CVE-2024-22201 (High) detected in http2-common-11.0.18.jar - autoclosed #4186
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
Milestone
CVE-2024-22201 - High Severity Vulnerability
Vulnerable Library - http2-common-11.0.18.jar
Library home page: https://eclipse.dev/jetty
Path to dependency file: /data-prepper-plugins/s3-source/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-common/11.0.18/c63d6f334b58e61b8e0c2d6bb769b1bd31ab736d/http2-common-11.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 2f4c8c9c7f8d4ec6e76c3653ef8446fcee35cd50
Found in base branch: main
Vulnerability Details
Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6.
Publish Date: 2024-02-26
URL: CVE-2024-22201
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-rggv-cv7r-mw98
Release Date: 2024-02-26
Fix Resolution: org.eclipse.jetty.http2:http2-common:9.4.54,10.0.20,11.0.20, org.eclipse.jetty.http2:jetty-http2-common:12.0.6, org.eclipse.jetty.http3:http3-common:10.0.20,11.0.20, org.eclipse.jetty.http3:jetty-http3-common:12.0.6
The text was updated successfully, but these errors were encountered: