Closed stansteenhuis closed 5 years ago
All responses throw :
HTTP/1.1 200 OK ### Server: openresty/1.15.8.1 Date: Thu, 12 Sep 2019 23:51:01 GMT Content-Type: application/json Connection: close Vary: Accept-Encoding Access-Control-Allow-Origin: * Access-Control-Allow-Credentials: true Strict-Transport-Security: max-age=15724800; includeSubDomains Content-Length: 957158
A thread from Amreth indicated that Conducktor is using 0.25.1 which is an upstream fix for the openresty 1.15.8.1 CVE vulnerabilities.
https://github.com/kubernetes/ingress-nginx/releases/tag/nginx-0.25.1
We can close this as we are not dependent on openresty version 1.15.8.1 anymore.
Banner disclosure displays exploited software
----------|---------- he following vulnerabilities for software Jetty, headers - 1 found: CVE-2009-1524 - 4.3 - CVE-2009-1524 Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before 6.1.17 allows remote attackers to inject arbitrary web script or HTML via a directory listing request containing a ; (semicolon) character.
CVE-2011-4461 - 5.0 - CVE-2011-4461 Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
CVE-2005-3747 - 5.0 - CVE-2005-3747 Unspecified vulnerability in Jetty before 5.1.6 allows remote attackers to obtain source code of JSP pages, possibly involving requests for .jsp files with URL-encoded backslash ("%5C") characters. NOTE: this might be the same issue as CVE-2006-2758.
CVE-2009-1523 - 5.0 - CVE-2009-1523 Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.