[ 
https://issues.apache.org/jira/browse/MSHARED-961?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Elliotte Rusty Harold updated MSHARED-961:
------------------------------------------
    Summary: Upgrade BeanShell to 2.0b6  (was: Upgrde BeanShell to 2.0b6)

> Upgrade BeanShell to 2.0b6
> --------------------------
>
>                 Key: MSHARED-961
>                 URL: https://issues.apache.org/jira/browse/MSHARED-961
>             Project: Maven Shared Components
>          Issue Type: Dependency upgrade
>          Components: maven-script-interpreter
>            Reporter: Sylwester Lachiewicz
>            Assignee: Sylwester Lachiewicz
>            Priority: Major
>             Fix For: maven-script-interpreter-1.3
>
>
> Update to latest available Beanshel version 2.0b6
> [https://github.com/beanshell/beanshell/releases/tag/2.0b6]
> BeanShell 2.0b6 is a security update that is functionally equivalent to the 
> previous version 2.0b5.
> No other functionality has changed since 2.0b5, but this is a *recommended 
> update* for all BeanShell users, as it fixes a remote code execution 
> vulnerability.
> h2. Security fix (CVE-2016-2510)
> This release fixes a remote code execution vulnerability that was identified 
> in BeanShell by [Alvaro Muñoz|https://twitter.com/pwntester] and [Christian 
> Schneider|https://twitter.com/cschneider4711]. The BeanShell team would like 
> to thank them for their help and contributions to this fix!
> An application that includes BeanShell on the classpath may be vulnerable if 
> another part of the application uses [Java 
> serialization|https://docs.oracle.com/javase/tutorial/jndi/objects/serial.html]
>  or [XStream|http://x-stream.github.io/] to deserialize data from an 
> untrusted source.
> A vulnerable application could be exploited for remote code execution, 
> including executing arbitrary shell commands.
> This update fixes the vulnerability in BeanShell, but it is worth noting that 
> applications doing such deserialization might still be insecure through other 
> libraries. It is recommended that application developers take further 
> measures such as using a restricted class loader when deserializing. See 
> notes on [Java serialization 
> security|http://www.oracle.com/technetwork/java/seccodeguide-139067.html#8], 
> [XStream security|http://x-stream.github.io/security.html] and [How to secure 
> deserialization from untrusted input without using encryption or 
> sealing|http://www.ibm.com/developerworks/library/se-lookahead/].
> A [MITRE CVE number|http://cve.mitre.org/cve/] has been reserved: 
> [CVE-2016-2510|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2510]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to