tmobile / sawtooth-next-directory

Home for NEXT Directory - Powered by Hyperledger Sawtooth. Chat with the team at https://chat.hyperledger.org/channel/sawtooth-next-directory/
Apache License 2.0
11 stars 7 forks source link

Vulnerable 3rd party with known and published CVE #705

Closed stansteenhuis closed 5 years ago

stansteenhuis commented 5 years ago

Banner disclosure displays exploited software
----------|---------- he following vulnerabilities for software Jetty, headers - 1 found: CVE-2009-1524 - 4.3 - CVE-2009-1524 Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before 6.1.17 allows remote attackers to inject arbitrary web script or HTML via a directory listing request containing a ; (semicolon) character.
CVE-2011-4461 - 5.0 - CVE-2011-4461 Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
CVE-2005-3747 - 5.0 - CVE-2005-3747 Unspecified vulnerability in Jetty before 5.1.6 allows remote attackers to obtain source code of JSP pages, possibly involving requests for .jsp files with URL-encoded backslash ("%5C") characters. NOTE: this might be the same issue as CVE-2006-2758.
CVE-2009-1523 - 5.0 - CVE-2009-1523 Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.

stansteenhuis commented 5 years ago

All responses throw :

HTTP/1.1 200 OK ### Server: openresty/1.15.8.1 Date: Thu, 12 Sep 2019 23:51:01 GMT Content-Type: application/json Connection: close Vary: Accept-Encoding Access-Control-Allow-Origin: * Access-Control-Allow-Credentials: true Strict-Transport-Security: max-age=15724800; includeSubDomains Content-Length: 957158

mtn217 commented 5 years ago

A thread from Amreth indicated that Conducktor is using 0.25.1 which is an upstream fix for the openresty 1.15.8.1 CVE vulnerabilities.

https://github.com/kubernetes/ingress-nginx/releases/tag/nginx-0.25.1

We can close this as we are not dependent on openresty version 1.15.8.1 anymore.