<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alfresco 7.X found vulnerability in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118718#M32734</link>
    <description>&lt;P&gt;Yes, I read again and there is no mention of&amp;nbsp;&lt;SPAN&gt;CVE-2022-31692&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So as I said I in my previous message :&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="lia-spoiler-container"&gt;&lt;A class="lia-spoiler-link" href="#" rel="nofollow noopener noreferrer"&gt;Spoiler&lt;/A&gt;&lt;NOSCRIPT&gt; (Highlight to read)&lt;/NOSCRIPT&gt;&lt;DIV class="lia-spoiler-border"&gt;&lt;DIV class="lia-spoiler-content"&gt;&lt;P&gt;I have the feeling that this vulnerability is fixed because you needed to update the library for this feature :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d’écran 2023-06-22 154724.png" style="width: 786px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image"&gt;&lt;img src="https://connect.hyland.com/t5/image/serverpage/image-id/1673i88701F8CE9CAF498/image-size/large?v=v2&amp;amp;px=999" role="button" title="image" alt="image" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;.. and not to fix the vulnerability. Am I wrong ?&lt;/P&gt;&lt;/DIV&gt;&lt;NOSCRIPT&gt;&lt;DIV class="lia-spoiler-noscript-container"&gt;&lt;DIV class="lia-spoiler-noscript-content"&gt;I have the feeling that this vulnerability is fixed because you needed to update the library for this feature :&amp;nbsp;.. and not to fix the vulnerability. Am I wrong ?&lt;/DIV&gt;&lt;/DIV&gt;&lt;/NOSCRIPT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;Anyway we will continue to monitor closely the security components to see if that happens again.&lt;/P&gt;&lt;P&gt;More dangerous : The official &lt;A href="https://www.alfresco.com/thank-you/thank-you-downloading-alfresco-community-edition" target="_self" rel="nofollow noopener noreferrer"&gt;Community Download Web Page&lt;/A&gt; still redirect to v7.3 (I mean the 1st page in Google when you type "alfresco download community"), which is compromised by this &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;9.8&lt;/FONT&gt;&lt;/STRONG&gt; CVSS vulnerability, disclosed on 10/31/2022.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d’écran 2023-08-01 151017.png" style="width: 999px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image"&gt;&lt;img src="https://connect.hyland.com/t5/image/serverpage/image-id/1676i9837E8207D59BBA9/image-size/large?v=v2&amp;amp;px=999" role="button" title="image" alt="image" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You really need to take actions fast, this is going political now.&lt;/P&gt;&lt;P&gt;Thank you in advance !&lt;/P&gt;&lt;P&gt;cc.&amp;nbsp;&lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/91445"&gt;@ttoine&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 01 Aug 2023 13:11:03 GMT</pubDate>
    <dc:creator>jleman</dc:creator>
    <dc:date>2023-08-01T13:11:03Z</dc:date>
    <item>
      <title>Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118709#M32725</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;We have found a vulnerability in the Community - 7.3.0 version of Alfresco.&lt;/STRONG&gt;&lt;BR /&gt;No information about this is available on the Internet... How can we contact you to provide the information?&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 09:24:36 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118709#M32725</guid>
      <dc:creator>CEO-Vision</dc:creator>
      <dc:date>2023-06-22T09:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118710#M32726</link>
      <description>&lt;P&gt;Hyland is not accepting vulnerability reports from Community.&lt;/P&gt;
&lt;P&gt;So feel free to find your way to register and disclose the problem you found.&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 11:59:26 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118710#M32726</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2023-06-22T11:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118711#M32727</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/5487"&gt;@angelborroy&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;We're talking here of multiple vulnerabilities on the latest downloadable version in the core Alfresco ACS libraries. Those vulnerabilities are identified in the NIST database for months.&lt;/P&gt;&lt;P&gt;One of them is identified with a &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;9.8&lt;/STRONG&gt;&lt;/FONT&gt; CVSS score.&lt;/P&gt;&lt;P&gt;Disclosing the vulnerabilities here would potentially expose million of users if that is revealed to be correct, including our customers.&lt;/P&gt;&lt;P&gt;We urge you to take this request seriously, open source and community softwares versions should not be a barrier to safety.&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 12:54:01 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118711#M32727</guid>
      <dc:creator>jleman</dc:creator>
      <dc:date>2023-06-22T12:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118712#M32728</link>
      <description>&lt;P&gt;Hello, your post title is about Alfresco 7.X, but in your post copy, you are speaking only about 7.3.&lt;BR /&gt;&lt;BR /&gt;Could you please test with version 7.4 and check if this is solved already?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 13:12:04 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118712#M32728</guid>
      <dc:creator>ttoine</dc:creator>
      <dc:date>2023-06-22T13:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118713#M32729</link>
      <description>&lt;P&gt;Hello &lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/93380"&gt;@jleman&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alfresco Community is patching vulnerabilities regularly.&lt;/P&gt;
&lt;P&gt;For instance, check this comparison between 7.3 and 7.4&lt;/P&gt;
&lt;PRE&gt;~ $ docker scout cves --details --only-fixed --only-severity critical \&lt;BR /&gt;alfresco/alfresco-content-repository-community:7.3.0
    ✓ Pulled
    ✓ Image stored for indexing
    ✓ Indexed 645 packages
    ✗ Detected 2 vulnerable packages with a total of 2 vulnerabilities

