[
https://issues.apache.org/jira/browse/SOLR-9053?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15337108#comment-15337108
]
ASF subversion and git services commented on SOLR-9053:
-------------------------------------------------------
Commit 931501ce6481080fbdb4c5470f7b532f394e7b96 in lucene-solr's branch
refs/heads/branch_5_5 from [~janhoy]
[ https://git-wip-us.apache.org/repos/asf?p=lucene-solr.git;h=931501c ]
SOLR-9053: Upgrade commons-fileupload to 1.3.1, fixing a potential vulnerability
(cherry picked from commit 0ebe6b0)
> Upgrade fileupload-commons to 1.3.1
> -----------------------------------
>
> Key: SOLR-9053
> URL: https://issues.apache.org/jira/browse/SOLR-9053
> Project: Solr
> Issue Type: Improvement
> Components: security
> Affects Versions: 4.6, 5.5, 6.0
> Reporter: Jeff Field
> Assignee: Jan Høydahl
> Labels: commons-file-upload
> Fix For: 6.0.1, 6.1
>
> Attachments: SOLR-9053.patch
>
>
> The project appears to pull in FileUpload 1.2.1. According to CVE-2014-0050:
> "MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in
> Apache Tomcat, JBoss Web, and other products, allows remote attackers to
> cause a denial of service (infinite loop and CPU consumption) via a crafted
> Content-Type header that bypasses a loop's intended exit conditions."
> [Source|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050]
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]