[ https://issues.apache.org/jira/browse/VELOCITY-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15018551#comment-15018551 ]
Brian Martin commented on VELOCITY-869: --------------------------------------- Absolutely, and I encourage vendors to upgrade libraries as a precaution. I point it out because that even in upgrading to a new version, an application may still be vulnerable. Ideally, I want vendors to upgrade and positively confirm if they were vulnerable to begin with, and if the upgrade also includes configuration changes to remove the issue. > Vulnerability in dependency: commons-collections:3.2.1 > ------------------------------------------------------ > > Key: VELOCITY-869 > URL: https://issues.apache.org/jira/browse/VELOCITY-869 > Project: Velocity > Issue Type: Bug > Components: Build > Affects Versions: 1.7 > Reporter: Ryan Blue > Assignee: Sergiu Dumitriu > Fix For: 2.x, 1.x > > > There is an arbitrary remote code execution bug in commons-collections, > tracked by COLLECTIONS-580. Updating to the version where this bug is fixed, > 3.2.2, will help downstream libraries (like avro-ipc) from pulling in the bad > version. Thanks! -- This message was sent by Atlassian JIRA (v6.3.4#6332) --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@velocity.apache.org For additional commands, e-mail: dev-h...@velocity.apache.org