Joget DX 8 Stable Released
The stable release for Joget DX 8 is now available, with a focus on UX and Governance.
Table of Contents |
---|
...
In the login page, it is possible to send specially crafted parameters to cause the page to subsequently trigger an error :
Code Block |
---|
NullPointerExceptions e.g.:
```
Caused by: java.lang.NullPointerException
at org.joget.commons.spring.web.ParameterizedAnnotationMethodHandlerAdapter$ParameterizedPathServletRequest.getParameterNames(ParameterizedAnnotationMethodHandlerAdapter.java:84) ~[wflow-commons-8.0-SNAPSHOT.jar:?]
at org.glowroot.agent.plugin.servlet.DetailCapture_.captureRequestParameters(DetailCapture.java:71) ~[?:?]
at org.glowroot.agent.plugin.servlet.RequestParameterAspect$GetParameterAdvice_.captureRequestParameters(RequestParameterAspect.java:61) ~[?:?]
at org.glowroot.agent.plugin.servlet.RequestParameterAspect$GetParameterAdvice_.onReturn(RequestParameterAspect.java:54) ~[?:?]
at javax.servlet.ServletRequestWrapper.getParameterMap(ServletRequestWrapper.java:157) ~[servlet-api.jar:4.0.FR]
at org.joget.commons.spring.web.ParameterizedAnnotationMethodHandlerAdapter$ParameterizedPathServletRequest.setAttribute(ParameterizedAnnotationMethodHandlerAdapter.java:96) ~[wflow-commons-8.0-SNAPSHOT.jar:?]
at org.joget.commons.spring.web.ParameterizedAnnotationMethodHandlerAdapter$ParameterizedPathServletRequest.<init>(ParameterizedAnnotationMethodHandlerAdapter.java:62) ~[wflow-commons-8.0-SNAPSHOT.jar:?]
``` |
Once triggered, the login page will become inaccessible and the web application server needs to be restarted to restore access.
High
Joget DX 8.0.12 and below
Upgrade to Joget DX 8.1.0 and above
...
In a userview, it is possible to send unvalidated data to a web browser when dynamically switching user locales, which can result in the browser executing malicious code.
High
Joget DX 8.0.11 and below
Upgrade to Joget DX 8.0.12 and above
...
A critical vulnerability has been found in the Spring Framework. According to the vulnerability report CVE-2022-22965:
...
A fix is available in the latest Joget versions:
...
Critical vulnerability in Apache Log4j. According to the report CVE-2021-44228:
...
However, this vulnerability only affects Apache Log4j versions from 2.0-beta9 to 2.14.1, so they are NOT affected by this vulnerability.
To upgrade to the latest log4j 2 version, upgrade to the following Joget versions:
...