Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

同学,您这个项目引入了66个开源组件,存在8个漏洞,辛苦升级一下 #1

Open
ghost opened this issue Mar 9, 2022 · 1 comment

Comments

@ghost
Copy link

ghost commented Mar 9, 2022

检测到 daofaziran1/JLinux-Backend 一共引入了66个开源组件,存在8个漏洞

漏洞标题:Apache Tomcat 信息泄露漏洞
缺陷组件:org.apache.tomcat.embed:tomcat-embed-core@9.0.41
漏洞编号:CVE-2021-25122
漏洞描述:Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。
Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 存在信息泄露漏洞,该漏洞源于可以在一个请求到另一个请求中复制请求头和数量有限的请求体,这意味着用户a和用户B都可以看到用户a的请求结果。
影响范围:[9.0.0.M1, 9.0.43)
最小修复版本:9.0.43
缺陷组件引入路径:cn.edu.zut:JLinux@0.0.1-SNAPSHOT->org.springframework.boot:spring-boot-starter-jersey@2.4.1->org.springframework.boot:spring-boot-starter-tomcat@2.4.1->org.apache.tomcat.embed:tomcat-embed-core@9.0.41

另外还有8个漏洞,详细报告:https://mofeisec.com/jr?p=acf1bc

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant
and others