[ 
https://issues.apache.org/jira/browse/MNG-7227?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Osipov closed MNG-7227.
-------------------------------
    Resolution: Won't Fix

> Fix CVE-2021-37714 present in apache-maven
> ------------------------------------------
>
>                 Key: MNG-7227
>                 URL: https://issues.apache.org/jira/browse/MNG-7227
>             Project: Maven
>          Issue Type: Bug
>          Components: Dependencies
>    Affects Versions: 3.8.2
>            Reporter: swapnil bharshankar
>            Priority: Minor
>
> Following high severity CVE-2021-37714 present in apache maven.
> Description: jsoup is a Java library for working with HTML. Those using jsoup 
> versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to 
> DOS attacks. If the parser is run on user supplied input, an attacker may 
> supply content that causes the parser to get stuck (loop indefinitely until 
> cancelled), to complete more slowly than usual, or to throw an unexpected 
> exception. This effect may support a denial of service attack. The issue is 
> patched in version 1.14.2. There are a few available workarounds. Users may 
> rate limit input parsing, limit the size of inputs based on system resources, 
> and/or implement thread watchdogs to cap and timeout parse runtimes.
> Ref:
>  * [https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c]
>  * [https://nvd.nist.gov/vuln/detail/CVE-2021-37714]



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to