james-server-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Tellier Benoit (JIRA)" <server-...@james.apache.org>
Subject [jira] [Resolved] (JAMES-2570) Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0
Date Wed, 24 Oct 2018 09:43:00 GMT

     [ https://issues.apache.org/jira/browse/JAMES-2570?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Tellier Benoit resolved JAMES-2570.
-----------------------------------
    Resolution: Fixed

https://github.com/linagora/james-project/pull/1837 solved this.

> Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0
> ----------------------------------------------------
>
>                 Key: JAMES-2570
>                 URL: https://issues.apache.org/jira/browse/JAMES-2570
>             Project: James Server
>          Issue Type: Improvement
>            Reporter: Trần Tiến Đức
>            Priority: Major
>
> h5. CVE-2018-9159 [More information|https://nvd.nist.gov/vuln/detail/CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159)
> moderate severity
> *Vulnerable versions:* < 2.7.2
> *Patched version:* 2.7.2
> In Spark before 2.7.2, a remote attacker can read unintended static files via various
representations of absolute or relative pathnames, as demonstrated by file: URLs and directory
traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscribe@james.apache.org
For additional commands, e-mail: server-dev-help@james.apache.org


Mime
View raw message