Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

This content has been archived and is no longer being updated.

Links may not function; however, this content may be relevant to outdated versions of the product.

Pegasystems statement concerning the Shellshock Bash vulnerability

Updated on January 9, 2017

Pegasystems does not believe the Shellshock security vulnerability can be exploited on any of the following:

  • Guardrail compliant applications built on PRPC
  • Guardrail compliant Pega frameworks based applications
  • Chordiant Foundation Server (CFS)

Explanation

Shellshock is known to affect web applications implemented via the Common Gateway Interface (CGI) specification. Neither PRPC nor CFS are based on CGI; instead, they are implemented according to the Java Servlet API and deployed as Java Platform, Enterprise Edition (Java EE) applications. PRPC and CFS provide no built-in means for client access to the vulnerability in the underlying layer – the Bash shell.

Suggested approach

Since the vulnerability is in the Bash shell upon which PRPC or CFS may be deployed, it is incumbent upon all customers to ensure that their software infrastructure has been updated with the latest security patches.

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us