commons-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Bruno P. Kinoshita (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (JEXL-223) Apache Commons JEXL Expression Execute Command Vulnerabilitity
Date Mon, 24 Apr 2017 10:52:04 GMT

    [ https://issues.apache.org/jira/browse/JEXL-223?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15980992#comment-15980992
] 

Bruno P. Kinoshita commented on JEXL-223:
-----------------------------------------

>Maybe the docs should make it clearer that JEXL does not (and cannot in general) sanitise
user input.

+1

> Apache Commons JEXL Expression Execute Command Vulnerabilitity
> --------------------------------------------------------------
>
>                 Key: JEXL-223
>                 URL: https://issues.apache.org/jira/browse/JEXL-223
>             Project: Commons JEXL
>          Issue Type: Bug
>            Reporter: cnbird
>            Priority: Critical
>
> 0x01 Summary
> Apache Commons JEXL Expression Execute Command Vulnerabilitity throught groovy.
> 0x02 POC
> POC Report to Apache Security Email Address security@apache.org.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Mime
View raw message