You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta3, and 11.0.0.alpha0 to 11.0.0.beta3, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single erconnection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
Additional Info Attack vector: NETWORK Attack complexity: HIGH Confidentiality impact: NONE Availability impact: LOW Remediation Upgrade Recommendation: 9.4.53.v20231009
The text was updated successfully, but these errors were encountered:
Checkmarx (SCA): Vulnerable Package
Vulnerability: Read More about CVE-2020-27218
Checkmarx Project: cxronen/BookStore_VSCode
Repository URL: https://github.com/cxronen/BookStore_VSCode
Branch: master
Scan ID: 3aaa12b3-552a-4874-ba98-3d364d7d56f6
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta3, and 11.0.0.alpha0 to 11.0.0.beta3, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single erconnection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
Additional Info
Attack vector: NETWORK
Attack complexity: HIGH
Confidentiality impact: NONE
Availability impact: LOW
Remediation Upgrade Recommendation: 9.4.53.v20231009
The text was updated successfully, but these errors were encountered: