Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2021-04177

Опубликовано: 26 июн. 2018
Источник: fstec
CVSS3: 9.8
CVSS2: 10
EPSS Низкий

Описание

Уязвимость контейнера сервлетов Eclipse Jetty связана с непоследовательной интерпретацией http-запросов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

Вендор

Red Hat Inc.
Сообщество свободного программного обеспечения
Oracle Corp.
Eclipse Foundation

Наименование ПО

Red Hat Enterprise Linux
Debian GNU/Linux
Jboss Fuse
Retail Xstore Point of Service
Red Hat Software Collections
Jetty
Jboss Fuse Service Works
REST Data Services
Oracle Communications Cloud Native Core Policy

Версия ПО

6 (Red Hat Enterprise Linux)
7 (Red Hat Enterprise Linux)
9 (Debian GNU/Linux)
7 (Jboss Fuse)
7.1 (Retail Xstore Point of Service)
15.0 (Retail Xstore Point of Service)
16.0 (Retail Xstore Point of Service)
17.0 (Retail Xstore Point of Service)
- (Red Hat Software Collections)
от 9.0.0 до 9.2.26 включительно (Jetty)
6.0 (Jboss Fuse Service Works)
6 (Jboss Fuse)
11.2.0.4 (REST Data Services)
12.1.0.2 (REST Data Services)
12.2.0.1 (REST Data Services)
18c (REST Data Services)
1.5.0 (Oracle Communications Cloud Native Core Policy)
от 9.3.0 до 9.3.24 (Jetty)
от 9.4.0 до 9.4.11 (Jetty)

Тип ПО

Операционная система
Прикладное ПО информационных систем
Сетевое средство

Операционные системы и аппаратные платформы

Red Hat Inc. Red Hat Enterprise Linux 6
Red Hat Inc. Red Hat Enterprise Linux 7
Сообщество свободного программного обеспечения Debian GNU/Linux 9

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)
Критический уровень опасности (базовая оценка CVSS 3.0 составляет 9,8)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Eclipse Jetty:
https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668
Для Debian GNU/Linux:
https://www.debian.org/security/2018/dsa-4278
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2017-7657
Для программных продуктов Oracle Corp.:
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2019.html

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует в открытом доступе

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 92%
0.09096
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.

CVSS3: 9.8
redhat
больше 7 лет назад

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.

CVSS3: 9.8
nvd
больше 7 лет назад

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.

CVSS3: 9.8
debian
больше 7 лет назад

In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations) ...

CVSS3: 9.8
github
больше 7 лет назад

Critical severity vulnerability that affects org.eclipse.jetty:jetty-server

EPSS

Процентиль: 92%
0.09096
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2