You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: swagger-core/modules/swagger-gradle-plugin/build.gradle
Path to vulnerable library: swagger-core/modules/swagger-maven-plugin/target/lib/jetty-http-9.4.35.v20201120.jar,/tmp/ws-ua_20210222154047_OBVBMI/downloadResource_DRWACO/20210222154148/jetty-http-9.4.35.v20201120.jar
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of ???quality??? (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
mend-for-github-combot
changed the title
CVE-2020-27223 (Medium) detected in jetty-http-9.4.35.v20201120.jar
CVE-2020-27223 (Medium) detected in jetty-http-9.4.35.v20201120.jar - autoclosed
Apr 9, 2021
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
CVE-2020-27223 - Medium Severity Vulnerability
Library home page: https://eclipse.org/jetty
Path to dependency file: swagger-core/modules/swagger-gradle-plugin/build.gradle
Path to vulnerable library: swagger-core/modules/swagger-maven-plugin/target/lib/jetty-http-9.4.35.v20201120.jar,/tmp/ws-ua_20210222154047_OBVBMI/downloadResource_DRWACO/20210222154148/jetty-http-9.4.35.v20201120.jar
Dependency Hierarchy:
Found in base branch: master
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of ???quality??? (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
Publish Date: 2021-02-26
URL: CVE-2020-27223
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-m394-8rww-3jr7
Release Date: 2021-02-26
Fix Resolution: org.eclipse.jetty:jetty-http:9.4.37.v20210219, org.eclipse.jetty:jetty-http:10.0.1, org.eclipse.jetty:jetty-http:11.0.1
The text was updated successfully, but these errors were encountered: