Skip to content

Is grizzly-http vulnerable to CVE-2024-45687? #2225

@chschommer

Description

@chschommer

Hello all,

I ran an OWASP scan on our application and encountered a potential security alert related to grizzly. The scan flagged the following:

  • File: tyrus-standalone-client-2.2.0.jar/META-INF/maven/org.glassfish.grizzly/grizzly-http/pom.xml
  • Version: grizzly-http 4.0.2
  • CVE: CVE-2024-45687
  • Description: Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Request/Response Splitting)
  • CVSSv2 Base Score: 2.4

The report indicates that this vulnerability is noted in the context of the Payara Platform (both Payara Server and Payara Micro), suggesting that some Grizzly modules may be involved in this issue. However, it’s not entirely clear whether grizzly-http itself is affected, if this is a false positive, or if a fix/mitigation is already in place. The whole case is a bit confusing for me.

This is my first issue report, so I apologize if I asked a stupid question or did something wrong. Could you please help clarify the following:

  • Is grizzly-http 4.0.2 vulnerable to CVE-2024-45687, or does this report possibly represent a false positive?

  • Do you know if this issue has been addressed in a more recent release, or is there a recommended mitigation?

Any guidance or additional details you could provide would be greatly appreciated.

Thank you for your time and support.

Best regards,
Christopher

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions