openEuler 20.03 LTS SP1 update for jetty



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-34428
CWE-ID CWE-613
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

jetty-io
Operating systems & Components / Operating system package or component

jetty-jstl
Operating systems & Components / Operating system package or component

jetty-start
Operating systems & Components / Operating system package or component

jetty-util-ajax
Operating systems & Components / Operating system package or component

jetty-http2-http-client-transport
Operating systems & Components / Operating system package or component

jetty-alpn-client
Operating systems & Components / Operating system package or component

jetty-osgi-alpn
Operating systems & Components / Operating system package or component

jetty-unixsocket
Operating systems & Components / Operating system package or component

jetty-nosql
Operating systems & Components / Operating system package or component

jetty-http
Operating systems & Components / Operating system package or component

jetty-websocket-servlet
Operating systems & Components / Operating system package or component

jetty-websocket-common
Operating systems & Components / Operating system package or component

jetty-annotations
Operating systems & Components / Operating system package or component

jetty-http2-common
Operating systems & Components / Operating system package or component

jetty-http-spi
Operating systems & Components / Operating system package or component

jetty-osgi-boot
Operating systems & Components / Operating system package or component

jetty-util
Operating systems & Components / Operating system package or component

jetty-plus
Operating systems & Components / Operating system package or component

jetty-jaspi
Operating systems & Components / Operating system package or component

jetty-deploy
Operating systems & Components / Operating system package or component

jetty-cdi
Operating systems & Components / Operating system package or component

jetty-rewrite
Operating systems & Components / Operating system package or component

jetty-websocket-server
Operating systems & Components / Operating system package or component

jetty-jndi
Operating systems & Components / Operating system package or component

jetty-fcgi-server
Operating systems & Components / Operating system package or component

jetty-websocket-api
Operating systems & Components / Operating system package or component

jetty-http2-client
Operating systems & Components / Operating system package or component

jetty-security
Operating systems & Components / Operating system package or component

jetty-alpn-server
Operating systems & Components / Operating system package or component

jetty-client
Operating systems & Components / Operating system package or component

jetty-proxy
Operating systems & Components / Operating system package or component

jetty-osgi-boot-warurl
Operating systems & Components / Operating system package or component

jetty-httpservice
Operating systems & Components / Operating system package or component

jetty-servlet
Operating systems & Components / Operating system package or component

jetty-jaas
Operating systems & Components / Operating system package or component

jetty-javax-websocket-server-impl
Operating systems & Components / Operating system package or component

jetty-server
Operating systems & Components / Operating system package or component

jetty-jsp
Operating systems & Components / Operating system package or component

jetty-websocket-client
Operating systems & Components / Operating system package or component

jetty-infinispan
Operating systems & Components / Operating system package or component

jetty-ant
Operating systems & Components / Operating system package or component

jetty-continuation
Operating systems & Components / Operating system package or component

jetty-webapp
Operating systems & Components / Operating system package or component

jetty-http2-server
Operating systems & Components / Operating system package or component

jetty-jspc-maven-plugin
Operating systems & Components / Operating system package or component

jetty-servlets
Operating systems & Components / Operating system package or component

jetty-fcgi-client
Operating systems & Components / Operating system package or component

jetty-javadoc
Operating systems & Components / Operating system package or component

jetty-quickstart
Operating systems & Components / Operating system package or component

jetty-xml
Operating systems & Components / Operating system package or component

jetty-maven-plugin
Operating systems & Components / Operating system package or component

jetty-project
Operating systems & Components / Operating system package or component

jetty-osgi-boot-jsp
Operating systems & Components / Operating system package or component

jetty-http2-hpack
Operating systems & Components / Operating system package or component

jetty-javax-websocket-client-impl
Operating systems & Components / Operating system package or component

jetty-spring
Operating systems & Components / Operating system package or component

jetty-jmx
Operating systems & Components / Operating system package or component

jetty
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Insufficient Session Expiration

EUVDB-ID: #VU55642

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-34428

CWE-ID: CWE-613 - Insufficient Session Expiration

Exploit availability: No

Description

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to insufficient session expiration issue. If an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1

jetty-io: before 9.4.15-9

jetty-jstl: before 9.4.15-9

jetty-start: before 9.4.15-9

jetty-util-ajax: before 9.4.15-9

jetty-http2-http-client-transport: before 9.4.15-9

jetty-alpn-client: before 9.4.15-9

jetty-osgi-alpn: before 9.4.15-9

jetty-unixsocket: before 9.4.15-9

jetty-nosql: before 9.4.15-9

jetty-http: before 9.4.15-9

jetty-websocket-servlet: before 9.4.15-9

jetty-websocket-common: before 9.4.15-9

jetty-annotations: before 9.4.15-9

jetty-http2-common: before 9.4.15-9

jetty-http-spi: before 9.4.15-9

jetty-osgi-boot: before 9.4.15-9

jetty-util: before 9.4.15-9

jetty-plus: before 9.4.15-9

jetty-jaspi: before 9.4.15-9

jetty-deploy: before 9.4.15-9

jetty-cdi: before 9.4.15-9

jetty-rewrite: before 9.4.15-9

jetty-websocket-server: before 9.4.15-9

jetty-jndi: before 9.4.15-9

jetty-fcgi-server: before 9.4.15-9

jetty-websocket-api: before 9.4.15-9

jetty-http2-client: before 9.4.15-9

jetty-security: before 9.4.15-9

jetty-alpn-server: before 9.4.15-9

jetty-client: before 9.4.15-9

jetty-proxy: before 9.4.15-9

jetty-osgi-boot-warurl: before 9.4.15-9

jetty-httpservice: before 9.4.15-9

jetty-servlet: before 9.4.15-9

jetty-jaas: before 9.4.15-9

jetty-javax-websocket-server-impl: before 9.4.15-9

jetty-server: before 9.4.15-9

jetty-jsp: before 9.4.15-9

jetty-websocket-client: before 9.4.15-9

jetty-infinispan: before 9.4.15-9

jetty-ant: before 9.4.15-9

jetty-continuation: before 9.4.15-9

jetty-webapp: before 9.4.15-9

jetty-http2-server: before 9.4.15-9

jetty-jspc-maven-plugin: before 9.4.15-9

jetty-servlets: before 9.4.15-9

jetty-fcgi-client: before 9.4.15-9

jetty-javadoc: before 9.4.15-9

jetty-quickstart: before 9.4.15-9

jetty-xml: before 9.4.15-9

jetty-maven-plugin: before 9.4.15-9

jetty-project: before 9.4.15-9

jetty-osgi-boot-jsp: before 9.4.15-9

jetty-http2-hpack: before 9.4.15-9

jetty-javax-websocket-client-impl: before 9.4.15-9

jetty-spring: before 9.4.15-9

jetty-jmx: before 9.4.15-9

jetty: before 9.4.15-9

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1263


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###