TROYANOSYVIRUS
Back to CVEs

CVE-2017-7658

CRITICAL
9.8

Description

In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/26/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

debian:debian_linuxeclipse:jettyhp:xp_p9000hp:xp_p9000_command_viewnetapp:e-series_santricity_managementnetapp:e-series_santricity_os_controllernetapp:e-series_santricity_web_servicesnetapp:hci_management_nodenetapp:hci_storage_nodenetapp:oncommand_system_managernetapp:oncommand_unified_manager_for_7-modenetapp:santricity_cloud_connectornetapp:snap_creator_frameworknetapp:snapcenternetapp:snapmanagernetapp:solidfirenetapp:storage_services_connectororacle:rest_data_servicesoracle:retail_xstore_paymentoracle:retail_xstore_point_of_service

Weaknesses (CWE)

CWE-444CWE-444

References

http://www.securityfocus.com/bid/106566(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041194(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20181014-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4278(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com//security-alerts/cpujul2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2020.html(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.