Page 8 of 42 results (0.006 seconds)

CVSS: 9.8EPSS: 2%CPEs: 20EXPL: 0

The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes. El mecanismo de normalización de ruta en la clase PathResource en Eclipse Jetty 9.3.x en versiones anteriores a 9.3.9 en Windows permite a los atacantes remotos evitar las restricciones de recursos protegidos y otras restricciones de seguridad a través de una URL con ciertos caracteres de escape relacionados con las barras invertidas. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Eclipse Jetty. Authentication is not required to exploit this vulnerability. The specific flaw exists within the way the ContextHandler class restricts access to protected resources. By issuing a crafted request, an attacker can gain access to the code of a web application deployed in Jetty. • http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00092.html http://www.ocert.org/advisories/ocert-2016-001.html http://www.securityfocus.com/bid/90945 http://www.zerodayinitiative.com/advisories/ZDI-16-362 https://security.netapp.com/advisory/ntap-20190307-0006 https://www.oracle.com/security-alerts/cpuoct2020.html • CWE-284: Improper Access Control •

CVSS: 7.5EPSS: 94%CPEs: 9EXPL: 5

The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak. El código de manipulación de excepciones en Eclipse Jetty en versiones anteriores a 9.2.9.v20150224 permite a atacantes remotos obtener información sensible de memoria de procesos a través de caracteres no válidos en una cabecera HTTP, vulnerabilidad también conocida como JetLeak. Remote unauthenticated attackers are able to read arbitrary data from other HTTP sessions because Ignition uses a vulnerable Jetty server. When the Jetty web server receives a HTTP request, the below code is used to parse through the HTTP headers and their associated values. Inductive Automation versions 7.8.1 (b2016012216) and 7.8.0 (b2015101414) are affected. • https://www.exploit-db.com/exploits/39455 http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html http://seclists.org/fulldisclosure/2015/Mar/12 http://www.securityfocus.com/archive/1/534755/100/1600/threaded http://www.securityfocus.com/bid/72768 http • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.3EPSS: 1%CPEs: 341EXPL: 0

Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. Jetty v8.1.0.RC2 y anteriores calcula los valores hash de los parámetros de forma, sin restringir la capacidad de desencadenar colisiones hash predecible, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) mediante el envío de gran cantidad de parámetros a mano. • http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html http://marc.info/?l=bugtraq&m=143387688830075&w=2 http://secunia.com/advisories/47408 http://secunia.com/advisories/48981 http://www.kb.cert.org/vuls/id/903934 http://www.nruns.com/_downloads/advisory28122011.pdf http://www.ocert.org/advisories/ocert-2011-003.html http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http • CWE-310: Cryptographic Issues •

CVSS: 4.3EPSS: 0%CPEs: 81EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.x and 7.0.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados en Mort Bay Jetty v6.x y v7.0.0, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de (1) una petición de cadena a jsp/dump.jsp en la característica JSP Dump o el (2) Name o (3) el parámetro Value a la URI por defecto para el Session Dump Servlet bajo session/. • https://www.exploit-db.com/exploits/9887 http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 1%CPEs: 81EXPL: 2

Mort Bay Jetty 6.x through 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application. Mort Bay Jetty versión 6.x hasta la versión 6.1.22 y 7.0.0 escribe datos backtrace sin sanear los caracteres no imprimibles, lo que podría permitir a los atacantes remotos modificar el título de una ventana, o posiblemente ejecutar comandos arbitrarios o sobrescribir archivos, mediante una solicitud HTTP que contiene un secuencia de escape para un emulador de terminal, relacionado con (1) un valor de cadena en el parámetro Age al URI predeterminado para la Cookie Dump Servle en test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) un valor alfabético en el parámetro A para jsp/expr.jsp, o (3) un valor alfabético en el encabezado HTTP Content-Length para una aplicación arbitraria. • http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt http://www.ush.it/team/ush/hack_httpd_escape/adv.txt • CWE-20: Improper Input Validation •