-
Notifications
You must be signed in to change notification settings - Fork 476
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Detect usage of Apache BeanUtils as dangerous #601 #629
Conversation
Codecov Report
@@ Coverage Diff @@
## master #629 +/- ##
=========================================
Coverage 84.90% 84.90%
Complexity 1873 1873
=========================================
Files 154 154
Lines 5036 5036
Branches 1124 1124
=========================================
Hits 4276 4276
Misses 339 339
Partials 421 421 Continue to review full report at Codecov.
|
Did you reproduce the security in the latest version ? I don't want to integrate the new signature as it require some testing. I will documented stuff I fund in this PR. |
References for a security guardRelease notes
http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt Jira
https://issues.apache.org/jira/browse/BEANUTILS-463 PR for the fixExpected behavior taken from a test case.. public void testAllowAccessToClassProperty() throws Exception {
final BeanUtilsBean bub = new BeanUtilsBean();
bub.getPropertyUtils().removeBeanIntrospector(SuppressPropertiesBeanIntrospector.SUPPRESS_CLASS);
final AlphaBean bean = new AlphaBean();
String result = bub.getProperty(bean, "class");
assertEquals("Class property should have been accessed", "class org.apache.commons.beanutils2.AlphaBean", result);
} |
No, I didn't reproduce the security. I checked detection of usage |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should have been reviewed and merged much sooner.
No description provided.