[ https://issues.apache.org/jira/browse/SOLR-9053?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15337109#comment-15337109 ]
ASF subversion and git services commented on SOLR-9053: ------------------------------------------------------- Commit dacb226a2be822abe7d46a6be7811c6eeb5f5e4c in lucene-solr's branch refs/heads/branch_5_5 from [~janhoy] [ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=dacb226 ] SOLR-9053: Fix attribution, apply the code refactor part from mdrob's patch (cherry picked from commit b6f8c65) > Upgrade fileupload-commons to 1.3.1 > ----------------------------------- > > Key: SOLR-9053 > URL: https://issues.apache.org/jira/browse/SOLR-9053 > Project: Solr > Issue Type: Improvement > Components: security > Affects Versions: 4.6, 5.5, 6.0 > Reporter: Jeff Field > Assignee: Jan Høydahl > Labels: commons-file-upload > Fix For: 6.0.1, 6.1 > > Attachments: SOLR-9053.patch > > > The project appears to pull in FileUpload 1.2.1. According to CVE-2014-0050: > "MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in > Apache Tomcat, JBoss Web, and other products, allows remote attackers to > cause a denial of service (infinite loop and CPU consumption) via a crafted > Content-Type header that bypasses a loop's intended exit conditions." > [Source|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050] -- This message was sent by Atlassian JIRA (v6.3.4#6332) --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org