You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I expect https://nvd.nist.gov/vuln/detail/CVE-2023-44487 to be detected by Grype because jetty version 11.0.16 should be vulnerable.
Issue is correctly detected when match.java.using-cpes: true is set.
How to reproduce it (as minimally and precisely as possible):
I don't have precise reproducer, sorry :(
My best guess is this:
Create spring boot project ( < v3.1.5) with jetty 11.0.16
Build docker image using jib
Run grype scan on resulting docker image
Anything else we need to know?:
Might be related to this issue? github/advisory-database#2869
Issue is correctly detected when match.java.using-cpes: true is set.
Json output for the issue then looks like this:
An initial look is that the upstream GHSA record GHSA-qppj-fm5r-hxr3 needs to be updated to attach it to the java ecosystem for jetty (the netty PR looks to be here github/advisory-database#2908).
What happened:
I have gradle java project that is using jetty server:
What you expected to happen:
I expect https://nvd.nist.gov/vuln/detail/CVE-2023-44487 to be detected by Grype because jetty version 11.0.16 should be vulnerable.
Issue is correctly detected when
match.java.using-cpes: true
is set.How to reproduce it (as minimally and precisely as possible):
I don't have precise reproducer, sorry :(
My best guess is this:
Anything else we need to know?:
Might be related to this issue? github/advisory-database#2869
Issue is correctly detected when
match.java.using-cpes: true
is set.Json output for the issue then looks like this:
Environment:
The text was updated successfully, but these errors were encountered: