[
https://issues.apache.org/jira/browse/JAMES-2570?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16660351#comment-16660351
]
ASF GitHub Bot commented on JAMES-2570:
---------------------------------------
Github user trantienduchn closed the pull request at:
https://github.com/apache/james-project/pull/138
> Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0
> ----------------------------------------------------
>
> Key: JAMES-2570
> URL: https://issues.apache.org/jira/browse/JAMES-2570
> Project: James Server
> Issue Type: Improvement
> Reporter: Trần Tiến Đức
> Priority: Major
>
> h5. CVE-2018-9159 [More
> information|https://nvd.nist.gov/vuln/detail/CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159)
> moderate severity
> *Vulnerable versions:* < 2.7.2
> *Patched version:* 2.7.2
> In Spark before 2.7.2, a remote attacker can read unintended static files via
> various representations of absolute or relative pathnames, as demonstrated by
> file: URLs and directory traversal sequences. NOTE: this product is unrelated
> to Ignite Realtime Spark.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]