-
Notifications
You must be signed in to change notification settings - Fork 88
Description
Hello all,
I ran an OWASP scan on our application and encountered a potential security alert related to grizzly. The scan flagged the following:
- File: tyrus-standalone-client-2.2.0.jar/META-INF/maven/org.glassfish.grizzly/grizzly-http/pom.xml
- Version: grizzly-http 4.0.2
- CVE: CVE-2024-45687
- Description: Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Request/Response Splitting)
- CVSSv2 Base Score: 2.4
The report indicates that this vulnerability is noted in the context of the Payara Platform (both Payara Server and Payara Micro), suggesting that some Grizzly modules may be involved in this issue. However, it’s not entirely clear whether grizzly-http itself is affected, if this is a false positive, or if a fix/mitigation is already in place. The whole case is a bit confusing for me.
This is my first issue report, so I apologize if I asked a stupid question or did something wrong. Could you please help clarify the following:
-
Is grizzly-http 4.0.2 vulnerable to CVE-2024-45687, or does this report possibly represent a false positive?
-
Do you know if this issue has been addressed in a more recent release, or is there a recommended mitigation?
Any guidance or additional details you could provide would be greatly appreciated.
Thank you for your time and support.
Best regards,
Christopher