   1C     0H     0M     0L  cxf-core 3.5.3
pkg:maven/org.apache.cxf/cxf-core@3.5.3

    ✗ CRITICAL CVE-2022-46364 [Server-Side Request Forgery (SSRF)]
      https://dso.docker.com/cve/CVE-2022-46364

      A SSRF vulnerability in parsing the href attribute of XOP:Include in
      MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows
      an attacker to perform SSRF style attacks on webservices that take at
      least one parameter of any type.


      Affected range : &amp;gt;=3.5.0
                     : &amp;lt;3.5.5
      Fixed version  : 3.5.5
      CVSS Score     : 9.8
      CVSS Vector    : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H


   1C     0H     0M     0L  snakeyaml 1.32
pkg:maven/org.yaml/snakeyaml@1.32

    ✗ CRITICAL CVE-2022-1471 [Deserialization of Untrusted Data]
      https://dso.docker.com/cve/CVE-2022-1471

      SnakeYaml's Constructor() class does not restrict types which can be
      instantiated during deserialization.&amp;nbsp;Deserializing yaml content
      provided by an attacker can lead to remote code execution. We recommend
      using SnakeYaml's SafeConsturctor when parsing untrusted content to
      restrict deserialization. We recommend upgrading to version 2.0 and
      beyond.


      Affected range : &amp;lt;=1.33
      Fixed version  : 2.0
      CVSS Score     : 9.8
      CVSS Vector    : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H



2 vulnerabilities found in 2 packages
  LOW       0
  MEDIUM    0
  HIGH      0
  CRITICAL  2

