#VU13529 HTTP request smuggling attack in Jetty


Published: 2018-07-02

Vulnerability identifier: #VU13529

Vulnerability risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7658

CWE-ID: CWE-444

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Jetty
Server applications / Web servers

Vendor: Eclipse

Description

The disclosed vulnerability allows a remote attacker to conduct an HTTP request smuggling attack on the target system.

The vulnerability exists due to improper handling HTTP requests that contain more than one content-length header. A remote attacker can send a specially crafted HTTP request that contains a transfer-encoding header and a content-length header, cause the software and an upstream HTTP agent to misinterpret the boundary of the request and to poison the web cache on the system, which could be used to conduct further attacks.

Mitigation
The vulnerability is addressed in the versions 9.2.25.v2018060, 9.3.24.v20180605 and 9.4.11.v20180605.

Vulnerable software versions

Jetty: 9.2.0.v20140526 - 9.4.8.v20171121


External links
http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00123.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability