THIS IS A TEST INSTANCE. ALL YOUR CHANGES WILL BE LOST!!!!
...
Code Block | ||||||
---|---|---|---|---|---|---|
| ||||||
<repositories> <repository> <id>apache.nexus</id> <name>ASF Nexus Staging</name> <url>https://repository.apache.org/content/groups/staging/</url> </repository> </repositories> |
Internal Changes
- Possible XSS vulnerability in pages not using UTF-8 was fixed, read more details in S2-028 Action name clean up is error prone S2-035
- Forced double OGNL evaluation, when evaluated on raw Prevents possible RCE when reusing user input in tag 's attributes, see more details in S2-029may lead to remote code execution (similar to S2-029) S2-036
- Remote Code Execution can be performed when using REST Plugin S2-037
- It is possible to bypass token validation and perform a CSRF attack S2-038
- Getter as action method leads to security bypass S2-039
- Input validation bypass using existing default action method S2-040
- Possible DoS attack when using URLValidator S2-041
- Fixed all reported issues related to new version of the Apache Tiles, see WW-4622, WW-4623, WW-4624
MessageStoreInterceptor
was extended to support 3rd-partyRedirectResult
subclasses, see WW-4618EmailValidator
supports.cat
domain, see WW-4626- and few other small improvements, please see the release notes
...