~ $ docker scout cves --details --only-fixed --only-severity critical \&lt;BR /&gt;alfresco/alfresco-content-repository-community:7.4.0
    ✓ Provenance obtained from attestation
    ✓ Pulled
    ✓ Image stored for indexing
    ✓ Indexed 647 packages
    ✓ No vulnerable package detected&lt;/PRE&gt;
&lt;P&gt;When using Enterprise version, this security fixes are also applied as minor releases. Additionally, as customer, you can require a patch if some of the vulnerabilities is affecting your deployment. This is one of the main differences between Community and Enterprise.&lt;/P&gt;
&lt;P&gt;Additionally, as you said, this is Open Source and Community supported. So I encourage you to apply required security patches to Alfresco Community and to share your findings with others.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 13:29:18 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118713#M32729</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2023-06-22T13:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118714#M32730</link>
      <description>&lt;P&gt;&lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/5487"&gt;@angelborroy&lt;/A&gt;&amp;nbsp;,&amp;nbsp;&lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/91445"&gt;@ttoine&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for this way more professionnal answer &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://connect.hyland.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;&lt;P&gt;So even if this is not part of your comparaison, the vulnerability, which is&amp;nbsp;CVE-2022-31692, has been resolved in ACS 7.4.1 which I downloaded &lt;A href="https://hub.alfresco.com/t5/alfresco-content-services-blog/alfresco-community-edition-7-4-release-notes/ba-p/316162" target="_self" rel="nofollow noopener noreferrer"&gt;in this release note&lt;/A&gt;. We will check the other ones.&lt;/P&gt;&lt;P&gt;But your community public download link still redirect to the 7.3 version which is still affected :&amp;nbsp;&lt;A href="https://www.alfresco.com/thank-you/thank-you-downloading-alfresco-community-edition" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.alfresco.com/thank-you/thank-you-downloading-alfresco-community-edition&lt;/A&gt;&lt;/P&gt;&lt;P&gt;That's where the confusion comes from, also I am worried to don't find any blog post about a 9.8 vulnerability inside the ACS core.&lt;/P&gt;&lt;P&gt;I have the feeling that this vulnerability is fixed because you needed to update the library for this feature :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d’écran 2023-06-22 154724.png" style="width: 786px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image"&gt;&lt;img src="https://connect.hyland.com/t5/image/serverpage/image-id/1673i88701F8CE9CAF498/image-size/large?v=v2&amp;amp;px=999" role="button" title="image" alt="image" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;.. and not to fix the vulnerability. Am I wrong ?&lt;/P&gt;&lt;P&gt;Thank you in advance for your answer, it is important tu us to know that we can rely on your security monitoring, at least for the highest issues in ACS core even in the community version.&lt;/P&gt;&lt;P&gt;For ourselves we will update ASAP.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 13:50:34 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118714#M32730</guid>
      <dc:creator>jleman</dc:creator>
      <dc:date>2023-06-22T13:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118715#M32731</link>
      <description>&lt;P&gt;Don't forget to read the release notes when a new version is available.&lt;/P&gt;
&lt;P&gt;There is a mention when some security issues have been patched and it's important to update.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 15:01:25 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118715#M32731</guid>
      <dc:creator>ttoine</dc:creator>
      <dc:date>2023-06-22T15:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118716#M32732</link>
      <description>&lt;P&gt;Yes, and that vulnerability is not mentionned in any 7.3 or 7.4 release note, that is actually my point.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 15:57:16 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118716#M32732</guid>
      <dc:creator>jleman</dc:creator>
      <dc:date>2023-06-22T15:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118717#M32733</link>
      <description>&lt;P&gt;Please read again:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://hub.alfresco.com/t5/alfresco-content-services-blog/alfresco-community-edition-7-4-release-notes/ba-p/316162" target="_blank" rel="nofollow noopener noreferrer"&gt;https://hub.alfresco.com/t5/alfresco-content-services-blog/alfresco-community-edition-7-4-release-notes/ba-p/316162&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;There is a section about fixed vulnerabilities.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 08:42:10 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118717#M32733</guid>
      <dc:creator>ttoine</dc:creator>
      <dc:date>2023-06-23T08:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118718#M32734</link>
      <description>&lt;P&gt;Yes, I read again and there is no mention of&amp;nbsp;&lt;SPAN&gt;CVE-2022-31692&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So as I said I in my previous message :&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="lia-spoiler-container"&gt;&lt;A class="lia-spoiler-link" href="#" rel="nofollow noopener noreferrer"&gt;Spoiler&lt;/A&gt;&lt;NOSCRIPT&gt; (Highlight to read)&lt;/NOSCRIPT&gt;&lt;DIV class="lia-spoiler-border"&gt;&lt;DIV class="lia-spoiler-content"&gt;&lt;P&gt;I have the feeling that this vulnerability is fixed because you needed to update the library for this feature :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d’écran 2023-06-22 154724.png" style="width: 786px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image"&gt;&lt;img src="https://connect.hyland.com/t5/image/serverpage/image-id/1673i88701F8CE9CAF498/image-size/large?v=v2&amp;amp;px=999" role="button" title="image" alt="image" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;.. and not to fix the vulnerability. Am I wrong ?&lt;/P&gt;&lt;/DIV&gt;&lt;NOSCRIPT&gt;&lt;DIV class="lia-spoiler-noscript-container"&gt;&lt;DIV class="lia-spoiler-noscript-content"&gt;I have the feeling that this vulnerability is fixed because you needed to update the library for this feature :&amp;nbsp;.. and not to fix the vulnerability. Am I wrong ?&lt;/DIV&gt;&lt;/DIV&gt;&lt;/NOSCRIPT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;Anyway we will continue to monitor closely the security components to see if that happens again.&lt;/P&gt;&lt;P&gt;More dangerous : The official &lt;A href="https://www.alfresco.com/thank-you/thank-you-downloading-alfresco-community-edition" target="_self" rel="nofollow noopener noreferrer"&gt;Community Download Web Page&lt;/A&gt; still redirect to v7.3 (I mean the 1st page in Google when you type "alfresco download community"), which is compromised by this &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;9.8&lt;/FONT&gt;&lt;/STRONG&gt; CVSS vulnerability, disclosed on 10/31/2022.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d’écran 2023-08-01 151017.png" style="width: 999px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image"&gt;&lt;img src="https://connect.hyland.com/t5/image/serverpage/image-id/1676i9837E8207D59BBA9/image-size/large?v=v2&amp;amp;px=999" role="button" title="image" alt="image" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You really need to take actions fast, this is going political now.&lt;/P&gt;&lt;P&gt;Thank you in advance !&lt;/P&gt;&lt;P&gt;cc.&amp;nbsp;&lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/91445"&gt;@ttoine&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2023 13:11:03 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118718#M32734</guid>
