Quantcast

[jira] [Commented] (JEXL-223) Apache Commons JEXL Expression Execute Command Vulnerabilitity

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|  
Report Content as Inappropriate

[jira] [Commented] (JEXL-223) Apache Commons JEXL Expression Execute Command Vulnerabilitity

JIRA jira@apache.org

    [ https://issues.apache.org/jira/browse/JEXL-223?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15978258#comment-15978258 ]

Emmanuel Bourg commented on JEXL-223:
-------------------------------------

I'm not sure to understand, executing untrusted code in a scripting language is dangerous, that's not really new. The same happens with any implementation of the javax.script API.

> Apache Commons JEXL Expression Execute Command Vulnerabilitity
> --------------------------------------------------------------
>
>                 Key: JEXL-223
>                 URL: https://issues.apache.org/jira/browse/JEXL-223
>             Project: Commons JEXL
>          Issue Type: Bug
>            Reporter: cnbird
>            Priority: Critical
>
> 0x01 Summary
> Apache Commons JEXL Expression Execute Command Vulnerabilitity throught groovy.
> 0x02 POC
> POC Report to Apache Security Email Address [hidden email].



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)
Loading...