Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-34428

Опубликовано: 22 июн. 2021
Источник: redhat
CVSS3: 3.5

Описание

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.

A flaw was discovered in the jetty-server, where if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts, this could result in a session not being invalidated and a shared-computer application being left logged in. The highest threat from this vulnerability is to data confidentiality and integrity.

Отчет

In OpenShift Container Platform (OCP), the hive/presto/hadoop components that comprise the OCP metering stack, ship the vulnerable version of jetty. Since the release of OCP 4.6, the metering product has been deprecated [1], hence the affected components are marked as wontfix. This may be fixed in the future. OCP 3.11 is out of the support scope for Moderate and Low impact vulnerabilities because is already in the Maintenance Support phase, hence the affected OCP 3.11 component has been marked as wontifx. [1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated

Меры по смягчению последствий

Applications should catch all Throwables within their SessionListener#sessionDestroyed() implementations.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat CodeReady Studio 12jetty-serverFix deferred
Red Hat Developer Toolsrh-eclipse-jettyAffected
Red Hat Enterprise Linux 7jettyOut of support scope
Red Hat Enterprise Linux 8eclipse:rhel8/jettyFix deferred
Red Hat Integration Camel K 1jettyFix deferred
Red Hat Integration Service Registryjetty-serverAffected
Red Hat JBoss A-MQ 6jetty-serverOut of support scope
Red Hat JBoss Data Grid 7jetty-serverNot affected
Red Hat JBoss Fuse 6jettyOut of support scope
Red Hat JBoss Fuse 6jetty-serverOut of support scope

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-613
https://bugzilla.redhat.com/show_bug.cgi?id=1974891jetty: SessionListener can prevent a session from being invalidated breaking logout

3.5 Low

CVSS3

Связанные уязвимости

CVSS3: 2.9
ubuntu
больше 4 лет назад

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.

CVSS3: 2.9
nvd
больше 4 лет назад

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.

CVSS3: 2.9
debian
больше 4 лет назад

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exce ...

CVSS3: 3.5
github
больше 4 лет назад

SessionListener can prevent a session from being invalidated breaking logout

CVSS3: 2.9
fstec
больше 4 лет назад

Уязвимость метода SessionListener#sessionDestroyed() контейнера сервлетов Eclipse Jetty, позволяющая нарушителю повысить свои привилегии

3.5 Low

CVSS3