[ 
https://issues.apache.org/jira/browse/QPID-8502?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17275971#comment-17275971
 ] 

ASF GitHub Bot commented on QPID-8502:
--------------------------------------

asfgit closed pull request #79:
URL: https://github.com/apache/qpid-broker-j/pull/79


   


----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
[email protected]


> Upgrade jetty component version
> -------------------------------
>
>                 Key: QPID-8502
>                 URL: https://issues.apache.org/jira/browse/QPID-8502
>             Project: Qpid
>          Issue Type: Improvement
>          Components: Broker-J
>    Affects Versions: qpid-java-broker-8.0.3, qpid-java-broker-7.1.11
>            Reporter: Dedeepya
>            Priority: Major
>
> The below components are reported as vulnerabilities and need to be upgraded
> ||Component Name||Component Version||
> |org.eclipse.jetty:jetty-server| 9.4.31.v20200723|
> The above jetty package is vulnerable to HTTP Request Smuggling. If GZIP 
> request body inflation is enabled and requests from different clients are 
> multiplexed onto a single connection, and if an attacker can send a request 
> with a body that is received entirely but not consumed by the application, 
> then a subsequent request on the same connection will see that body prepended 
> to its body. The attacker will not see any data but may inject data into the 
> body of the subsequent request.
> [https://ssap.jpmchase.net:9093/dashboard/vulnerabilities?id=31463-IBTAMQ-qpid-broker-jpmc_20210122095421]
> This affects the broker and we need to upgrade the jetty version.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to