You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Vulnerable Package issue exists @ Maven-org.eclipse.jetty:jetty-http-9.4.12.RC0 in branch master
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta3, and 11.0.0.alpha0 to 11.0.0.beta3, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single erconnection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
Vulnerable Package issue exists @ Maven-org.eclipse.jetty:jetty-http-9.4.12.RC0 in branch master
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta3, and 11.0.0.alpha0 to 11.0.0.beta3, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single erconnection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
Namespace: cxronen
Repository: BookStore_VSCode
Repository Url: https://github.com/cxronen/BookStore_VSCode
CxAST-Project: cxronen/BookStore_VSCode
CxAST platform scan: 0ca01943-91f6-456a-b680-4d9b60bd23f3
Branch: master
Application: BookStore_VSCode
Severity: MEDIUM
State: NOT_IGNORED
Status: RECURRENT
CWE: CWE-226
Additional Info
Attack vector: NETWORK
Attack complexity: HIGH
Confidentiality impact: NONE
Availability impact: LOW
Remediation Upgrade Recommendation: 9.4.47.v20220610
References
Mail Thread
Advisory
Commit
Issue
The text was updated successfully, but these errors were encountered: