[ https://issues.apache.org/jira/browse/KYLIN-1654?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Shaofeng SHI updated KYLIN-1654: -------------------------------- Assignee: Yiming Liu (was: hongbin ma) > Upgrade httpclient dependency > ----------------------------- > > Key: KYLIN-1654 > URL: https://issues.apache.org/jira/browse/KYLIN-1654 > Project: Kylin > Issue Type: Task > Reporter: Ted Yu > Assignee: Yiming Liu > Labels: newbie > Attachments: KYLIN-1654.patch > > > Currently commons-httpclient 3.1 is used. > This is already end-of-life by apache. > We should move to 4.3.6 or later. > https://issues.apache.org/jira/browse/HADOOP-12767 > and to move the uses of httpclient > https://issues.apache.org/jira/browse/HADOOP-10105 > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262 : > http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents > HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting > during an SSL handshake, which allows remote attackers to cause a denial of > service (HTTPS call hang) via unspecified vectors. > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6153 > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5783 > Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments > Service (FPS) merchant Java SDK and other products, does not verify that the > server hostname matches a domain name in the subject's Common Name (CN) or > subjectAltName field of the X.509 certificate, which allows man-in-the-middle > attackers to spoof SSL servers via an arbitrary valid certificate. -- This message was sent by Atlassian JIRA (v6.3.4#6332)