-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - ktor-server-netty-3.0.1.jar
Path to dependency file: /build.gradle.kts
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-common/4.1.114.Final/862712e292b162c8ccaa7847a6a54df8178f77e5/netty-common-4.1.114.Final.jar
Vulnerabilities
| CVE | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (ktor-server-netty version) | Remediation Possible** | Reachability | |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2024-47535 | 5.5 | Not Defined | 0.0% | netty-common-4.1.114.Final.jar | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-47535
Vulnerable Library - netty-common-4.1.114.Final.jar
Library home page: https://netty.io/
Path to dependency file: /build.gradle.kts
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-common/4.1.114.Final/862712e292b162c8ccaa7847a6a54df8178f77e5/netty-common-4.1.114.Final.jar
Dependency Hierarchy:
- ktor-server-netty-3.0.1.jar (Root Library)
- ktor-server-netty-jvm-3.0.1.jar
- netty-transport-native-epoll-4.1.114.Final.jar
- ❌ netty-common-4.1.114.Final.jar (Vulnerable Library)
- netty-transport-native-epoll-4.1.114.Final.jar
- ktor-server-netty-jvm-3.0.1.jar
Found in base branch: main
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.
Publish Date: 2024-11-12
URL: CVE-2024-47535
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-xq3w-v528-46rv
Release Date: 2024-11-12
Fix Resolution: io.netty:netty-common:4.1.115.Final