Skip to content

ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223#1624

Closed
ztzg wants to merge 1 commit intoapache:branch-3.6from
ztzg:ZOOKEEPER-4023-jetty-CVE-2020-27223-x-3.6
Closed

ZOOKEEPER-4233: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223#1624
ztzg wants to merge 1 commit intoapache:branch-3.6from
ztzg:ZOOKEEPER-4023-jetty-CVE-2020-27223-x-3.6

Conversation

@ztzg
Copy link
Contributor

@ztzg ztzg commented Mar 7, 2021

The OWASP checker reports that the version of Jetty currently
referenced by this branch is vulnerable to a CVE:

[ERROR] Failed to execute goal org.owasp:dependency-check-maven:5.3.0:check (default-cli) on project zookeeper: 
[ERROR] 
[ERROR] One or more dependencies were identified with vulnerabilities that have a CVSS score greater than or equal to '0.0': 
[ERROR] 
[ERROR] jetty-server-9.4.35.v20201120.jar: CVE-2020-27223
[ERROR] jetty-http-9.4.35.v20201120.jar: CVE-2020-27223

https://nvd.nist.gov/vuln/detail/CVE-2020-27223 describes it as:

In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive),
10.0.0, and 11.0.0 when Jetty handles a request containing multiple
Accept headers with a large number of "quality" (i.e. q) parameters,
the server may enter a denial of service (DoS) state due to high CPU
usage processing those quality values, resulting in minutes of CPU
time exhausted processing those quality values.

This changeset bumps Jetty to 9.4.38.v20210224, which is the latest
as of the commit date.

Copy link
Contributor

@eolivelli eolivelli left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1

asfgit pushed a commit that referenced this pull request Mar 8, 2021
…20 - CVE-2020-27223

The OWASP checker reports that the version of Jetty currently
referenced by this branch is vulnerable to a CVE:

    [ERROR] Failed to execute goal org.owasp:dependency-check-maven:5.3.0:check (default-cli) on project zookeeper:
    [ERROR]
    [ERROR] One or more dependencies were identified with vulnerabilities that have a CVSS score greater than or equal to '0.0':
    [ERROR]
    [ERROR] jetty-server-9.4.35.v20201120.jar: CVE-2020-27223
    [ERROR] jetty-http-9.4.35.v20201120.jar: CVE-2020-27223

https://nvd.nist.gov/vuln/detail/CVE-2020-27223 describes it as:

> In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive),
> 10.0.0, and 11.0.0 when Jetty handles a request containing multiple
> Accept headers with a large number of "quality" (i.e. q) parameters,
> the server may enter a denial of service (DoS) state due to high CPU
> usage processing those quality values, resulting in minutes of CPU
> time exhausted processing those quality values.

This changeset bumps Jetty to 9.4.38.v20210224, which is the latest
as of the commit date.

Author: Damien Diederen <dd@crosstwine.com>

Reviewers: Enrico Olivelli <eolivelli@apache.org>, Mohammad Arshad <arshad@apache.org>

Closes #1624 from ztzg/ZOOKEEPER-4023-jetty-CVE-2020-27223-x-3.6
@arshadmohammad
Copy link
Contributor

Merged

@ztzg
Copy link
Contributor Author

ztzg commented Mar 9, 2021

Thanks! (No idea why this PR was not automatically closed, though.)

@ztzg ztzg closed this Mar 9, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants