On Mon, Feb 24, 2025 at 6:40 PM Jason Gerlowski <gerlowsk...@gmail.com> wrote:
> Published CVEs are public information, so as a project we try to discuss > them on our "public" mailing lists only. So, no need to loop in ' > secur...@solr.apache.org' in the future - that list is reserved for > potential "new" vulnerabilities. See our Security Policy for more details. > [1] > Great response. It might also have been worth mentioning that cross-posting between a private list (security@) and a public one (users@) as happened here is discouraged. > To speak to CVE-2024-6763 in particular: Solr 9.7 is unaffected. We do > use the Jetty jar in question, but we *don't* use the specific utility > class ("HttpURI") required for the vulnerability. > Cool - and I see you're also already adding this to your website ( https://github.com/apache/solr-site/pull/143) 👍 Kind regards, Arnout > On Tue, Feb 18, 2025 at 3:18 PM Altamirano, Emmanuel < > emmanuel.altamir...@transunion.com> wrote: > >> Hi community. By the chance do you have any update regarding this >> reported CVE-2024-6763? >> >> Best, >> >> *Emmanuel Altamirano* >> >> *(E-man-u-well aa l t aa – m ih r AA n oh)* >> >> Sr Consultant, Applications Development >> >> emmanuel.altamir...@transunion.com >> >> *P: *312-985-3149 >> >> *M:* 312-860-3774 >> >> 555 West Adams St | Chicago, IL 60661 >> >> transunion.com >> >> Pronouns: He/Him >> >> [image: TULogo-blue-rgb-120px-01] >> >> >> >> This email including, without limitation, the attachments, if any, >> accompanying this email, may contain information which is confidential or >> privileged and exempt from disclosure under applicable law. The information >> is for the use of the intended recipient. If you are not the intended >> recipient, be aware that any disclosure, copying, distribution, review or >> use of the contents of this email, and/or its attachments, is without >> authorization and is prohibited. If you have received this email in error, >> please notify us by reply email immediately and destroy all copies of this >> email and its attachments. >> >> >> >> ------------------------------ >> *From:* Akash Bande <akash.bande.w...@gmail.com> >> *Sent:* Thursday, February 13, 2025 7:26 AM >> *To:* users@solr.apache.org <users@solr.apache.org>; >> secur...@solr.apache.org <secur...@solr.apache.org> >> *Cc:* Altamirano, Emmanuel <emmanuel.altamir...@transunion.com> >> *Subject:* Medium vulnerability CVE-2024-6763 found in >> org.eclipse.jetty:jetty-http 10.0.22 >> >> This Message is from a New Sender >> This message was sent from a sender with whom you have not previously >> corresponded. >> Report Suspicious >> <https://us-phishalarm-ewt.proofpoint.com/EWT/v1/GX53klZ1TQ0!Y2Oq2O_VnLdrKaNjiGPCY5iAgLasdnz2JqH67BlpjlJqyqgzL5O5qylTdJY4UZQJfACG3HekaTShuKMMYbyVz9I1yuW6JtvUHgsshoIcjx-QSZR9hESEC1veBYs-la1yHeHAKA$> >> >> >> Hello solr security team and users, >> >> Our team found medium level vulnerability in checkmarx report for the >> dependency org.eclipse.jetty:jetty-http 10.0.22 in the solr-9.7.0 package. >> >> Details of reported vulnerability is as follows, >> Id : CVE-2024-6763 >> >> Category : CWE-1286 | Improper Validation of Syntactic >> Correctness of Input >> >> Dependency : org.eclipse.jetty:jetty-http 10.0.22 >> >> Can you please take a note of it and suggest us remedy if any. >> >> >> >> Thanks and regards, >> >> Akash Bande. >> > -- Arnout Engelen ASF Security Response Apache Pekko PMC member, ASF Member NixOS Committer Independent Open Source consultant