In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Eclipse
Subscribe
|
Jetty
Subscribe
|
|
Hp
Subscribe
|
|
|
Netapp
Subscribe
|
E-series Santricity Management
Subscribe
E-series Santricity Os Controller
Subscribe
E-series Santricity Web Services
Subscribe
Hci Management Node
Subscribe
Hci Storage Node
Subscribe
Oncommand System Manager
Subscribe
Oncommand Unified Manager For 7-mode
Subscribe
Santricity Cloud Connector
Subscribe
Snap Creator Framework
Subscribe
Snapcenter
Subscribe
Snapmanager
Subscribe
Solidfire
Subscribe
Storage Services Connector
Subscribe
|
|
Oracle
Subscribe
|
|
|
Redhat
Subscribe
|
Jboss Data Grid
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4278-1 | jetty9 security update |
EUVD |
EUVD-2018-0526 | In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization. |
Github GHSA |
GHSA-6x9x-8qw9-9pp6 | Jetty vulnerable to authorization bypass due to inconsistent HTTP request handling (HTTP Request Smuggling) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2024-08-05T16:12:27.826Z
Reserved: 2017-04-11T00:00:00.000Z
Link: CVE-2017-7658
No data.
Status : Modified
Published: 2018-06-26T17:29:00.210
Modified: 2024-11-21T03:32:23.850
Link: CVE-2017-7658
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Github GHSA