QID 982322

QID 982322: Java (maven) Security Update for org.eclipse.jetty:jetty-server (GHSA-vgg8-72f2-qm23)

In Eclipse Jetty, versions 9.2.x and older, 9.3.x, transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.

Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to refer to GHSA-vgg8-72f2-qm23 for updates pertaining to this vulnerability.
    Vendor References

    CVEs related to QID 982322

    Software Advisories
    Advisory ID Software Component Link
    GHSA-vgg8-72f2-qm23 org.eclipse.jetty:jetty-server URL Logo github.com/advisories/GHSA-vgg8-72f2-qm23