Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-2048 CVE-2022-2047 |
CWE-ID | CWE-399 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system jetty-infinispan Operating systems & Components / Operating system package or component jetty-jaas Operating systems & Components / Operating system package or component jetty-http2-client Operating systems & Components / Operating system package or component jetty-unixsocket Operating systems & Components / Operating system package or component jetty-websocket-common Operating systems & Components / Operating system package or component jetty-server Operating systems & Components / Operating system package or component jetty-maven-plugin Operating systems & Components / Operating system package or component jetty-quickstart Operating systems & Components / Operating system package or component jetty-javadoc Operating systems & Components / Operating system package or component jetty-http-spi Operating systems & Components / Operating system package or component jetty-util-ajax Operating systems & Components / Operating system package or component jetty-proxy Operating systems & Components / Operating system package or component jetty-xml Operating systems & Components / Operating system package or component jetty-nosql Operating systems & Components / Operating system package or component jetty-plus Operating systems & Components / Operating system package or component jetty-http Operating systems & Components / Operating system package or component jetty-fcgi-server Operating systems & Components / Operating system package or component jetty-cdi Operating systems & Components / Operating system package or component jetty-annotations Operating systems & Components / Operating system package or component jetty-websocket-api Operating systems & Components / Operating system package or component jetty-jaspi Operating systems & Components / Operating system package or component jetty-ant Operating systems & Components / Operating system package or component jetty-alpn-server Operating systems & Components / Operating system package or component jetty-continuation Operating systems & Components / Operating system package or component jetty-security Operating systems & Components / Operating system package or component jetty-rewrite Operating systems & Components / Operating system package or component jetty-io Operating systems & Components / Operating system package or component jetty-jstl Operating systems & Components / Operating system package or component jetty-jsp Operating systems & Components / Operating system package or component jetty-servlet Operating systems & Components / Operating system package or component jetty-javax-websocket-client-impl Operating systems & Components / Operating system package or component jetty-spring Operating systems & Components / Operating system package or component jetty-fcgi-client Operating systems & Components / Operating system package or component jetty-client Operating systems & Components / Operating system package or component jetty-jspc-maven-plugin Operating systems & Components / Operating system package or component jetty-httpservice Operating systems & Components / Operating system package or component jetty-webapp Operating systems & Components / Operating system package or component jetty-jmx Operating systems & Components / Operating system package or component jetty-util Operating systems & Components / Operating system package or component jetty-websocket-servlet Operating systems & Components / Operating system package or component jetty-servlets Operating systems & Components / Operating system package or component jetty-websocket-server Operating systems & Components / Operating system package or component jetty-osgi-boot-jsp Operating systems & Components / Operating system package or component jetty-http2-common Operating systems & Components / Operating system package or component jetty-websocket-client Operating systems & Components / Operating system package or component jetty-start Operating systems & Components / Operating system package or component jetty-project Operating systems & Components / Operating system package or component jetty-deploy Operating systems & Components / Operating system package or component jetty-alpn-client Operating systems & Components / Operating system package or component jetty-jndi Operating systems & Components / Operating system package or component jetty-osgi-boot-warurl Operating systems & Components / Operating system package or component jetty-javax-websocket-server-impl Operating systems & Components / Operating system package or component jetty-osgi-alpn Operating systems & Components / Operating system package or component jetty-http2-hpack Operating systems & Components / Operating system package or component jetty-http2-http-client-transport Operating systems & Components / Operating system package or component jetty-osgi-boot Operating systems & Components / Operating system package or component jetty-http2-server Operating systems & Components / Operating system package or component jetty Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU65830
