Vulnerability identifier: #VU13529
Vulnerability risk: Low
Exploitation vector: Network
Exploit availability: No
The disclosed vulnerability allows a remote attacker to conduct an HTTP request smuggling attack on the target system.
The vulnerability exists due to improper handling HTTP requests that contain more than one content-length header. A remote attacker can send a specially crafted HTTP request that contains a transfer-encoding header and a content-length header, cause the software and an upstream HTTP agent to misinterpret the boundary of the request and to poison the web cache on the system, which could be used to conduct further attacks.
The vulnerability is addressed in the versions 9.2.25.v2018060, 9.3.24.v20180605 and 9.4.11.v20180605.
Vulnerable software versions
Jetty: 9.2.0.v20140526 - 9.4.8.v20171121
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?