Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <625df810-d6f4-caee-ab2a-25154228bfb7@apache.org>
Date: Fri, 09 May 2025 09:29:22 +0000
From: Arnout Engelen <engelen@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-46392: Apache Commons Configuration: StackOverflowError
 loading untrusted configuration 

Severity: low

Affected versions:

- Apache Commons Configuration 1 before 2.0.0

Description:

Uncontrolled Resource Consumption vulnerability in Apache Commons Configuration 1.x.

There are a number of issues in Apache Commons Configuration 1.x that allow excessive resource consumption when loading untrusted configurations or using unexpected usage patterns. The Apache Commons Configuration team does not intend to fix these issues in 1.x. Apache Commons Configuration 1.x is still safe to use in scenario's where you only load trusted configurations. 


Users that load untrusted configurations or give attackers control over usage patterns are recommended to upgrade to the 2.x version line, which fixes these issues. Apache Commons Configuration 2.x is not a drop-in replacement, but as it uses a separate Maven groupId and Java package namespace they can be loaded side-by-side, making it possible to do a gradual migration.

References:

https://www.cve.org/CVERecord?id=CVE-2024-29131
https://www.cve.org/CVERecord?id=CVE-2024-29133
https://commons.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-46392

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.