Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[JENKINS-65161] remove commons-digester2 from core and upgrade plugins to commons-digester3 #55

Merged
merged 2 commits into from
Mar 22, 2021

Conversation

olamy
Copy link
Member

@olamy olamy commented Mar 18, 2021

No description provided.

olamy added 2 commits March 18, 2021 18:45
Signed-off-by: olivier lamy <olamy@apache.org>
Signed-off-by: olivier lamy <olamy@apache.org>
@olamy olamy changed the title [JENKINS-65161] remove commons-digester2 from core and upgrade plugins to commons-digester3" [JENKINS-65161] remove commons-digester2 from core and upgrade plugins to commons-digester3 Mar 18, 2021
@mrmoritz01 mrmoritz01 merged commit d034737 into jenkinsci:master Mar 22, 2021
@olamy olamy deleted the JENKINS-65161 branch March 22, 2021 20:45
@olamy
Copy link
Member Author

olamy commented Mar 24, 2021

jenkinsci/jenkins#5320

@batmat
Copy link
Member

batmat commented Apr 30, 2021

Hi @mrmoritz01, thanks a lot for merging this PR :).
Would you be able to consider releasing this?

Thanks again!

@basil
Copy link
Member

basil commented Apr 30, 2021

Does this not introduce a security vulnerability? I don't see the XXE mitigations in this PR that I see in the other similar PRs.

@jtnord
Copy link
Member

jtnord commented Apr 30, 2021

Does this not introduce a security vulnerability? I don't see the XXE mitigations in this PR that I see in the other similar PRs.

The plugin already had them ->

Digester digester = new Digester();
digester.setXIncludeAware(false);
if (!Boolean.getBoolean(CVSChangeLogParser.class.getName() + ".UNSAFE")) {
try {
digester.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
digester.setFeature("http://xml.org/sax/features/external-general-entities", false);
digester.setFeature("http://xml.org/sax/features/external-parameter-entities", false);
digester.setFeature("http://apache.org/xml/features/nonvalidating/load-external-dtd", false);
}
catch (ParserConfigurationException ex) {
throw new SAXException("Failed to securely configure CVS changelog parser", ex);
}
}

@basil
Copy link
Member

basil commented Apr 30, 2021

Phew, sorry for the false alarm.

@batmat
Copy link
Member

batmat commented Apr 30, 2021

Better safe than sorry, thanks for cross-checking Basil!

@mrmoritz01
Copy link
Contributor

@batmat This is released in cvs-plugin 2.19 now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants