Damien Diederen created ZOOKEEPER-4233:
------------------------------------------

             Summary: dependency-check:check failing - Jetty 9.4.35.v20201120 - 
CVE-2020-27223
                 Key: ZOOKEEPER-4233
                 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-4233
             Project: ZooKeeper
          Issue Type: Task
            Reporter: Damien Diederen
            Assignee: Damien Diederen


What do you know—I encountered a Jetty vulnerability while trying to prepare a 
new 3.7.0 RC:

{noformat}
[ERROR] Failed to execute goal org.owasp:dependency-check-maven:5.3.0:check 
(default-cli) on project zookeeper: 
[ERROR] 
[ERROR] One or more dependencies were identified with vulnerabilities that have 
a CVSS score greater than or equal to '0.0': 
[ERROR] 
[ERROR] jetty-server-9.4.35.v20201120.jar: CVE-2020-27223
[ERROR] jetty-http-9.4.35.v20201120.jar: CVE-2020-27223
{noformat}

[CVE-2020-27223|https://nvd.nist.gov/vuln/detail/CVE-2020-27223] describes it 
as:

{quote}
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 
11.0.0 when Jetty handles a request containing multiple Accept headers with a 
large number of “quality” (i.e. q) parameters, the server may enter a denial of 
service (DoS) state due to high CPU usage processing those quality values, 
resulting in minutes of CPU time exhausted processing those quality values.
{quote}

This may not be the end of the world wrt. ZooKeeper, but it doesn't look good 
in a fresh release.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to