QID 982094

QID 982094: Java (maven) Security Update for org.eclipse.jetty:jetty-server (GHSA-86wm-rrjm-8wh8)

Security update has been released for org.eclipse.jetty:jetty-server to fix the vulnerability.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

If GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection and if an
attacker can send a request with a body that is received entirely by not consumed by the application, then a subsequent request
on the same connection will see that body prepended to it's body.

The attacker will not see any data, but may inject data into the body of the subsequent request

CVE score is [4.8 AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&version=3.1)

  • CVSS V3 rated as Medium - 4.8 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    Customers are advised to refer to GHSA-86wm-rrjm-8wh8 for updates pertaining to this vulnerability.Workaround:
    The problem can be worked around by either:
    - Disabling compressed request body inflation by GzipHandler.
    - By always fully consuming the request content before sending a response.
    - By adding a `Connection: close` to any response where the servlet does not fully consume request content.
    Vendor References

    CVEs related to QID 982094

    Software Advisories
    Advisory ID Software Component Link
    GHSA-86wm-rrjm-8wh8 org.eclipse.jetty:jetty-server URL Logo github.com/advisories/GHSA-86wm-rrjm-8wh8