-
Bug
-
Resolution: Fixed
-
Low
-
5.8.17
-
None
This v3.2.2 release is a bugfix release, fixing several bugs present in the previous releases of the 3.2 branch. Additionally, this release provides a mitigation for a known remote code exploitation via the standard java object serialization mechanism. By default, serialization support for unsafe classes in the functor package is disabled and will result in an exception when either trying to serialize or de-serialize an instance of these classes. For more details, please refer to COLLECTIONS-580.
https://commons.apache.org/proper/commons-collections/release_3_2_2.html
- is related to
-
JRASERVER-47638 Upgrade to version 3.2.2 of apache commons-collections
-
- Closed
-
- relates to
-
CONFSERVER-39919 InvokerTransformer vulnerability
-
- Closed
-
- mentioned in
-
Page Failed to load
msymons we have not treated upgrading the version of commons-collections as critical because only Confluence instances with a Data Center license are vulnerable through Hazelcast, which is used for clustering, and by default listens on port 5801. Ensure that you only permit cluster nodes to connect to a Confluence Data Center instance's Hazelcast port through the use of a firewall and/or network segregation.