[
https://issues.apache.org/jira/browse/MNG-7227?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Michael Osipov closed MNG-7227.
-------------------------------
Resolution: Won't Fix
> Fix CVE-2021-37714 present in apache-maven
> ------------------------------------------
>
> Key: MNG-7227
> URL: https://issues.apache.org/jira/browse/MNG-7227
> Project: Maven
> Issue Type: Bug
> Components: Dependencies
> Affects Versions: 3.8.2
> Reporter: swapnil bharshankar
> Priority: Minor
>
> Following high severity CVE-2021-37714 present in apache maven.
> Description: jsoup is a Java library for working with HTML. Those using jsoup
> versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to
> DOS attacks. If the parser is run on user supplied input, an attacker may
> supply content that causes the parser to get stuck (loop indefinitely until
> cancelled), to complete more slowly than usual, or to throw an unexpected
> exception. This effect may support a denial of service attack. The issue is
> patched in version 1.14.2. There are a few available workarounds. Users may
> rate limit input parsing, limit the size of inputs based on system resources,
> and/or implement thread watchdogs to cap and timeout parse runtimes.
> Ref:
> * [https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c]
> * [https://nvd.nist.gov/vuln/detail/CVE-2021-37714]
--
This message was sent by Atlassian Jira
(v8.20.1#820001)