Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update security advisory GHSA-qh8g-58pp-2wxh for CVE-2024-6763 #12783

Closed
clement-fouque opened this issue Feb 10, 2025 · 7 comments
Closed

Update security advisory GHSA-qh8g-58pp-2wxh for CVE-2024-6763 #12783

clement-fouque opened this issue Feb 10, 2025 · 7 comments
Assignees
Labels

Comments

@clement-fouque
Copy link

You've recently released version 9.4.57.v20241219 that fixes CVE-2024-6763.

Some scanners such as Qualys are not willing to take this version into account until the security advisory GHSA-qh8g-58pp-2wxh is updated (despite we pointed out to the released version). Can you please modify the security advisory to add patched version 9.4.57.v20241219?

Thank you.

@joakime
Copy link
Contributor

joakime commented Feb 10, 2025

Jetty 9.x is now at End of Community Support.

Nobody should be using Jetty 9.x anymore.
I'll look into filing a EOL for Jetty 9/10/11 with Qualys instead.

@joakime
Copy link
Contributor

joakime commented Feb 10, 2025

Note, if you still need support for javax.servlet, then Jetty 12 with the ee8 environment provides that, and is also a mainline / supported version of Jetty.

@joakime
Copy link
Contributor

joakime commented Feb 10, 2025

I've started the process at Eclipse CNA to label Jetty 11/10/9/8/7 as EOL on the CVE/Mitre databases.
That should make its way up to Qualys.

@clement-fouque
Copy link
Author

@joakime thanks for your feedbacks.

I still believe we should update the security advisory even though the version is EOL. All versions eventually reach this EOL stage. If we apply patch 9.4.57.v20241219, it will mitigate CVE-2024-6763 (from an EOL Jetty version).

FYI, I’ll inform "my" developers that Jetty 9.x is end-of-life and that they should migrate to 12.x.

@joakime
Copy link
Contributor

joakime commented Feb 10, 2025

Read CVE-2024-6763, you'll see that you are likely not vulnerable.
Even on 9.4.56 or 9.4.12.

If you just use Jetty Server or Jetty Client then you are not vulnerable.

If you use HttpURI directly AND use it for security features that work with the URI authority, then you are vulnerable.

@joakime
Copy link
Contributor

joakime commented Feb 10, 2025

Incidentally, the recommendations from CVE/Mitre is to not list fixes for EOL versions of products.
Since 9.x is End of Community Support, this CVE will not be updated.

@joakime joakime self-assigned this Feb 10, 2025
@clement-fouque
Copy link
Author

It seems updating the security advisory is not an option. I'm closing the issue. Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants