QID 981994

QID 981994: Java (maven) Security Update for org.eclipse.jetty:jetty-server (GHSA-6x9x-8qw9-9pp6)

In Eclipse Jetty Server versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.

Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to refer to GHSA-6x9x-8qw9-9pp6 for updates pertaining to this vulnerability.
    Vendor References

    CVEs related to QID 981994

    Software Advisories
    Advisory ID Software Component Link
    GHSA-6x9x-8qw9-9pp6 org.eclipse.jetty:jetty-server URL Logo github.com/advisories/GHSA-6x9x-8qw9-9pp6