2019年2月11日 星期一
c3p0 library具高風險漏洞(CVE-2018-20433)
用途:
connection pool
風險:
c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.
參考:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20433
解決方式:
將c3p0-0.9.5.2.jar更換成c3p0-0.9.5.2-redhat-007.jar
1. Java:SCJP (SE4)、SCWCD、SCBCD (EE5)、SCJD (SE5)、OCEJWSD (EE6)、OCPWCD (EE7)、OCAJP (SE7)、OCPJP (SE7)、OCAJP (SE8, 滿分通過)、OCPJP (SE8, 滿分通過)、OCP, Java SE 11 Developer
2. 資訊安全:CEH (EC-Council Certified Ethical Hacker)、ECSP Java (EC-Council Certified Secure Programmer)、ECSA (EC-Council Certified Security Analyst)
3. Oracle DBA:9i OCP 、9i PLSQL 、10g OCP
4. SQL Server 2005 MCTS
2. 資訊安全:CEH (EC-Council Certified Ethical Hacker)、ECSP Java (EC-Council Certified Secure Programmer)、ECSA (EC-Council Certified Security Analyst)
3. Oracle DBA:9i OCP 、9i PLSQL 、10g OCP
4. SQL Server 2005 MCTS
訂閱:
張貼留言 (Atom)
沒有留言:
張貼留言