TROYANOSYVIRUS
Voltar para CVEs

CVE-2017-7658

CRITICAL
9.8

Descricao

In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado6/26/2018
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0

Produtos afetados

debian:debian_linuxeclipse:jettyhp:xp_p9000hp:xp_p9000_command_viewnetapp:e-series_santricity_managementnetapp:e-series_santricity_os_controllernetapp:e-series_santricity_web_servicesnetapp:hci_management_nodenetapp:hci_storage_nodenetapp:oncommand_system_managernetapp:oncommand_unified_manager_for_7-modenetapp:santricity_cloud_connectornetapp:snap_creator_frameworknetapp:snapcenternetapp:snapmanagernetapp:solidfirenetapp:storage_services_connectororacle:rest_data_servicesoracle:retail_xstore_paymentoracle:retail_xstore_point_of_service

Fraquezas (CWE)

CWE-444CWE-444

Referencias

http://www.securityfocus.com/bid/106566(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041194(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20181014-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4278(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com//security-alerts/cpujul2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2020.html(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.