      <dc:creator>jleman</dc:creator>
      <dc:date>2023-08-01T13:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118719#M32735</link>
      <description>&lt;P&gt;Hello, you are right, some content has not been updated yet, and I will notify our web team.&lt;/P&gt;
&lt;P&gt;That said, most people are currently using the Docker tutorial to start with ACS, and it will download the last version, the 7.4.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2023 13:57:54 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118719#M32735</guid>
      <dc:creator>ttoine</dc:creator>
      <dc:date>2023-08-01T13:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118720#M32736</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/91445"&gt;@ttoine&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While the public &lt;A href="https://www.alfresco.com/thank-you/thank-you-downloading-alfresco-community-edition" target="_self" rel="nofollow noopener noreferrer"&gt;Alfresco Community Download Page&lt;/A&gt; still send the users to the 7.3 version, we have updated our instances to 7.4 and our security monitoring still reports some important CVEs&lt;/P&gt;&lt;P&gt;__________________________________&lt;/P&gt;&lt;P&gt;&lt;U&gt;CVE&lt;/U&gt; :&amp;nbsp;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-20860" target="_self" rel="nofollow noopener noreferrer"&gt;CVE-2023-20860&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Publication Date&lt;/U&gt; : &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;27.03.2023&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;CVSS 3.x Score&lt;/U&gt; : &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;7.5 HIGH&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Tenable Output&lt;/U&gt; :&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;  Path              : /var/lib/tomcats/alfresco/webapps/share/WEB-INF/lib/spring-core-5.3.23.jar
  Installed version : 5.3.23
  Fixed version     : 5.3.26&lt;/PRE&gt;&lt;P&gt;__________________________________&lt;/P&gt;&lt;P&gt;&lt;U&gt;CVE&lt;/U&gt; :&amp;nbsp;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-20861" target="_self" rel="nofollow noopener noreferrer"&gt;CVE-2023-20861&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Publication Date&lt;/U&gt; : &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;23.03.2023&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;CVSS 3.x Score&lt;/U&gt; : &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;6.5&amp;nbsp;MEDIUM&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Tenable Output&lt;/U&gt; :&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;  Path              : /var/lib/tomcats/alfresco/webapps/share/WEB-INF/lib/spring-core-5.3.23.jar
  Installed version : 5.3.23
  Fixed version     : 5.3.26&lt;/PRE&gt;&lt;P&gt;__________________________________&lt;/P&gt;&lt;P&gt;Thank you in advance for your feedback&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 14:39:46 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118720#M32736</guid>
      <dc:creator>jleman</dc:creator>
      <dc:date>2023-09-19T14:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118721#M32737</link>
      <description>&lt;P&gt;Can you provide a detailed path to exploit this vulnerabilities in Alfresco Share 7.4.1.1?&lt;/P&gt;
&lt;P&gt;You need to classify reported vulnerabilities according to the risk they represent for your system. If there is no way to exploit a vulnerability in your system, then it's not a risk.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 15:03:55 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118721#M32737</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2023-09-19T15:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118722#M32738</link>
      <description>&lt;P&gt;&lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/5487"&gt;@angelborroy&lt;/A&gt;&amp;nbsp;???????&lt;/P&gt;&lt;P&gt;Yes you are right, if Hyland policy is to wait for a public exploit to fix an official CVE, you don't need to update the application.&lt;/P&gt;&lt;P&gt;For instance, this position is exactly the reason that leads to the current&amp;nbsp;&lt;SPAN&gt;Storm-0558 data breach in Microsoft systems, including a huge government e-mail data leak, and opening investigations from the FBI, CSRB, Dept. of Justice, FTC &amp;amp; CISA.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I invite you to read the &lt;A href="https://www.linkedin.com/pulse/microsoftthe-truth-even-worse-than-you-think-amit-yoran/" target="_self" rel="nofollow noopener noreferrer"&gt;Tenable's CEO article&lt;/A&gt;&amp;nbsp;and the &lt;A href="https://www.wyden.senate.gov/imo/media/doc/wyden_letter_to_cisa_doj_ftc_re_2023_microsoft_breach.pdf" target="_self" rel="nofollow noopener noreferrer"&gt;Senator Ron Wyden's letter&lt;/A&gt; about Microsoft's negligence in fixing potential security breaches.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;cc.&amp;nbsp;&lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/91445"&gt;@ttoine&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 10:28:42 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118722#M32738</guid>
      <dc:creator>jleman</dc:creator>
      <dc:date>2023-09-20T10:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118723#M32739</link>
      <description>&lt;P&gt;Not sure if I understand you, but let me make a quick analysis on your vulnerabilities report.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-20860" target="_blank" rel="nofollow noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2023-20860&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Alfresco Share application is not using that kind of pattern. Additionally, Alfresco Share is not using Spring MVC at all.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-20861" target="_blank" rel="nofollow noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2023-20861&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;You could get an external addon including this kind of attack by using &lt;A href="https://docs.spring.io/spring-framework/reference/core/expressions/beandef.html" target="_blank" rel="nofollow noopener noreferrer"&gt;https://docs.spring.io/spring-framework/reference/core/expressions/beandef.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Understanding that you're not accepting or deploying Alfresco Share addons coming from an unknown developer or third-party, you're also safe.&lt;/P&gt;

