[ 
https://issues.apache.org/jira/browse/SUBMARINE-944?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kai-Hsun Chen resolved SUBMARINE-944.
-------------------------------------
    Resolution: Fixed

> Bump io:commons-io to 2.11
> --------------------------
>
>                 Key: SUBMARINE-944
>                 URL: https://issues.apache.org/jira/browse/SUBMARINE-944
>             Project: Apache Submarine
>          Issue Type: Improvement
>          Components: Commons
>            Reporter: Kevin Su
>            Assignee: Kevin Su
>            Priority: Major
>              Labels: pull-request-available
>             Fix For: 0.6.0
>
>
> h5. [CVE-2021-29425|https://github.com/advisories/GHSA-gwrp-pvrq-jmwv]
> *Vulnerable versions:* < 2.7
> *Patched version:* 2.7
> In Apache Commons IO before 2.7, When invoking the method 
> FileNameUtils.normalize with an improper input string, like "//../foo", or 
> "\..\foo", the result would be the same value, thus possibly providing access 
> to files in the parent directory, but not further above (thus "limited" path 
> traversal), if the calling code would use the result to construct a path 
> value.
> [https://github.com/apache/submarine/security/dependabot/pom.xml/commons-io:commons-io/open]
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@submarine.apache.org
For additional commands, e-mail: dev-h...@submarine.apache.org

Reply via email to