diff --git a/CVE.md b/CVE.md index 7c95eef18ba..df18de37069 100644 --- a/CVE.md +++ b/CVE.md @@ -6,8 +6,9 @@ | CVE | Description | |-------------------------------------------------------------------|-----------------| +| [CVE-2023-49093](https://nvd.nist.gov/vuln/detail/CVE-2023-49093) | HtmlUnit suffers from a remote code execution via XSLT vulnerability on versions 3.8.0 and below. Please update to at least version 3.9.0. | | [CVE-2023-2798](https://nvd.nist.gov/vuln/detail/CVE-2023-2798) | HtmlUnit suffers from a denial of service vulnerability on versions 2.69.0 and below. Please update to at least version 2.70.0. | -| [CVE-2023-26119](https://nvd.nist.gov/vuln/detail/CVE-2023-26119) | HtmlUnit suffers from a remote code execution via XSTL vulnerability on versions 2.70.0 and below. Please update to at least version 3.1.0. | -| [CVE-2022-29546](https://nvd.nist.gov/vuln/detail/CVE-2022-29546) | HtmlUnit NekoHtml Parser suffers from a remote code execution via XSTL vulnerability on versions 2.60.0 and below. Please update to at least version 2.70.0 or 3.1.0 | +| [CVE-2023-26119](https://nvd.nist.gov/vuln/detail/CVE-2023-26119) | HtmlUnit suffers from a remote code execution via XSLT vulnerability on versions 2.70.0 and below. Please update to at least version 3.1.0. | +| [CVE-2022-29546](https://nvd.nist.gov/vuln/detail/CVE-2022-29546) | HtmlUnit NekoHtml Parser suffers from a remote code execution via XSLT vulnerability on versions 2.60.0 and below. Please update to at least version 2.70.0 or 3.1.0 | | [CVE-2022-28366](https://nvd.nist.gov/vuln/detail/CVE-2022-28366) | HtmlUnit NekoHtml Parser suffers from a denial of service vulnerability on versions 2.26.0 and below. Please update to at least version 2.70.0 or 3.1.0 | | [CVE-2020-5529](https://nvd.nist.gov/vuln/detail/CVE-2020-5529) | HtmlUnit suffers from a remote code execution vulnerability (improper initialization of the Rhino engine) on versions 2.36.0 and below. Please update to at least version 3.1.0. | diff --git a/README.md b/README.md index 9f6d3845135..559b6adc7c1 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # HtmlUnit -Version 3.8.0 / November 18, 2023 +Version 3.9.0 / December 03, 2023 :heart: [Sponsor](https://github.com/sponsors/rbri) @@ -38,7 +38,7 @@ Add to your `pom.xml`: org.htmlunit htmlunit - 3.8.0 + 3.9.0 ``` @@ -47,7 +47,7 @@ Add to your `pom.xml`: Add to your `build.gradle`: ```groovy -implementation group: 'org.htmlunit', name: 'htmlunit', version: '3.8.0' +implementation group: 'org.htmlunit', name: 'htmlunit', version: '3.9.0' ``` ## Vulnerabilities @@ -122,7 +122,7 @@ Add the snapshot repository and dependency to your `pom.xml`: org.htmlunit htmlunit - 3.9.0-SNAPSHOT + 3.10.0-SNAPSHOT @@ -141,7 +141,7 @@ repositories { } // ... dependencies { - implementation group: 'org.htmlunit', name: 'htmlunit', version: '3.9.0-SNAPSHOT' + implementation group: 'org.htmlunit', name: 'htmlunit', version: '3.10.0-SNAPSHOT' // ... } ``` @@ -185,7 +185,7 @@ Please try to keep your pull requests small (don't bundle unrelated changes) and [![Stargazers](https://starchart.cc/HtmlUnit/htmlunit.svg)](https://starchart.cc/HtmlUnit/htmlunit) -[1]: https://sourceforge.net/projects/htmlunit/files/htmlunit/3.8.0/ "HtmlUnit on sourceforge" +[1]: https://sourceforge.net/projects/htmlunit/files/htmlunit/3.9.0/ "HtmlUnit on sourceforge" [2]: https://jenkins.wetator.org/view/HtmlUnit/ "HtmlUnit CI" [3]: https://twitter.com/HtmlUnit "https://twitter.com/HtmlUnit" [4]: https://www.htmlunit.org "https://www.htmlunit.org" diff --git a/pom.xml b/pom.xml index c724a3506cf..56dd11d4176 100644 --- a/pom.xml +++ b/pom.xml @@ -5,7 +5,7 @@ 4.0.0 org.htmlunit htmlunit - 3.9.0-SNAPSHOT + 3.9.0 HtmlUnit Gargoyle Software Inc. diff --git a/src/changes/changes.xml b/src/changes/changes.xml index cb65c4e5181..2517405a487 100644 --- a/src/changes/changes.xml +++ b/src/changes/changes.xml @@ -7,7 +7,7 @@ - + Upgrade commons-logging to 1.3.0 @@ -18,7 +18,7 @@ New subproject htmlunit-csp. This replaces shapesecurity/salvation. - Enable FEATURE_SECURE_PROCESSING for the MSXML XSLProcessor. + Enable FEATURE_SECURE_PROCESSING for the MSXML XSLProcessor (CVE-2023-49093). neko: fix wrong error processing for some unicode entities. diff --git a/src/site/xdoc/index.xml b/src/site/xdoc/index.xml index 3543f87dfe1..ba3c8d0c12f 100644 --- a/src/site/xdoc/index.xml +++ b/src/site/xdoc/index.xml @@ -57,9 +57,9 @@

-
Latest release November 18, 2023
+
Latest release December 03, 2023
-

version 3.8.0

+

version 3.9.0

Source code
diff --git a/src/site/xdoc/migration.xml b/src/site/xdoc/migration.xml index 59b0722111b..20caf87b22f 100644 --- a/src/site/xdoc/migration.xml +++ b/src/site/xdoc/migration.xml @@ -19,7 +19,7 @@ org.htmlunit htmlunit - 3.8.0 + 3.9.0 ]]>