&lt;P&gt;In any case, &lt;STRONG&gt;Alfresco is updating library versions with every Alfresco release&lt;/STRONG&gt;. So this will be fixed shortly. If you consider this is a high risk for your organization, you can open a Support Ticket to get that fixed as a hot fix.&lt;/P&gt;
&lt;P&gt;What I explained to you before is not the official Hyland Policy, it was just an advice from a colleague trying to help you to solve your problem.&lt;/P&gt;
&lt;P&gt;If you want to verify the official Hyland Policy or raise a concern related to it, please use the official Support Channel. Alfresco Hub is not intended to reply to those kind of questions.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 11:02:56 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118723#M32739</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2023-09-20T11:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco 7.X found vulnerability</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118724#M32740</link>
      <description>&lt;P&gt;&lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/5487"&gt;@angelborroy&lt;/A&gt;&amp;nbsp;Of course if after internal analysis, you can determine to not be affected by the CVE for some reasons that is acceptable for a moment, as Apache Solr did for exemple for a similar breach in &lt;A href="https://solr.apache.org/security.html" target="_self" rel="nofollow noopener noreferrer"&gt;their security review page&lt;/A&gt; for a &lt;FONT color="#FF00FF"&gt;&lt;STRONG&gt;9.8 CVE&lt;/STRONG&gt;&lt;/FONT&gt; :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="solrpng.png" style="width: 990px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image"&gt;&lt;img src="https://connect.hyland.com/t5/image/serverpage/image-id/1675iFE4364B034DBD592/image-size/large?v=v2&amp;amp;px=999" role="button" title="image" alt="image" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;But you'll admit that is far different from saying "&lt;EM&gt;Can you provide a detailed path to exploit this vulnerabilities in Alfresco Share&lt;/EM&gt;", which I understand as :&amp;nbsp; We will only patch it if an exploit has been released (and so, already used against Alfresco instances).&lt;/P&gt;&lt;P&gt;We don't consider this is a high risk, we just gather informations from our security monitoring, the official CVE database and Alfresco communication, that communication should be done when vulnerabilities from 6 months ago are still not patched.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image"&gt;&lt;img src="https://connect.hyland.com/t5/image/serverpage/image-id/1677i812B351D18B643BB/image-size/large?v=v2&amp;amp;px=999" role="button" title="image" alt="image" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Do you have some news about changing the &lt;A href="https://www.alfresco.com/thank-you/thank-you-downloading-alfresco-community-edition" target="_self" rel="nofollow noopener noreferrer"&gt;Community Download Page&lt;/A&gt; ? It is some links to change and can prevent users to download an affected or unsupported version.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;EDIT&lt;/STRONG&gt;&lt;/U&gt; : Download page have been updated&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 12:27:01 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-7-x-found-vulnerability/m-p/118724#M32740</guid>
      <dc:creator>jleman</dc:creator>
      <dc:date>2023-09-20T12:27:01Z</dc:date>
    </item>
  </channel>
</rss>

