This repository has been archived by the owner on Jun 16, 2023. It is now read-only.
CVE-2017-9735 (High) detected in jetty-util-7.6.21.v20160908.jar, jetty-util-8.1.22.v20160922.jar #12
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2017-9735 - High Severity Vulnerability
Vulnerable Libraries - jetty-util-7.6.21.v20160908.jar, jetty-util-8.1.22.v20160922.jar
jetty-util-7.6.21.v20160908.jar
Utility classes for Jetty
Library home page: http://www.eclipse.org/jetty
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-util/7.6.21.v20160908/bd135a2685448834da4e0e993252620141d7528b/jetty-util-7.6.21.v20160908.jar
Dependency Hierarchy:
jetty-util-8.1.22.v20160922.jar
Utility classes for Jetty
Library home page: http://www.eclipse.org/jetty
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-util/8.1.22.v20160922/5ae59f43ce3a356c98d6a3b7b2b8ef46f227ff1d/jetty-util-8.1.22.v20160922.jar
Dependency Hierarchy:
Found in HEAD commit: 4cb9afca7b4ab356e0863ec7515cb10a779ea02d
Found in base branch: master
Vulnerability Details
Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
Publish Date: 2017-06-16
URL: CVE-2017-9735
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784
Release Date: 2017-06-16
Fix Resolution: 9.4.7.RC0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: