commons-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Emmanuel Bourg (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (JEXL-223) Apache Commons JEXL Expression Execute Command Vulnerabilitity
Date Fri, 21 Apr 2017 08:00:15 GMT

    [ https://issues.apache.org/jira/browse/JEXL-223?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15978258#comment-15978258
] 

Emmanuel Bourg commented on JEXL-223:
-------------------------------------

I'm not sure to understand, executing untrusted code in a scripting language is dangerous,
that's not really new. The same happens with any implementation of the javax.script API.

> Apache Commons JEXL Expression Execute Command Vulnerabilitity
> --------------------------------------------------------------
>
>                 Key: JEXL-223
>                 URL: https://issues.apache.org/jira/browse/JEXL-223
>             Project: Commons JEXL
>          Issue Type: Bug
>            Reporter: cnbird
>            Priority: Critical
>
> 0x01 Summary
> Apache Commons JEXL Expression Execute Command Vulnerabilitity throught groovy.
> 0x02 POC
> POC Report to Apache Security Email Address security@apache.org.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Mime
View raw message