Damien Diederen created ZOOKEEPER-4233: ------------------------------------------
Summary: dependency-check:check failing - Jetty 9.4.35.v20201120 - CVE-2020-27223 Key: ZOOKEEPER-4233 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-4233 Project: ZooKeeper Issue Type: Task Reporter: Damien Diederen Assignee: Damien Diederen What do you know—I encountered a Jetty vulnerability while trying to prepare a new 3.7.0 RC: {noformat} [ERROR] Failed to execute goal org.owasp:dependency-check-maven:5.3.0:check (default-cli) on project zookeeper: [ERROR] [ERROR] One or more dependencies were identified with vulnerabilities that have a CVSS score greater than or equal to '0.0': [ERROR] [ERROR] jetty-server-9.4.35.v20201120.jar: CVE-2020-27223 [ERROR] jetty-http-9.4.35.v20201120.jar: CVE-2020-27223 {noformat} [CVE-2020-27223|https://nvd.nist.gov/vuln/detail/CVE-2020-27223] describes it as: {quote} In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values. {quote} This may not be the end of the world wrt. ZooKeeper, but it doesn't look good in a fresh release. -- This message was sent by Atlassian Jira (v8.3.4#803005)