uthrasri / G3_Jetty

Other
0 stars 0 forks source link

CVE-2024-47535 (Medium) detected in netty-common-4.1.28.Final.jar, netty-common-4.1.3.Final.jar #102

Open mend-bolt-for-github[bot] opened 2 weeks ago

mend-bolt-for-github[bot] commented 2 weeks ago

CVE-2024-47535 - Medium Severity Vulnerability

Vulnerable Libraries - netty-common-4.1.28.Final.jar, netty-common-4.1.3.Final.jar

netty-common-4.1.28.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /jetty-infinispan/infinispan-remote-query/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-common/4.1.28.Final/netty-common-4.1.28.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-common/4.1.28.Final/netty-common-4.1.28.Final.jar

Dependency Hierarchy: - infinispan-client-hotrod-9.4.8.Final.jar (Root Library) - netty-handler-4.1.28.Final.jar - netty-buffer-4.1.28.Final.jar - :x: **netty-common-4.1.28.Final.jar** (Vulnerable Library)

netty-common-4.1.3.Final.jar

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.

Library home page: http://netty.io/

Path to dependency file: /jetty-gcloud/jetty-gcloud-session-manager/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-common/4.1.3.Final/netty-common-4.1.3.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-common/4.1.3.Final/netty-common-4.1.3.Final.jar

Dependency Hierarchy: - google-cloud-datastore-1.0.0.jar (Root Library) - datastore-v1-protos-1.3.0.jar - grpc-google-common-protos-0.1.0.jar - grpc-all-1.0.1.jar - grpc-netty-1.0.1.jar - netty-codec-http2-4.1.3.Final.jar - netty-codec-http-4.1.3.Final.jar - netty-codec-4.1.3.Final.jar - netty-transport-4.1.3.Final.jar - netty-buffer-4.1.3.Final.jar - :x: **netty-common-4.1.3.Final.jar** (Vulnerable Library)

Found in HEAD commit: 4e083d2729623144f1c1a52770c6f85d6a4f3b13

Found in base branch: master

Vulnerability Details

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.

Publish Date: 2024-11-12

URL: CVE-2024-47535

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-xq3w-v528-46rv

Release Date: 2024-11-12

Fix Resolution (io.netty:netty-common): 4.1.115.Final

Direct dependency fix Resolution (org.infinispan:infinispan-client-hotrod): 9.4.12.Final

Fix Resolution (io.netty:netty-common): 4.1.115.Final

Direct dependency fix Resolution (com.google.cloud:google-cloud-datastore): 1.13.0


Step up your Open Source Security Game with Mend here