You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
CVE-2017-9735 - High Severity Vulnerability
Vulnerable Library - jetty-util-9.4.5.v20170502.jar
Utility classes for Jetty
path: /root/.m2/repository/org/eclipse/jetty/jetty-util/9.4.5.v20170502/jetty-util-9.4.5.v20170502.jar,/root/.m2/repository/org/eclipse/jetty/jetty-util/9.4.5.v20170502/jetty-util-9.4.5.v20170502.jar
Library home page: http://www.eclipse.org/jetty
Dependency Hierarchy:
Vulnerability Details
Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
Publish Date: 2017-06-16
URL: CVE-2017-9735
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Change files
Origin: jetty/jetty.project@f3751d7
Release Date: 2017-05-16
Fix Resolution: Replace or update the following file: Credential.java
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: