Open mend-bolt-for-github[bot] opened 4 years ago
Issue-Label Bot is automatically applying the label bug
to this issue, with a confidence of 0.87. Please mark this comment with :thumbsup: or :thumbsdown: to give our bot feedback!
Links: app homepage, dashboard and code for this bot.
CVE-2019-10247 - Medium Severity Vulnerability
Vulnerable Library - jetty-server-9.3.0.M1.jar
The core jetty server artifact.
Library home page: http://www.eclipse.org/jetty
Path to vulnerable library: canner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.3.0.M1/824c17ac5d84c7dc8440c8f5ff0a006aa8bea0ed/jetty-server-9.3.0.M1.jar,canner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.3.0.M1/824c17ac5d84c7dc8440c8f5ff0a006aa8bea0ed/jetty-server-9.3.0.M1.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.3.0.M1/824c17ac5d84c7dc8440c8f5ff0a006aa8bea0ed/jetty-server-9.3.0.M1.jar
Dependency Hierarchy: - :x: **jetty-server-9.3.0.M1.jar** (Vulnerable Library)
Found in HEAD commit: 6aba6affe304a0675ef14a64719deae3c600cd0b
Vulnerability Details
In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
Publish Date: 2019-04-22
URL: CVE-2019-10247
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577
Release Date: 2019-04-22
Fix Resolution: 9.2.28.v20190418
Step up your Open Source Security Game with WhiteSource here