Skip to content

Update dependency com.mchange:c3p0 to v0.12.0 [SECURITY]#863

Open
renovate[bot] wants to merge 1 commit intorelease/6.0.xfrom
renovate/c3p0.version
Open

Update dependency com.mchange:c3p0 to v0.12.0 [SECURITY]#863
renovate[bot] wants to merge 1 commit intorelease/6.0.xfrom
renovate/c3p0.version

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate bot commented Feb 22, 2026

This PR contains the following updates:

Package Change Age Confidence
com.mchange:c3p0 (source) 0.11.20.12.0 age confidence

GitHub Vulnerability Alerts

CVE-2026-27830

Impact

c3p0 is vulnerable to attack via maliciously crafted Java-serialized objects and javax.naming.Reference instances. Several c3p0 ConnectionPoolDataSource implementations have a property called userOverridesAsString which conceptually represents a Map<String,Map<String,String>>. Prior to v0.12.0, that property was maintained as a hex-encoded serialized object. Any attacker able to reset this property, on an existing ConnectionPoolDataSource or via maliciously crafted serialized objects or javax.naming.Reference instances could be tailored execute unexpected code on the application's CLASSPATH.

The danger of this vulnerability was strongly magnified by vulnerabilities in c3p0's main dependency, mchange-commons-java. This library includes code that mirrors early implementations of JNDI functionality, including ungated support for remote factoryClassLocation values. Attackers could set c3p0's userOverridesAsString hex-encoded serialized objects that include objects "indirectly serialized" via JNDI references. Deserialization of those objects and dereferencing of the embedded javax.naming.Reference objects could provoke download and execution of malicious code from a remote factoryClassLocation.

Although hazard presented by c3p0's vulnerabilites are exarcerbated by vulnerabilities in mchange-commons-java, use of Java-serialized-object hex as the format for a writable Java-Bean property, of objects that may be exposed across JNDI interfaces, represents a serious independent fragility.

Patches

The userOverridesAsString property of c3p0 ConnectionPoolDataSource classes has been reimplemented to use a safe CSV-based format, rather than rely upon potentially dangerous Java object deserialization.

c3p0-0.12.0+ and above depend upon mchange-commons-java 0.4.0+, which gates support for remote factoryClassLocation values by configuration parameters that default to restrictive values. Those parameters are documented here.

c3p0 additionally enforces the new mchange-commons-java com.mchange.v2.naming.nameGuardClassName to prevent injection of unexpected, potentially remote JNDI names.

Workarounds

Users should upgrade to c3p0-0.12.0 or above. There is no supported workaround for earlier versions of c3p0.

References

c3p0, you little rascal — Hans-Martin Münch
c3p0 documentation, security note
c3p0 documentation, configuring security

Severity
  • CVSS Score: 8.9 / 10 (High)
  • Vector String: CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Release Notes

swaldman/c3p0 (com.mchange:c3p0)

v0.12.0

Compare Source


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot changed the title Update dependency com.mchange:c3p0 to v0.12.0 Update dependency com.mchange:c3p0 to v0.12.0 [SECURITY] Feb 25, 2026
@renovate renovate bot force-pushed the renovate/c3p0.version branch from 7710232 to 6645414 Compare April 15, 2026 20:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants