Replies: 1 comment
-
|
The version 3.33 is patched: #4033 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I would like to ask whether mapfish-print is affected by CVE-2026-27830 related to c3p0.
According to the following write-up, certain c3p0 configurations may allow remote code execution:
https://mogwailabs.de/en/blog/2025/02/c3p0-you-little-rascal/
From my understanding, the exploit involves unsafe deserialization in c3p0. Since mapfish-print processes user-controlled print requests, I would like to clarify:
I noticed that the c3p0 dependency has already been updated on master via:
#4027
It would be helpful to understand:
Thank you for your work and clarification.
Best regards
Stefan
Beta Was this translation helpful? Give feedback.
All reactions