Release Notes - Payara Platform Enterprise 5.31.0
Note
Security Vulnerability
We recently discovered and fixed an important security vulnerability within the Payara Server and Payara Micro products. A path Traversal security issue was found when the application is deployed under the root context which allowed a hacker to read from the file system of the server running the application. We highly recommend that you upgrade to this version to avoid the security issue. |
Bug Fixes
-
[FISH-5711] Fix Could Not Load Formatter Class Error in Payara Micro
-
[FISH-5701] Application Does not Deploy Anymore on Payara Server Docker Image
-
[FISH-5695] (Community Contribution - Empressia) ArrayIndexOutOfBoundsException When the ConfigProperty Value Ends in a Dollar Sign
-
[FISH-5693] Delimiter for Configuring Multiple KeyStores and TrustStores must use JVM Platform Delimiter
-
[FISH-5691] Do not Propagate Non-Transactional EM to Managed Tasks
-
[FISH-5690] Remove Duplicate postInvoke Handler Invocation on Failure
-
[FISH-5660] Deployment Failure on Payara Micro
-
[FISH-1058] Payara Micro - Wrong ClassLoader with Multiple Apps
-
[FISH-966] Fix Asadmin stop-domain Help Text
-
[FISH-81] Fix Incorrect Error "No valid EE environment for injection" for CDI Reported for Events