akash-k-ephesoft / test-1

Other
0 stars 0 forks source link

jetty-util-8.1.15.v20140411.jar: 2 vulnerabilities (highest severity is: 7.5) #67

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago
Vulnerable Library - jetty-util-8.1.15.v20140411.jar

Utility classes for Jetty

Library home page: http://www.eclipse.org/jetty

Path to vulnerable library: /lib/jetty-util-8.1.15.v20140411.jar

Found in HEAD commit: bafe36287e51aaacdb1ab47c78bd429757cdc4f2

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (jetty-util version) Remediation Possible**
CVE-2017-9735 High 7.5 jetty-util-8.1.15.v20140411.jar Direct 9.2.22.v20170606
CVE-2019-10241 Medium 6.1 jetty-util-8.1.15.v20140411.jar Direct 9.2.27.v20190403

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2017-9735 ### Vulnerable Library - jetty-util-8.1.15.v20140411.jar

Utility classes for Jetty

Library home page: http://www.eclipse.org/jetty

Path to vulnerable library: /lib/jetty-util-8.1.15.v20140411.jar

Dependency Hierarchy: - :x: **jetty-util-8.1.15.v20140411.jar** (Vulnerable Library)

Found in HEAD commit: bafe36287e51aaacdb1ab47c78bd429757cdc4f2

Found in base branch: main

### Vulnerability Details

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

Publish Date: 2017-06-16

URL: CVE-2017-9735

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784

Release Date: 2017-06-16

Fix Resolution: 9.2.22.v20170606

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
CVE-2019-10241 ### Vulnerable Library - jetty-util-8.1.15.v20140411.jar

Utility classes for Jetty

Library home page: http://www.eclipse.org/jetty

Path to vulnerable library: /lib/jetty-util-8.1.15.v20140411.jar

Dependency Hierarchy: - :x: **jetty-util-8.1.15.v20140411.jar** (Vulnerable Library)

Found in HEAD commit: bafe36287e51aaacdb1ab47c78bd429757cdc4f2

Found in base branch: main

### Vulnerability Details

In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.

Publish Date: 2019-04-22

URL: CVE-2019-10241

### CVSS 3 Score Details (6.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10241

Release Date: 2019-04-22

Fix Resolution: 9.2.27.v20190403

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)