Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

同学,您这个项目引入了380个开源组件,存在14个漏洞,辛苦升级一下 #64

Open
ghost opened this issue Mar 11, 2022 · 2 comments

Comments

@ghost
Copy link

ghost commented Mar 11, 2022

检测到 dermatologist/ckblib 一共引入了380个开源组件,存在14个漏洞

漏洞标题:Netty 安全漏洞
缺陷组件:io.netty:[email protected]
漏洞编号:CVE-2021-43797
漏洞描述:Netty是Netty社区的一款非阻塞I/O客户端-服务器框架,它主要用于开发Java网络应用程序,如协议服务器和客户端等。
Netty 存在安全漏洞,该漏洞源于Netty是一个异步事件驱动的网络应用框架,用于快速开发可维护的高性能协议服务器和客户端。版本4.1.7.1之前的Netty。当控件字符出现在头名称的开头和结尾时,Final将跳过它们。相反,它应该很快失败,因为这是规范不允许的,可能会导致HTTP请求走私。如果没有进行验证,netty可能会在将这些头名称转发给另一个用作代理的远程系统之前对其进行“消毒”。这个远程系统无法再看到无效的使用,因此无法看到
影响范围:(∞, 4.1.71.Final)
最小修复版本:4.1.71.Final
缺陷组件引入路径:com.canehealth.ckblib:[email protected]>org.springframework.boot:[email protected]>org.springframework.boot:[email protected]>io.projectreactor.netty:[email protected]>io.netty:[email protected]

另外还有14个漏洞,详细报告:https://mofeisec.com/jr?p=i47205

@welcome
Copy link

welcome bot commented Mar 11, 2022

Thank you for raising the issue. We will try and get back to you as soon as possible.
Be sure to star ✨ the repository for a priority response!
Please make sure you have given us as much context as possible.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant
and others