Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.eclipse.jetty/jetty-openid@9.4.29.v20200521
Typemaven
Namespaceorg.eclipse.jetty
Namejetty-openid
Version9.4.29.v20200521
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version9.4.52.v20230823
Latest_non_vulnerable_version11.0.16
Affected_by_vulnerabilities
0
url VCID-rpc4-u4aq-4qde
vulnerability_id VCID-rpc4-u4aq-4qde
summary
Jetty's OpenId Revoked authentication allows one request
If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated.

So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41900.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41900
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32288
published_at 2026-04-29T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32372
published_at 2026-04-26T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32487
published_at 2026-04-24T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32642
published_at 2026-04-21T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32671
published_at 2026-04-18T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32695
published_at 2026-04-16T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32656
published_at 2026-04-13T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32684
published_at 2026-04-12T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32721
published_at 2026-04-11T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.3272
published_at 2026-04-09T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32694
published_at 2026-04-08T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32646
published_at 2026-04-07T12:55:00Z
12
value 0.00131
scoring_system epss
scoring_elements 0.32789
published_at 2026-04-02T12:55:00Z
13
value 0.00131
scoring_system epss
scoring_elements 0.32825
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26048
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26049
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36479
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40167
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41900
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/eclipse/jetty.project
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse/jetty.project
9
reference_url https://github.com/eclipse/jetty.project/pull/9528
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/
url https://github.com/eclipse/jetty.project/pull/9528
10
reference_url https://github.com/eclipse/jetty.project/pull/9660
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/
url https://github.com/eclipse/jetty.project/pull/9660
11
reference_url https://security.netapp.com/advisory/ntap-20231110-0004
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231110-0004
12
reference_url https://www.debian.org/security/2023/dsa-5507
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/
url https://www.debian.org/security/2023/dsa-5507
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247052
reference_id 2247052
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247052
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-41900
reference_id CVE-2023-41900
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-41900
15
reference_url https://github.com/advisories/GHSA-pwh8-58vv-vw48
reference_id GHSA-pwh8-58vv-vw48
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pwh8-58vv-vw48
16
reference_url https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
reference_id GHSA-pwh8-58vv-vw48
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/
url https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
17
reference_url https://security.netapp.com/advisory/ntap-20231110-0004/
reference_id ntap-20231110-0004
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:17:02Z/
url https://security.netapp.com/advisory/ntap-20231110-0004/
fixed_packages
0
url pkg:maven/org.eclipse.jetty/jetty-openid@9.4.52.v20230823
purl pkg:maven/org.eclipse.jetty/jetty-openid@9.4.52.v20230823
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-openid@9.4.52.v20230823
1
url pkg:maven/org.eclipse.jetty/jetty-openid@10.0.16
purl pkg:maven/org.eclipse.jetty/jetty-openid@10.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-openid@10.0.16
2
url pkg:maven/org.eclipse.jetty/jetty-openid@11.0.16
purl pkg:maven/org.eclipse.jetty/jetty-openid@11.0.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-openid@11.0.16
aliases CVE-2023-41900, GHSA-pwh8-58vv-vw48
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rpc4-u4aq-4qde
Fixing_vulnerabilities
Risk_score1.6
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.jetty/jetty-openid@9.4.29.v20200521