CVE-2017-7658
Published: 26 June 2018
In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
Notes
Author | Note |
---|---|
ebarretto | jetty8 ignored (very hard to exploit, complex patch) |
Priority
Status
Package | Release | Status |
---|---|---|
jetty8 Launchpad, Ubuntu, Debian |
groovy |
Does not exist
|
hirsute |
Does not exist
|
|
artful |
Does not exist
|
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
trusty |
Ignored
|
|
upstream |
Needed
|
|
xenial |
Ignored
|
|
mantic |
Does not exist
|
|
jetty9 Launchpad, Ubuntu, Debian |
groovy |
Not vulnerable
(9.2.26-1)
|
hirsute |
Not vulnerable
(9.2.26-1)
|
|
xenial |
Needed
|
|
artful |
Ignored
(end of life)
|
|
bionic |
Needed
|
|
cosmic |
Not vulnerable
(9.2.26-1)
|
|
disco |
Not vulnerable
(9.2.26-1)
|
|
eoan |
Not vulnerable
(9.2.26-1)
|
|
focal |
Not vulnerable
(9.2.26-1)
|
|
impish |
Not vulnerable
(9.2.26-1)
|
|
jammy |
Not vulnerable
(9.2.26-1)
|
|
kinetic |
Not vulnerable
(9.2.26-1)
|
|
lunar |
Not vulnerable
(9.2.26-1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(9.2.25-1, 9.2.21-1+deb9u1)
|
|
mantic |
Not vulnerable
(9.2.26-1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |