openEuler 20.03 LTS SP1 update for jetty



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-27216
CWE-ID CWE-362
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

jetty-http2-server
Operating systems & Components / Operating system package or component

jetty-alpn-client
Operating systems & Components / Operating system package or component

jetty-jaspi
Operating systems & Components / Operating system package or component

jetty-websocket-api
Operating systems & Components / Operating system package or component

jetty-http2-common
Operating systems & Components / Operating system package or component

jetty-security
Operating systems & Components / Operating system package or component

jetty-http2-http-client-transport
Operating systems & Components / Operating system package or component

jetty-websocket-common
Operating systems & Components / Operating system package or component

jetty-osgi-boot-jsp
Operating systems & Components / Operating system package or component

jetty-servlets
Operating systems & Components / Operating system package or component

jetty-client
Operating systems & Components / Operating system package or component

jetty-servlet
Operating systems & Components / Operating system package or component

jetty-javax-websocket-server-impl
Operating systems & Components / Operating system package or component

jetty-plus
Operating systems & Components / Operating system package or component

jetty-server
Operating systems & Components / Operating system package or component

jetty-jstl
Operating systems & Components / Operating system package or component

jetty-jsp
Operating systems & Components / Operating system package or component

jetty-http2-hpack
Operating systems & Components / Operating system package or component

jetty-jmx
Operating systems & Components / Operating system package or component

jetty-unixsocket
Operating systems & Components / Operating system package or component

jetty-javadoc
Operating systems & Components / Operating system package or component

jetty-fcgi-client
Operating systems & Components / Operating system package or component

jetty-util-ajax
Operating systems & Components / Operating system package or component

jetty-spring
Operating systems & Components / Operating system package or component

jetty-http
Operating systems & Components / Operating system package or component

jetty-alpn-server
Operating systems & Components / Operating system package or component

jetty-util
Operating systems & Components / Operating system package or component

jetty-proxy
Operating systems & Components / Operating system package or component

jetty-javax-websocket-client-impl
Operating systems & Components / Operating system package or component

jetty-osgi-boot
Operating systems & Components / Operating system package or component

jetty-websocket-client
Operating systems & Components / Operating system package or component

jetty-project
Operating systems & Components / Operating system package or component

jetty-deploy
Operating systems & Components / Operating system package or component

jetty-websocket-servlet
Operating systems & Components / Operating system package or component

jetty-start
Operating systems & Components / Operating system package or component

jetty-jndi
Operating systems & Components / Operating system package or component

jetty-httpservice
Operating systems & Components / Operating system package or component

jetty-http-spi
Operating systems & Components / Operating system package or component

jetty-xml
Operating systems & Components / Operating system package or component

jetty-rewrite
Operating systems & Components / Operating system package or component

jetty-osgi-alpn
Operating systems & Components / Operating system package or component

jetty-nosql
Operating systems & Components / Operating system package or component

jetty-cdi
Operating systems & Components / Operating system package or component

jetty-osgi-boot-warurl
Operating systems & Components / Operating system package or component

jetty-annotations
Operating systems & Components / Operating system package or component

jetty-http2-client
Operating systems & Components / Operating system package or component

jetty-quickstart
Operating systems & Components / Operating system package or component

jetty-fcgi-server
Operating systems & Components / Operating system package or component

jetty-jspc-maven-plugin
Operating systems & Components / Operating system package or component

jetty-jaas
Operating systems & Components / Operating system package or component

jetty-continuation
Operating systems & Components / Operating system package or component

jetty-infinispan
Operating systems & Components / Operating system package or component

jetty-websocket-server
Operating systems & Components / Operating system package or component

jetty-ant
Operating systems & Components / Operating system package or component

jetty-webapp
Operating systems & Components / Operating system package or component

jetty-io
Operating systems & Components / Operating system package or component

jetty-maven-plugin
Operating systems & Components / Operating system package or component

jetty
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Race condition

EUVDB-ID: #VU48942

Risk: Low

CVSSv4.0: 5.8 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/U:Clear]

CVE-ID: CVE-2020-27216

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition. On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1

jetty-http2-server: before 9.4.15-5

jetty-alpn-client: before 9.4.15-5

jetty-jaspi: before 9.4.15-5

jetty-websocket-api: before 9.4.15-5

jetty-http2-common: before 9.4.15-5

jetty-security: before 9.4.15-5

jetty-http2-http-client-transport: before 9.4.15-5

jetty-websocket-common: before 9.4.15-5

jetty-osgi-boot-jsp: before 9.4.15-5

jetty-servlets: before 9.4.15-5

jetty-client: before 9.4.15-5

jetty-servlet: before 9.4.15-5

jetty-javax-websocket-server-impl: before 9.4.15-5

jetty-plus: before 9.4.15-5

jetty-server: before 9.4.15-5

jetty-jstl: before 9.4.15-5

jetty-jsp: before 9.4.15-5

jetty-http2-hpack: before 9.4.15-5

jetty-jmx: before 9.4.15-5

jetty-unixsocket: before 9.4.15-5

jetty-javadoc: before 9.4.15-5

jetty-fcgi-client: before 9.4.15-5

jetty-util-ajax: before 9.4.15-5

jetty-spring: before 9.4.15-5

jetty-http: before 9.4.15-5

jetty-alpn-server: before 9.4.15-5

jetty-util: before 9.4.15-5

jetty-proxy: before 9.4.15-5

jetty-javax-websocket-client-impl: before 9.4.15-5

jetty-osgi-boot: before 9.4.15-5

jetty-websocket-client: before 9.4.15-5

jetty-project: before 9.4.15-5

jetty-deploy: before 9.4.15-5

jetty-websocket-servlet: before 9.4.15-5

jetty-start: before 9.4.15-5

jetty-jndi: before 9.4.15-5

jetty-httpservice: before 9.4.15-5

jetty-http-spi: before 9.4.15-5

jetty-xml: before 9.4.15-5

jetty-rewrite: before 9.4.15-5

jetty-osgi-alpn: before 9.4.15-5

jetty-nosql: before 9.4.15-5

jetty-cdi: before 9.4.15-5

jetty-osgi-boot-warurl: before 9.4.15-5

jetty-annotations: before 9.4.15-5

jetty-http2-client: before 9.4.15-5

jetty-quickstart: before 9.4.15-5

jetty-fcgi-server: before 9.4.15-5

jetty-jspc-maven-plugin: before 9.4.15-5

jetty-jaas: before 9.4.15-5

jetty-continuation: before 9.4.15-5

jetty-infinispan: before 9.4.15-5

jetty-websocket-server: before 9.4.15-5

jetty-ant: before 9.4.15-5

jetty-webapp: before 9.4.15-5

jetty-io: before 9.4.15-5

jetty-maven-plugin: before 9.4.15-5

jetty: before 9.4.15-5

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1052


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###