You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Vulnerable Package issue exists @ Maven-org.eclipse.jetty:jetty-http-9.4.12.RC0 in branch main
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta3, and 11.0.0.alpha0 to 11.0.0.beta3, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single erconnection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
Vulnerable Package issue exists @ Maven-org.eclipse.jetty:jetty-http-9.4.12.RC0 in branch main
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta3, and 11.0.0.alpha0 to 11.0.0.beta3, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single erconnection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
Namespace: cxronen
Repository: AST_BookStore
Repository Url: https://github.com/cxronen/AST_BookStore
CxAST-Project: cxronen/AST_BookStore
CxAST platform scan: 7b020c90-8596-4cab-8cf7-df99ff9705d4
Branch: main
Application: AST_BookStore
Severity: MEDIUM
State: NOT_IGNORED
Status: RECURRENT
CWE: CWE-226
Additional Info
Attack vector: NETWORK
Attack complexity: HIGH
Confidentiality impact: NONE
Availability impact: LOW
Remediation Upgrade Recommendation: 9.4.47.v20220610
References
Mail Thread
Advisory
Commit
Issue
The text was updated successfully, but these errors were encountered: