Skip to content

Commit

Permalink
ZK-5819: [CodeQL] Apache Commons IO: Possible denial of service attac…
Browse files Browse the repository at this point in the history
…k on untrusted input to XmlStreamReade
  • Loading branch information
jumperchen authored and rebecca0201 committed Oct 17, 2024
1 parent 7e5b898 commit 0aae0cb
Show file tree
Hide file tree
Showing 7 changed files with 6 additions and 5 deletions.
Binary file modified dist/lib/ext/commons-io.jar
Binary file not shown.
2 changes: 1 addition & 1 deletion zhtml/build.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ plugins {

dependencies {
api project(':zul')
api 'commons-io:commons-io:2.13.0'
api 'commons-io:commons-io:2.17.0'
api 'org.zkoss:zsoup:1.8.2.5'
}

Expand Down
2 changes: 1 addition & 1 deletion zk-parent/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@
<dependency>
<groupId>commons-io</groupId>
<artifactId>commons-io</artifactId>
<version>2.13.0</version>
<version>2.17.0</version>
</dependency>
<dependency>
<groupId>commons-lang</groupId>
Expand Down
2 changes: 1 addition & 1 deletion zk/build.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ dependencies {
api project(':zweb')
api project(':zkwebfragment')
api 'org.apache.commons:commons-fileupload2-javax:2.0.0-M2'
api 'commons-io:commons-io:2.13.0'
api 'commons-io:commons-io:2.17.0'
api('com.google.guava:guava:32.1.2-jre') {
exclude group: '*', module: '*'
}
Expand Down
1 change: 1 addition & 0 deletions zkdoc/release-note
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,7 @@ ZK 10.1.0
ZK-5546: Websocket endpoint doesn't trigger timeout-uri redirect after desktop timeout
ZK-5807: A side-effect of ZK-5582 for the testSelectRange of B70_ZK_2534_groupTest
ZK-5802: _listenFlex, _unlistenFlex declared on static member _ are used directly, cannot be overriden
ZK-5819: [CodeQL] Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReade

* Upgrade Notes
+ Remove Htmls.encodeJavaScript(), Strings.encodeJavaScript(), Strings.escape() with Strings.ESCAPE_JAVASCRIPT, and replace them with OWASP Java Encoder APIs instead.
Expand Down
2 changes: 1 addition & 1 deletion zksandbox/build.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ repositories {
}

dependencies {
implementation 'commons-io:commons-io:2.13.0'
implementation 'commons-io:commons-io:2.17.0'
implementation 'commons-logging:commons-logging:1.1.1'
implementation 'org.apache.commons:commons-fileupload2-javax:2.0.0-M2'
implementation 'org.zkoss.theme:breeze:10.0.1.1-Eval'
Expand Down
2 changes: 1 addition & 1 deletion zktest/build.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ dependencies {
implementation "org.zkoss.theme:atlantic:10.0.1.1-Eval"
implementation 'commons-logging:commons-logging:1.1.1'
implementation 'org.apache.commons:commons-fileupload2-javax:2.0.0-M2'
implementation 'commons-io:commons-io:2.13.0'
implementation 'commons-io:commons-io:2.17.0'
implementation "org.zkoss.zk:zk:${version}"
implementation "org.zkoss.zk:zkplus:${version}"
implementation "org.zkoss.zk:zkbind:${version}"
Expand Down

0 comments on commit 0aae0cb

Please sign in to comment.