The Lucee team received a responsible disclosure for a security vulnerability which affects all previous releases of Lucee.
After reviewing the report and confirming the vulnerability, the Lucee team then conducted a further security review and found additional vulnerabilities which have been addressed as part of this security update.
Latest Stable Releases
5.4.3.2
(recommended)5.3.12.1
Backported Stable Releases
In addition, as we are aware that some Lucee users have not yet upgraded from older versions, we have also published Stable Releases for these older versions with the vulnerability.
5.3.9.173
5.3.8.237
5.3.7.59
Anyone running these older releases are advised to hotfix immediately and then make plans to upgrade to the latest 5.4.3.2 Stable Release, which includes further additional hardening, as well as updated, CVE free java libraries.
As usual, these new versions are available via
- Lucee Admin
- https://download.lucee.org including Windows and Linux installers
- Commandbox https://www.forgebox.io/view/lucee?filter=stable#versions
- Maven https://mvnrepository.com/artifact/org.lucee/lucee (uploaded just not showing on the listing)
- Official Lucee Docker Images Docker
To immediately patch a server, drop the appropriate .lco
/ core file from https://download.lucee.org into your install’s `lucee-server\deploy`` folder, i.e. https://cdn.lucee.org/5.4.3.2.lco
Updating via the deploy folder is exactly the same process as updating via the Lucee admin.
To receive emails regarding advisories like this, please sign up for our Announcement mailing list
All these builds have XXE mitigations enabled by default
You can override them using xmlFeatures settings in Application.cfc, or in 5.4.3.2 you can override them with isXml() or xmlParse() on a case by case basis