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-2048
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the application when handling invalid HTTP/2 requests. A remote attacker can send specially crafted requests to the server and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
jetty-infinispan: before 9.4.16-3
jetty-jaas: before 9.4.16-3
jetty-http2-client: before 9.4.16-3
jetty-unixsocket: before 9.4.16-3
jetty-websocket-common: before 9.4.16-3
jetty-server: before 9.4.16-3
jetty-maven-plugin: before 9.4.16-3
jetty-quickstart: before 9.4.16-3
jetty-javadoc: before 9.4.16-3
jetty-http-spi: before 9.4.16-3
jetty-util-ajax: before 9.4.16-3
jetty-proxy: before 9.4.16-3
jetty-xml: before 9.4.16-3
jetty-nosql: before 9.4.16-3
jetty-plus: before 9.4.16-3
jetty-http: before 9.4.16-3
jetty-fcgi-server: before 9.4.16-3
jetty-cdi: before 9.4.16-3
jetty-annotations: before 9.4.16-3
jetty-websocket-api: before 9.4.16-3
jetty-jaspi: before 9.4.16-3
jetty-ant: before 9.4.16-3
jetty-alpn-server: before 9.4.16-3
jetty-continuation: before 9.4.16-3
jetty-security: before 9.4.16-3
jetty-rewrite: before 9.4.16-3
jetty-io: before 9.4.16-3
jetty-jstl: before 9.4.16-3
jetty-jsp: before 9.4.16-3
jetty-servlet: before 9.4.16-3
jetty-javax-websocket-client-impl: before 9.4.16-3
jetty-spring: before 9.4.16-3
jetty-fcgi-client: before 9.4.16-3
jetty-client: before 9.4.16-3
jetty-jspc-maven-plugin: before 9.4.16-3
jetty-httpservice: before 9.4.16-3
jetty-webapp: before 9.4.16-3
jetty-jmx: before 9.4.16-3
jetty-util: before 9.4.16-3
jetty-websocket-servlet: before 9.4.16-3
jetty-servlets: before 9.4.16-3
jetty-websocket-server: before 9.4.16-3
jetty-osgi-boot-jsp: before 9.4.16-3
jetty-http2-common: before 9.4.16-3
jetty-websocket-client: before 9.4.16-3
jetty-start: before 9.4.16-3
jetty-project: before 9.4.16-3
jetty-deploy: before 9.4.16-3
jetty-alpn-client: before 9.4.16-3
jetty-jndi: before 9.4.16-3
jetty-osgi-boot-warurl: before 9.4.16-3
jetty-javax-websocket-server-impl: before 9.4.16-3
jetty-osgi-alpn: before 9.4.16-3
jetty-http2-hpack: before 9.4.16-3
jetty-http2-http-client-transport: before 9.4.16-3
jetty-osgi-boot: before 9.4.16-3
jetty-http2-server: before 9.4.16-3
jetty: before 9.4.16-3
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1031
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65831
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2047
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient validation of user-supplied input when parsing invalid URIs such as http://localhost;/path
. A remote attacker can pass specially crafted input to the application and bypass implemented security restrictions, as the Jetty's HttpClient
, and Jetty's ProxyServlet
/ AsyncProxyServlet
/ AsyncMiddleManServlet
will wrongly interpret an authority of such URI as the one with a hostname.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP3
jetty-infinispan: before 9.4.16-3
jetty-jaas: before 9.4.16-3
jetty-http2-client: before 9.4.16-3
jetty-unixsocket: before 9.4.16-3
jetty-websocket-common: before 9.4.16-3
jetty-server: before 9.4.16-3
jetty-maven-plugin: before 9.4.16-3
jetty-quickstart: before 9.4.16-3
jetty-javadoc: before 9.4.16-3
jetty-http-spi: before 9.4.16-3
jetty-util-ajax: before 9.4.16-3
jetty-proxy: before 9.4.16-3
jetty-xml: before 9.4.16-3
jetty-nosql: before 9.4.16-3
jetty-plus: before 9.4.16-3
jetty-http: before 9.4.16-3
jetty-fcgi-server: before 9.4.16-3
jetty-cdi: before 9.4.16-3
jetty-annotations: before 9.4.16-3
jetty-websocket-api: before 9.4.16-3
jetty-jaspi: before 9.4.16-3
jetty-ant: before 9.4.16-3
jetty-alpn-server: before 9.4.16-3
jetty-continuation: before 9.4.16-3
jetty-security: before 9.4.16-3
jetty-rewrite: before 9.4.16-3
jetty-io: before 9.4.16-3
jetty-jstl: before 9.4.16-3
jetty-jsp: before 9.4.16-3
jetty-servlet: before 9.4.16-3
jetty-javax-websocket-client-impl: before 9.4.16-3
jetty-spring: before 9.4.16-3
jetty-fcgi-client: before 9.4.16-3
jetty-client: before 9.4.16-3
jetty-jspc-maven-plugin: before 9.4.16-3
jetty-httpservice: before 9.4.16-3
jetty-webapp: before 9.4.16-3
jetty-jmx: before 9.4.16-3
jetty-util: before 9.4.16-3
jetty-websocket-servlet: before 9.4.16-3
jetty-servlets: before 9.4.16-3
jetty-websocket-server: before 9.4.16-3
jetty-osgi-boot-jsp: before 9.4.16-3
jetty-http2-common: before 9.4.16-3
jetty-websocket-client: before 9.4.16-3
jetty-start: before 9.4.16-3
jetty-project: before 9.4.16-3
jetty-deploy: before 9.4.16-3
jetty-alpn-client: before 9.4.16-3
jetty-jndi: before 9.4.16-3
jetty-osgi-boot-warurl: before 9.4.16-3
jetty-javax-websocket-server-impl: before 9.4.16-3
jetty-osgi-alpn: before 9.4.16-3
jetty-http2-hpack: before 9.4.16-3
jetty-http2-http-client-transport: before 9.4.16-3
jetty-osgi-boot: before 9.4.16-3
jetty-http2-server: before 9.4.16-3
jetty: before 9.4.16-3
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1031
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.