged 1 commit into from
May 4, 2018

Conversation

ryber
Copy link
Contributor

@ryber ryber commented May 4, 2018

Hello, this just bumps the commons-IO version. I have a black duck scan that identified two vulnerabilities in this version of IO:

Apache Commons IO contains a flaw that allows traversing outside of a restricted path. The issue is due to FileNameUtils.normalize not properly sanitizing user input, specifically path traversal style attacks (e.g. '../'). With a specially crafted request, a remote attacker can disclose arbitrary files.

and

Apache Commons IO contains a flaw that is due to the program failing to restrict which class can be serialized. This may allow a remote attacker to execute arbitrary Java code via deserialization methods.

The version I bumped it to has no known vulnerabilities (for now)

@lbalmaceda lbalmaceda self-requested a review May 4, 2018 20:25
Copy link
Contributor

@lbalmaceda lbalmaceda left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks!

@lbalmaceda lbalmaceda merged commit aa771ad into auth0:master May 4, 2018
@ryber ryber deleted the bump-commons branch May 4, 2018 20:56
@lbalmaceda lbalmaceda added this to the 0.5.0 milestone Jun 12, 2018
@Jaxsun Jaxsun mentioned this pull request Aug 20, 2020
5 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants