Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-05188

Опубликовано: 09 июл. 2020
Источник: fstec
CVSS3: 9.4
CVSS2: 9.7
EPSS Средний

Описание

Уязвимость контейнера сервлетов Eclipse Jetty связана с дублированием операций на ресурсе. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании

Вендор

Сообщество свободного программного обеспечения
Oracle Corp.
Red Hat Inc.
Fedora Project
Eclipse Foundation
CD Foundation

Наименование ПО

Debian GNU/Linux
FMW Platform
Jboss Fuse
Oracle Hospitality Guest Access
Application Testing Suite
Fedora
Oracle FLEXCUBE Private Banking
Oracle Communications Element Manager
Oracle Communications Session Report Manager
Oracle Communications Session Route Manager
Communications Application Session Controller
Jetty
Jenkins

Версия ПО

9 (Debian GNU/Linux)
12.2.1.3.0 (FMW Platform)
7 (Jboss Fuse)
4.2.0 (Oracle Hospitality Guest Access)
4.2.1 (Oracle Hospitality Guest Access)
13.3.0.1 (Application Testing Suite)
32 (Fedora)
12.0.0 (Oracle FLEXCUBE Private Banking)
12.1.0 (Oracle FLEXCUBE Private Banking)
от 8.2.0 до 8.2.2 включительно (Oracle Communications Element Manager)
от 8.2.0 до 8.2.2 включительно (Oracle Communications Session Report Manager)
от 8.2.0 до 8.2.2 включительно (Oracle Communications Session Route Manager)
3.9m0p1 (Communications Application Session Controller)
9.4.27 (Jetty)
9.4.28 (Jetty)
9.4.29 (Jetty)
до 2.235.5 (Jenkins)
12.2.1.4.0 (FMW Platform)

Тип ПО

Операционная система
Сетевое программное средство
Прикладное ПО информационных систем
Сетевое средство

Операционные системы и аппаратные платформы

Сообщество свободного программного обеспечения Debian GNU/Linux 9
Fedora Project Fedora 32

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 9,7)
Критический уровень опасности (базовая оценка CVSS 3.0 составляет 9,4)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Eclipse Jetty:
https://bugs.eclipse.org/bugs/show_bug.cgi?id=564984
Для Jenkins:
https://www.jenkins.io/security/advisory/2020-08-17/
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2019-17638
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2019-17638
Для Fedora Project:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB/
Для программных продуктов Oracle Corp.:
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuapr2021.html

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 97%
0.30928
Средний

9.4 Critical

CVSS3

9.7 Critical

CVSS2

Связанные уязвимости

CVSS3: 9.4
ubuntu
больше 5 лет назад

In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with other data. Thread1 then proceeds to write the buffer that now contains different data. This results in client1, which issued request1 seeing data from another request or response which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.). If the Jetty version cannot be upgraded, the vulnerability can be significantly reduced by configuring a responseHeaderSize significantly larger than the requestHeaderSize (12KB responseHeaderSize and 8KB requestHeaderSize).

CVSS3: 7.7
redhat
больше 5 лет назад

In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with other data. Thread1 then proceeds to write the buffer that now contains different data. This results in client1, which issued request1 seeing data from another request or response which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.). If the Jetty version cannot be upgraded, the vulnerability can be significantly reduced by configuring a responseHeaderSize significantly larger than the requestHeaderSize (12KB responseHeaderSize and 8KB requestHeaderSize).

CVSS3: 9.4
nvd
больше 5 лет назад

In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with other data. Thread1 then proceeds to write the buffer that now contains different data. This results in client1, which issued request1 seeing data from another request or response which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.). If the Jetty version cannot be upgraded, the vulnerability can be significantly reduced by configuring a responseHeaderSize significantly larger than the requestHeaderSize (12KB responseHeaderSize and 8KB requestHeaderSize).

CVSS3: 9.4
debian
больше 5 лет назад

In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in ca ...

CVSS3: 9.4
github
больше 5 лет назад

Operation on a Resource after Expiration or Release in Jetty Server

EPSS

Процентиль: 97%
0.30928
Средний

9.4 Critical

CVSS3

9.7 Critical

CVSS2