JanHron commented on PR #26:
URL: https://github.com/apache/commons-jxpath/pull/26#issuecomment-1305809446

   > In short: no. I am a volunteer here, so I don't get paid, I have other 
priorities and interests; I work here on a best-effort basis based on my POV. 
This is the classic story of free and open-source development. Gary
   
   @garydgregory No need to get all defensive, I did not want to start one of 
those discussions where a random nobody demands attention from a volunteer 
member of an open source project. I'm well aware of the situation and your work 
is very much appreciated. Apologies for the misunderstanding. My background is 
in security, so my expectations about what should happen whenever a critical 
vulnerability is found may be skewed a bit in favor of immediate action.
   
   So, do I understand correctly that this vulnerability is as serious as it 
sounds - that unsanitized user input into a JXPath expression leads to getting 
a remote shell, or is there some caveat I'm missing? If so, would you please 
consider making a HotFix release of 1.3 with just this fix so that the users of 
`commons-jxpath` can patch their projects (many of them open-source too, BTW) 
and sleep well at night?
   
   And it's not like I'm just asking you to do more unpaid work - I'm willing 
to help too! If there's anything I can do to help move this along, just let me 
know. 


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@commons.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to