jtimberlake / griffin

Mirror of Apache griffin
Apache License 2.0
0 stars 0 forks source link

CVE-2020-1935 (Medium) detected in tomcat-embed-core-9.0.22.jar #224

Open mend-for-github-com[bot] opened 3 years ago

mend-for-github-com[bot] commented 3 years ago

CVE-2020-1935 - Medium Severity Vulnerability

Vulnerable Library - tomcat-embed-core-9.0.22.jar

Core Tomcat implementation

Library home page: https://tomcat.apache.org/

Path to dependency file: griffin/service/hibernate_mysql_pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/9.0.22/tomcat-embed-core-9.0.22.jar

Dependency Hierarchy: - spring-boot-starter-web-2.1.7.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-2.1.7.RELEASE.jar - :x: **tomcat-embed-core-9.0.22.jar** (Vulnerable Library)

Vulnerability Details

In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.

Publish Date: 2020-02-24

URL: CVE-2020-1935

CVSS 3 Score Details (4.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-6v7p-v754-j89v

Release Date: 2020-02-24

Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:7.0.100,8.5.51,9.0.31;org.apache.tomcat:tomcat-coyote:7.0.100,8.5.51,9.0.31