Skip to content
This repository has been archived by the owner on Feb 26, 2022. It is now read-only.

CVE-2019-10247 (Medium) detected in jetty-server-8.2.0.v20160908.jar #27

Open
mend-bolt-for-github bot opened this issue Jan 31, 2020 · 0 comments
Labels
security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link
Contributor

CVE-2019-10247 - Medium Severity Vulnerability

Vulnerable Library - jetty-server-8.2.0.v20160908.jar

The core jetty server artifact.

Library home page: http://www.eclipse.org/jetty

Path to dependency file: /tmp/ws-scm/listRotator/build.gradle

Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/8.2.0.v20160908/a175d2617631a72ef265060fa263ff4d7d1654a0/jetty-server-8.2.0.v20160908.jar,/root/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/8.2.0.v20160908/a175d2617631a72ef265060fa263ff4d7d1654a0/jetty-server-8.2.0.v20160908.jar

Dependency Hierarchy:

  • google-oauth-client-jetty-1.30.5.jar (Root Library)
    • jetty-server-8.2.0.v20160908.jar (Vulnerable Library)

Found in HEAD commit: d3403669dac65965f62f96df28503a7faceb7ad7

Vulnerability Details

In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.

Publish Date: 2019-04-22

URL: CVE-2019-10247

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577

Release Date: 2019-04-22

Fix Resolution: 9.2.28.v20190418


Step up your Open Source Security Game with WhiteSource here

@mend-bolt-for-github mend-bolt-for-github bot added the security vulnerability Security vulnerability detected by WhiteSource label Jan 31, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

0 participants