#VU340 Security bypass in Jetty


Published: 2016-08-20 | Updated: 2017-01-23

Vulnerability identifier: #VU340

Vulnerability risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-4800

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Jetty
Server applications / Web servers

Vendor: Eclipse

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to an error within PathResource class when parsing URLs, which contains certain escaped characters. A remote unauthenticated attacker can bypass implemented security restrictions and gain access to protected resources (e.g. WEB-INF and META-INF folders and their contents) or bypass application filters or other restrictions, implemented in servlet configuration.

Successful exploitation of the vulnerability may allow an attacker to gain unauthorized access to otherwise protected resources.

Mitigation
Install the latest version 9.3.9.

Vulnerable software versions

Jetty: 9.3.0.v20150608 - 9.3.8.v20160311


External links
http://www.eclipse.org/jetty/documentation/9.4.x/security-reports.html
http://www.ocert.org/advisories/ocert-2016-001.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability