[
https://issues.apache.org/jira/browse/MYFACES-4032?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15153753#comment-15153753
]
Leonardo Uribe commented on MYFACES-4032:
-----------------------------------------
MyFaces uses this library with commons-digester to read xml files like
faces-config.xml, which is done at startup . In my understanding this is not a
problem, because the issue mentioned in the CVE is related to the use of
commons-beanutils to read a request values and then do some processing. The
problem is more related to struts than to beanutils. Anyway I'll check that.
> upgrade common-beanutils to 1.9.2 to resolve security vulnerability
> -------------------------------------------------------------------
>
> Key: MYFACES-4032
> URL: https://issues.apache.org/jira/browse/MYFACES-4032
> Project: MyFaces Core
> Issue Type: Bug
> Affects Versions: 2.2.8, 2.2.9
> Reporter: Santosh P
> Priority: Critical
>
> Hello,
> We have been reported for security vulnerable library common-beanutils-1.8.3.
> Myfaces-impl is dependent on this library and which is downloaded to
> application WEB-INF/lib while packaging.
> Clould you please upgrade to latest release 1.9.2 of common-beanutils and
> make use of 'SuppressPropertiesBeanIntrospector'.
> More details can be found here:
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
> http://openwall.com/lists/oss-security/2014/06/15/10
> http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt
> https://issues.apache.org/jira/browse/BEANUTILS-463
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)