This repository has been archived by the owner on Jun 16, 2023. It is now read-only.
CVE-2020-27223 (Medium) detected in jetty-http-9.4.24.v20191120.jar #8
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2020-27223 - Medium Severity Vulnerability
Vulnerable Library - jetty-http-9.4.24.v20191120.jar
The Eclipse Jetty Project
Library home page: http://www.eclipse.org/jetty
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-http/9.4.24.v20191120/d3f0b0fb016ef8d35ffb199d928ffbcbfa121c86/jetty-http-9.4.24.v20191120.jar
Dependency Hierarchy:
Found in HEAD commit: 4cb9afca7b4ab356e0863ec7515cb10a779ea02d
Found in base branch: master
Vulnerability Details
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
Publish Date: 2021-02-26
URL: CVE-2020-27223
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-m394-8rww-3jr7
Release Date: 2021-02-26
Fix Resolution: org.eclipse.jetty:jetty-http:9.4.37.v20210219, org.eclipse.jetty:jetty-http:10.0.1, org.eclipse.jetty:jetty-http:11.0.1
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: