Skip to content

[4.5.x] Upgrade commons-codec to 1.15 due to vulnerability to Information Exposure#260

Closed
milczarekIT wants to merge 1 commit intoapache:4.5.xfrom
milczarekIT:bugfix/commons-codec-vulnerable-to-Information-Exposure
Closed

[4.5.x] Upgrade commons-codec to 1.15 due to vulnerability to Information Exposure#260
milczarekIT wants to merge 1 commit intoapache:4.5.xfrom
milczarekIT:bugfix/commons-codec-vulnerable-to-Information-Exposure

Conversation

@milczarekIT
Copy link
Copy Markdown

Fixed information exposure "Base32 would decode some invalid Base32 encoded string into arbitrary value" https://issues.apache.org/jira/browse/CODEC-134

This issue has been fixed in commons-codec 1.13, upgrading to the newest 1.15.
Version 5.0.x already have commons-codec 1.15

commons-codec versions [,1.13) are vulnerable to Information Exposure. When there is no byte array value that can be encoded into a string the Base32 implementation does not reject it, and instead decodes it into an arbitrary value which can be re-encoded again using the same implementation. This allows for information exposure exploits such as tunneling additional information via seemingly valid base 32 strings.

@michael-o
Copy link
Copy Markdown
Member

I don't think that we use Base32, do we?

@ok2c
Copy link
Copy Markdown
Member

ok2c commented Oct 9, 2020

@michael-o Not only do we not use BASE32, we cannot upgrade 4.5.x to any Codec versions due to Java 1.6 compatibility.

@ok2c ok2c closed this Oct 9, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants