[
https://issues.apache.org/jira/browse/ZOOKEEPER-4876?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17890378#comment-17890378
]
Damien Diederen edited comment on ZOOKEEPER-4876 at 10/17/24 8:56 AM:
----------------------------------------------------------------------
I looked into this, and bumping the dependency to the latest release of Jetty
advertised on [https://jetty.org/download.html], {{{}9.4.56.v20240826{}}},
apparently resolves a fresh {{{}CVE-2024-8184{}}}, but *not*
{{{}CVE-2024-6763{}}}—both having been published on 2024-10-14.
Worse, still, this comment says:
[https://github.com/jetty/jetty.project/pull/12012#issuecomment-2416450253]
{quote}This will not be backported to an End of Community Support version of
Jetty.
{quote}
On the other hand, it continues with:
{quote}As stated in
[CVE-2024-6763|https://github.com/advisories/GHSA-qh8g-58pp-2wxh], the use of
Jetty server, or Jetty client, does not make you vulnerable to that CVE.
{quote}
The linked report itself explains:
{quote}The impact of this vulnerability is limited to developers that use the
Jetty HttpURI directly. Example: your project implemented a blocklist to block
on some hosts based on HttpURI's handling of authority section.
{quote}
So: should we upgrade to 9.4.56 and suppress CVE-2024-6763? (Note that I
haven't performed an analysis of the affected source code!)
WDYT?
was (Author: ddiederen):
I looked into this, and bumping the dependency to the latest release of Jetty
advertised on [https://jetty.org/download.html], {{{}9.4.56.v20240826{}}},
apparently resolves a fresh {{{}CVE-2024-8184{}}}, but *not*
{{{}CVE-2024-6763{}}}—both having been published on 2024-10-14.
Worse, still, this comment says:
[https://github.com/jetty/jetty.project/pull/12012#issuecomment-2416450253]
{quote}This will not be backported to an End of Community Support version of
Jetty. […]
{quote}
On the other hand, it continues with:
{quote}[…] As stated in
[CVE-2024-6763|https://github.com/advisories/GHSA-qh8g-58pp-2wxh], the use of
Jetty server, or Jetty client, does not make you vulnerable to that CVE.
{quote}
The linked report itself explains:
{quote}The impact of this vulnerability is limited to developers that use the
Jetty HttpURI directly. Example: your project implemented a blocklist to block
on some hosts based on HttpURI's handling of authority section. […]
{quote}
So: should we upgrade to 9.4.56 and suppress CVE-2024-6763? (Note that I
haven't performed an analysis of the affected source code!)
WDYT?
> jetty-http-9.4.53.v20231009.jar: CVE-2024-6763(3.7)
> ---------------------------------------------------
>
> Key: ZOOKEEPER-4876
> URL: https://issues.apache.org/jira/browse/ZOOKEEPER-4876
> Project: ZooKeeper
> Issue Type: Bug
> Components: server
> Affects Versions: 3.8.4, 3.9.2, 3.10
> Reporter: Andor Molnar
> Priority: Major
>
--
This message was sent by Atlassian Jira
(v8.20.10#820010)