Логотип exploitDog
bind: "CVE-2023-40167"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-40167"

Количество 9

Количество 9

ubuntu логотип

CVE-2023-40167

почти 2 года назад

Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-40167

почти 2 года назад

Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-40167

почти 2 года назад

Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-40167

почти 2 года назад

Jetty is a Java based web server and servlet engine. Prior to versions ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-hmr7-m48g-48f6

почти 2 года назад

Jetty accepts "+" prefixed value in Content-Length

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-02254

больше 1 года назад

Уязвимость контейнера сервлетов Eclipse Jetty, связанная с ошибками при обработке параметров длины входных данных, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20240730-08

11 месяцев назад

Множественные уязвимости jetty

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4210-1

больше 1 года назад

Security update for jetty-minimal

EPSS: Низкий
redos логотип

ROS-20240409-12

около 1 года назад

Множественные уязвимости apache-kafka

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-40167

Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.

CVSS3: 5.3
4%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-40167

Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.

CVSS3: 5.3
4%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-40167

Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.

CVSS3: 5.3
4%
Низкий
почти 2 года назад
debian логотип
CVE-2023-40167

Jetty is a Java based web server and servlet engine. Prior to versions ...

CVSS3: 5.3
4%
Низкий
почти 2 года назад
github логотип
GHSA-hmr7-m48g-48f6

Jetty accepts "+" prefixed value in Content-Length

CVSS3: 5.3
4%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02254

Уязвимость контейнера сервлетов Eclipse Jetty, связанная с ошибками при обработке параметров длины входных данных, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 5.3
4%
Низкий
больше 1 года назад
redos логотип
ROS-20240730-08

Множественные уязвимости jetty

CVSS3: 5.3
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2023:4210-1

Security update for jetty-minimal

больше 1 года назад
redos логотип
ROS-20240409-12

Множественные уязвимости apache-kafka

CVSS3: 9.8
около 1 года назад

Уязвимостей на страницу