SmartClient 10.1p has an optional dependency on Apache POI 3.13. Unfortunately there are two CVE's against this version:
CVE-2017-5644 - https://www.cvedetails.com/cve/CVE-2017-5644/
CVE-2017-12626 - https://www.cvedetails.com/cve/CVE-2017-12626/
The last 3.x version 3.17 has no CVE's against it. However, it is not API compatible with 3.13, so it won't work with SmartClient's export functionality at this time.
While both of these vulnerabilities are related to parsing/reading files, and as such SmartClient itself is not vulnerable, it makes it very difficult to write such functionality in such a way that will avoid these issues - basically we'd have to create a relocated 3.17 jar (ala https://imperceptiblethoughts.com/sh...ing-relocation) to avoid the classpath conflict.
SmartClient 12.0p however uses 3.17, so at least theoretically, you could backport the export changes to 10.1p in a later build...?
CVE-2017-5644 - https://www.cvedetails.com/cve/CVE-2017-5644/
CVE-2017-12626 - https://www.cvedetails.com/cve/CVE-2017-12626/
The last 3.x version 3.17 has no CVE's against it. However, it is not API compatible with 3.13, so it won't work with SmartClient's export functionality at this time.
While both of these vulnerabilities are related to parsing/reading files, and as such SmartClient itself is not vulnerable, it makes it very difficult to write such functionality in such a way that will avoid these issues - basically we'd have to create a relocated 3.17 jar (ala https://imperceptiblethoughts.com/sh...ing-relocation) to avoid the classpath conflict.
SmartClient 12.0p however uses 3.17, so at least theoretically, you could backport the export changes to 10.1p in a later build...?
Comment