|
Message-ID: <3fc65cdf-8155-cff7-015c-e4aa1ba37346@oracle.com> Date: Tue, 25 Jan 2022 14:27:02 -0800 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com, Zhang Yonglun <zhangyonglun@...che.org>, dev@...nyu.apache.org Subject: Re: CVE-2022-23944: Apache ShenYu 2.4.1 Improper access control On 1/25/22 03:39, Zhang Yonglun wrote: > Description: > > User can access /plugin api without authentication. This issue > affected Apache ShenYu 2.4.0 and 2.4.1. Thanks for informing oss-security of these issues, but good security announcements have a little more detail, like what actions users or distributors need to take (upgrade to a new version? what version?) and information on where to find more details, like a bug id in your bug tracker. If you look at the announcements from other Apache projects, you'll see they often include those. Some good examples: https://www.openwall.com/lists/oss-security/2021/12/18/2 https://www.openwall.com/lists/oss-security/2022/01/05/4 https://www.openwall.com/lists/oss-security/2022/01/06/2 -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.